736
Field descriptions
Assets field descriptions
Parameters for SMTP—Recipient Domains tab
These parameters let you further customize the behavior of the SMTP protocol.
Associated tasks
None.
Parameters for SMTP—Description tab
Optionally, provides an extended description. This information is useful to help track changes or it can
be used as criteria for searches.
The maximum length is 20,000 alphanumeric characters.
ESMTP Enabled
Provides access to the Extended Simple Mail Transfer Protocol (ESMTP) as
defined in RFC 2821.
If you uncheck this option, the individual components of ESMTP—AUTH,
ATRN, ETRN, EXPN, VRFY—are disabled.
This option is checked by default.
AUTH Enabled
Lets clients send user name and password to authenticate with the server.
This option is checked by default.
ATRN Enabled
Allows an on-demand mail relay from the server to the client by turning the
existing connection around.
This option is checked by default.
ETRN Enabled
Lets clients access mail. In this case, the server is requested to initiate a
separate connection to the client as a mail relay from the server to the client.
This option is checked by default.
EXPN Enabled
Allows for the expansion of mailing lists.
This option is unchecked by default.
VRFY Enabled
Allows the verification of mail addresses.
This option is unchecked by default.
Caption
An optional, brief description of the modifiable parameters for the SMTP
protocol.
The maximum length is 128 characters.
For longer descriptions, use the Description tab.
Table D-217
Parameters for smtp—Recipient Domains tab
Field
Description
Recipient domains list
List of recipient domains.
Domain
Adds a recipient domain to the current list.
Table D-216
Parameters for smtp—General tab (Continued)
Field
Description
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...