This is a very useful feature to have since it is possible to put
in a block against either an infected client or an infected
server sending large amounts of malware generated emails.
Email Size Limiting
A maximum allowable size of email messages can be
specified. This feature counts the total amount of bytes sent
for a single email which is the header size plus body size plus
the size of any email attachments after they are encoded. It
should be kept in mind that an email with, for example, an
attachment of 100 Kbytes, will be larger than 100 Kbytes.
The transferred size might be 120 Kbytes or more since the
encoding which takes place automatically for attachments
may substantially increase the transferred attachment size.
The administrator should therefore add a reasonable margin
above the anticipated email size when setting this limit.
Email address blacklisting
A blacklist of sender or recipient email addresses can be
specified so that mail from/to those addresses is blocked. The
blacklist is applied after the whitelist so that if an address
matches a whitelist entry it is not then checked against the
blacklist.
Email address whitelisting
A whitelist of email addresses can be specified so that any
mail from/to those addresses is allowed to pass through the
ALG regardless if the address is on the blacklist or that the
mail has been flagged as SPAM.
Verify MIME type
The content of an attached file can be checked to see if it
agrees with its stated filetype. A list of all filetypes that are
verified in this way can be found in Appendix C, Verified
MIME filetypes. This same option is also available in the
HTTP ALG and a fuller description of how it works can be
found in Section 6.2.2, “The HTTP ALG”.
Block/Allow filetype
Filetypes from a predefined list can optionally be blocked or
allowed as mail attachments and new filetypes can be added
to the list. This same option is also available in the HTTP
ALG and a fuller description of how it works can be found in
Section 6.2.2, “The HTTP ALG”. This same option is also
available in the HTTP ALG and a fuller description of how it
works can be found in Section 6.2.2, “The HTTP ALG”.
Anti-Virus Scanning
The NetDefendOS Anti-Virus subsystem can scan email
attachments searching for malicious code. Suspect files can
be dropped or just logged. This feature is common to a
number of ALGs and is described fully in Section 6.4,
“Anti-Virus Scanning”.
The Ordering for SMTP Filtering
SMTP filtering obeys the following processing order and is similar to the order followed by the
HTTP ALG except for the addition of SPAM filtering:
1.
Whitelist.
2.
Blacklist.
3.
SPAM filtering (if enabled).
6.2.5. The SMTP ALG
Chapter 6. Security Mechanisms
208
Summary of Contents for 800 - DFL 800 - Security Appliance
Page 24: ...1 3 NetDefendOS State Engine Packet Flow Chapter 1 NetDefendOS Overview 24 ...
Page 69: ...2 6 4 Restore to Factory Defaults Chapter 2 Management and Maintenance 69 ...
Page 121: ...3 9 DNS Chapter 3 Fundamentals 121 ...
Page 181: ...4 7 5 Advanced Settings for Transparent Mode Chapter 4 Routing 181 ...
Page 192: ...5 5 IP Pools Chapter 5 DHCP Services 192 ...
Page 282: ...6 7 Blacklisting Hosts and Networks Chapter 6 Security Mechanisms 282 ...
Page 300: ...mechanism 7 3 7 SAT and FwdFast Rules Chapter 7 Address Translation 300 ...
Page 301: ...7 3 7 SAT and FwdFast Rules Chapter 7 Address Translation 301 ...
Page 318: ...8 3 Customizing HTML Pages Chapter 8 User Authentication 318 ...
Page 322: ...ALG 9 1 5 The TLS Alternative for VPN Chapter 9 VPN 322 ...
Page 377: ...Management Interface Failure with VPN Chapter 9 VPN 377 ...
Page 408: ...10 4 6 SLB_SAT Rules Chapter 10 Traffic Management 408 ...
Page 419: ...11 5 HA Advanced Settings Chapter 11 High Availability 419 ...
Page 426: ...12 3 5 Limitations Chapter 12 ZoneDefense 426 ...
Page 449: ...13 9 Miscellaneous Settings Chapter 13 Advanced Settings 449 ...