231
Defining your security environment
Controlling full application inspection of traffic
4
Optionally, on the Description tab, type a more detailed description than you typed in the Caption
text box.
5
Click
OK
.
6
Optionally, do one of the following:
■
To save your configuration now and activate later, on the toolbar, click
Save
.
■
To activate your configuration now, on the toolbar, click
Activate
.
When prompted to save your changes, click
Yes
.
Related information
For further information related to this topic, see the following:
■
“Proxy Properties: SMTP—General tab”
■
“Proxy Properties: POP3—General tab”
■
Configuring additional email features
The security gateway’s ability to handle and process both inbound and outbound email can be modified
to suit your specific needs. This section presents an overview of the additional email capabilities the
security gateway supports, and the specific steps needed to configure those capabilities.
With the security gateway’s email capabilities, you can perform the following tasks:
■
“Modifying the timeout period to keep inactive POP3 connections open”
■
“Modifying the timeout period to keep inactive SMTP connections open”
■
■
“Disabling SMTP flow control checks”
■
“Creating trace files of SMTP connections”
■
“Setting the SMTP proxy to debug mode for more verbose error reporting”
■
“Configuring an external server to relay email”
■
“Enabling On-demand mail relay (ODMR)”
Destination
Do one of the following:
■
If you are configuring this rule for outbound SMTP email, select the network to which
email is allowed. This may be a defined subnet or, more commonly, the Universe
entity.
■
If you are configuring this rule for inbound SMTP email, select the network to which
email is allowed.
■
If you are configuring this rule for inbound POP3 email, select the subnet network
entity representing your internal network to which email is allowed.
Leaving through
Select the connection point through which traffic leaves the security gateway. For SMTP
traffic, this is most likely the outside interface. For POP3 traffic, this is most likely the
inside interface.
Service group
Select the service group containing the smtp and pop3 protocols.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...