F-Secure Internet Gatekeeper for Linux/Administrator’s Guide
38
Notify the administrator by e-mail
Notify Admin
(spam_notify_admin)
Sends a notification to the administrator by e-mail. Specify the e-mail address, mail
server, and detection message in
Settings to notify the administrator
under “Common
settings”.
To separate notifications from standard e-mails, "X-Admin-Notification-Id: [number]" is
added to the header. This also prevents the notification message from being detected as
a virus. “Number” is a random number, which is set as admin_notification_id in the
settings file during the installation.
Quarantine
Quarantine(keep)
(spam_quarantine)
Quarantines spam. Specify the directory, in which the viruses are quarantined, in
Quarantine directory
under “Common settings”. The spam is stored in mailbox format.
Specify this setting only if sufficient disk space is available.
Restrict e-mail recipients
Restrict RCPT domains
(acl_rcpt)
Specifies a list of recipient domains. If a domain is not on this list, the e-mail that is sent to
this domain is blocked.
The text after the first "@" character in the e-mail address is treated as the domain name.If
you enable this setting, the addresses containing "!" and "%" are also blocked. E-mail
addresses without a domain name are not blocked.
Even if you have enabled
SMTP authentication
or
POP-before-SMTP authentication
,
e-mail to the specified domains can be sent without authentication.
For examples, see “
Access Control
”, 65.
If you edit the [Restrict e-mail recipients] setting by using the web console,
the smtp rcpt setting is updated in /opt/f-secure/fsigk/conf/hosts.allow.
SMTP authentication
SMTP authentication
(proxyauth_pam_auth)
Performs proxy authentication independently for each user.
If you have enabled also the
POP-before-SMTP authentication
setting, the e-mail is sent if
either SMTP authentication or POP-before-SMTP authentication is successful.
If you have enabled also the
Restrict e-mail recipients
setting, e-mail to the specified
domains can be sent even without authentication.
Authentication is performed using PAMs (Pluggable Authentication Modules). You can change
the authentication method in the /etc/pam.d/fsigk_smtp file.
For more information, see "
Proxy authentication using Internet Gatekeeper
", 102.
Add or remove users
User DB
Edits the database of users who are permitted to connect. You can add, delete or modify
users and passwords.
POP-before-SMTP authentication
POP-before-SMTP Authentication
(pbs)
Enables POP-before-SMTP authentication. If the SMTP proxy performs POP-before-SMTP
authentication, run this together with the POP proxy. Client hosts (IP addresses) that are