The SME developers are doing their best to protect people from themselves. Don't forget that smtp conversations are unencrypted, so if you do use smtp-auth from remote sites your usernames and passwords can be snooped by any intervening system, or by anyone who can poison your DNS...
Here are some ideas:
* If your remote sites are using fixed IPs you can probably circumvent the SME firewall rules by adding the apparent IP of each remote site as a local network in server-manager:Security:Local_networks.
* It looks (from examining /etc/e-smith/templates/var/service/qpsmtpd/config/peers/0/05auth_cvm_unix_local) as though you can enable smtp auth by:config setprop smtpd Authentication enabled
signal-event email-update
* Your remote sites could be configured to use their own ISPs' SMTP servers for outbound email.
* You could put a SME at each location and create VPN tunnels (oh boy!)
* You could implement pop-before-smtp authentication (again exposing your usernames and passwords to the world...), but you'd have to learn way more about qpsmtpd and SME templates to make this work...
* You could customize /var/service/qpsmtpd/config/relayclients to allow relaying for your remote offices. Slightly better than just adding the remote office IPs to your 'Local Networks", but more difficult as you'll have to create a custom template to make the changes 'stick'.
I'm sure I can think of more ideas if you don't like these or if they don't work.
WARNING: I seem to throw out lots of ideas that don't pan out -- take these as pointers rather then step-by-step instructions...