597
Field descriptions
Policy field descriptions
Related information
For further information related to this topic, see the following:
■
“Responding to virus detections”
■
“Avoiding potential session time-out errors”
Rule Properties—Antispam tab
You can enable antispam scanning at the gateway to prevent unwanted email from reaching the mail
server through the SMTP and POP3 protocols. Antispam processing saves network and server
resources. By reducing the number of unwanted interruptions, it also improves individual
productivity.
You can only use this tab if the service group used by the rule contains the SMTP or POP3 protocol.
FTP
Indicates whether antivirus scanning is applied to FTP traffic that is controlled by this rule.
This option is only available if the service group used in the rule includes the FTP protocol.
This option is unchecked by default.
If you enable antivirus scanning, you can select any of the following options:
■
Replace deleted files with message file
Replaces an infected attachment in an HTTP container file (for example, a zip file) with
a text file when the infected attachment is deleted.
The text file that is inserted is called deleted%.txt, where % is a sequence number. For
example, if two attachments are deleted, the replacement files are called deleted1.txt
and deleted2.txt.
This option is checked by default.
■
Data comforting
Provides users a quicker download response.
Note that when you enable data comforting, it is possible for a virus-infected file to get
through the security gateway.
This option is unchecked by default.
■
Allow files to be partially downloaded without Antivirus scanning
Lets FTP request a partial file transfer without antivirus scanning.
The antivirus engine cannot scan partially downloaded files because it is unable to
determine the file type for scanning.
This option is unchecked by default.
Table D-29
Rule Properties—Antivirus tab (Continued)
Field
Description
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...