233
Defining your security environment
Controlling full application inspection of traffic
Modifying the SMTP greeting
At some point, you may decide that you want to modify the standard SMTP greeting. This task shows
you where to look in the SGMI to modify the existing banner and set it to the banner of your choosing.
This change takes affect immediately after saving and activating your configuration.
Prerequisites
Complete the following tasks before beginning this procedure:
■
“Configuring access for inbound and outbound email”
To modify the SMTP greeting
1
In the SGMI, in the left pane, under Assets, click
Proxies
.
2
In the right pane, on the Proxies tab, click the SMTP proxy, and then click
Properties
.
3
In the Proxy Properties dialog box, on the General tab, in the Greeting message text box, type a new
greeting.
4
Click
OK
.
5
Optionally, do one of the following:
■
To save your configuration now and activate later, on the toolbar, click
Save
.
■
To activate your configuration now, on the toolbar, click
Activate
.
When prompted to save your changes, click
Yes
.
Related information
For further information related to this topic, see the following:
■
“Proxy Properties: SMTP—General tab”
Disabling SMTP flow control checks
You can configure the SMTP proxy to ignore flow control checking. Flow control checking is normally
used to detect attackers. This option is enabled by default. Use the procedure in this section to disable
flow control checking. Changes you make take affect immediately after saving and activating the
configuration.
Prerequisites
Complete the following tasks before beginning this procedure:
■
“Configuring access for inbound and outbound email”
To enable or disable SMTP flow control checks
1
In the SGMI, in the left pane, under Assets, click
Proxies
.
2
In the right pane, on the Proxies tab, click the SMTP proxy, and then click
Properties
.
3
In the Proxy Properties dialog box, on the Flow Control tab, check
Disable flow control checking
.
4
Click
OK
.
5
Optionally, do one of the following:
■
To save your configuration now and activate later, on the toolbar, click
Save
.
■
To activate your configuration now, on the toolbar, click
Activate
.
6
When prompted to save your changes, click
Yes
.
Related information
None.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...