Chapter 38 Anti-Spam
ZyWALL USG 300 User’s Guide
684
Black List
Configure black list entries to identify spam. The black list entries have the
ZyWALL classify any e-mail that is from or forwarded by a specified IP address or
uses a specified header field and header value as being spam. If an e-mail does
not match any of the white list entries, the ZyWALL checks it against the black list
entries. The ZyWALL classifies an e-mail that matches a black list entry as spam
and immediately takes the configured action for dealing with spam. If an e-mail
matches a blacklist entry, the ZyWALL does not perform any more anti-spam
checking on that individual e-mail. A properly configured black list helps catch
spam e-mail and increases the ZyWALL’s anti-spam speed and efficiency.
SMTP and POP3
Simple Mail Transfer Protocol (SMTP) is the Internet’s message transport
standard. It controls the sending of e-mail messages between servers. E-mail
clients (also called e-mail applications) then use mail server protocols such as POP
(Post Office Protocol) or IMAP (Internet Message Access Protocol) to retrieve e-
mail. E-mail clients also generally use SMTP to send messages to a mail server.
The older POP2 requires SMTP for sending messages while the newer POP3 can be
used with or without it. This is why many e-mail applications require you to specify
both the SMTP server and the POP or IMAP server (even though they may actually
be the same server).
The ZyWALL’s anti-spam feature checks SMTP (TCP port 25) and POP3 (TCP port
110) e-mails. The anti-spam feature does not check (or act upon) e-mails that use
other protocols (such as IMAP) or other port numbers.
E-mail Headers
Every email has a header and a body. The header is structured into fields and
includes the addresses of the recipient and sender, the subject, and other
information about the e-mail and its journey. The body is the actual message text
and any attachments. You can have the ZyWALL check for specific header fields
with specific values.
E-mail programs usually only show you the To:, From:, Subject:, and Date:
header fields but there are others such as Received: and Content-Type:. To see all
of an e-mail’s header, you can select an e-mail in your e-mail program and look at
its properties or details. For example, in Microsoft’s Outlook Express, select a mail
and click
File > Properties > Details
. This displays the e-mail’s header. Click
Message Source
to see the source for the entire mail including both the header
and the body.
Summary of Contents for Unified Security Gateway ZyWALL 300
Page 2: ......
Page 30: ...Table of Contents ZyWALL USG 300 User s Guide 30 ...
Page 31: ...31 PART I User s Guide ...
Page 32: ...32 ...
Page 38: ...Chapter 1 Introducing the ZyWALL ZyWALL USG 300 User s Guide 38 ...
Page 46: ...Chapter 2 Features and Applications ZyWALL USG 300 User s Guide 46 ...
Page 64: ...Chapter 3 Web Configurator ZyWALL USG 300 User s Guide 64 ...
Page 74: ...Chapter 4 Installation Setup Wizard ZyWALL USG 300 User s Guide 74 ...
Page 116: ...Chapter 6 Configuration Basics ZyWALL USG 300 User s Guide 116 ...
Page 184: ...Chapter 7 Tutorials ZyWALL USG 300 User s Guide 184 ...
Page 221: ...221 PART II Technical Reference ...
Page 222: ...222 ...
Page 288: ...Chapter 11 Registration ZyWALL USG 300 User s Guide 288 ...
Page 378: ...Chapter 14 Trunks ZyWALL USG 300 User s Guide 378 ...
Page 394: ...Chapter 15 Policy and Static Routes ZyWALL USG 300 User s Guide 394 ...
Page 408: ...Chapter 16 Routing Protocols ZyWALL USG 300 User s Guide 408 ...
Page 428: ...Chapter 19 NAT ZyWALL USG 300 User s Guide 428 ...
Page 454: ...Chapter 23 Authentication Policy ZyWALL USG 300 User s Guide 454 ...
Page 472: ...Chapter 24 Firewall ZyWALL USG 300 User s Guide 472 ...
Page 534: ...Chapter 27 SSL User Screens ZyWALL USG 300 User s Guide 534 ...
Page 536: ...Chapter 28 SSL User Application Screens ZyWALL USG 300 User s Guide 536 ...
Page 544: ...Chapter 29 SSL User File Sharing ZyWALL USG 300 User s Guide 544 ...
Page 638: ...Chapter 35 ADP ZyWALL USG 300 User s Guide 638 Figure 448 Profiles Protocol Anomaly ...
Page 682: ...Chapter 37 Content Filter Reports ZyWALL USG 300 User s Guide 682 ...
Page 700: ...Chapter 38 Anti Spam ZyWALL USG 300 User s Guide 700 ...
Page 722: ...Chapter 39 Device HA ZyWALL USG 300 User s Guide 722 ...
Page 738: ...Chapter 40 User Group ZyWALL USG 300 User s Guide 738 ...
Page 744: ...Chapter 41 Addresses ZyWALL USG 300 User s Guide 744 ...
Page 756: ...Chapter 43 Schedules ZyWALL USG 300 User s Guide 756 ...
Page 772: ...Chapter 45 Authentication Method ZyWALL USG 300 User s Guide 772 ...
Page 794: ...Chapter 46 Certificates ZyWALL USG 300 User s Guide 794 ...
Page 806: ...Chapter 48 SSL Application ZyWALL USG 300 User s Guide 806 ...
Page 811: ...Chapter 49 Endpoint Security ZyWALL USG 300 User s Guide 811 ...
Page 866: ...Chapter 50 System ZyWALL USG 300 User s Guide 866 ...
Page 873: ...Chapter 51 Log and Report ZyWALL USG 300 User s Guide 873 ...
Page 886: ...Chapter 51 Log and Report ZyWALL USG 300 User s Guide 886 ...
Page 916: ...Chapter 54 Packet Flow Explore ZyWALL USG 300 User s Guide 916 ...
Page 918: ...Chapter 55 Reboot ZyWALL USG 300 User s Guide 918 ...
Page 920: ...Chapter 56 Shutdown ZyWALL USG 300 User s Guide 920 ...
Page 948: ...Chapter 58 Product Specifications ZyWALL USG 300 User s Guide 948 ...
Page 1014: ...Appendix A Log Descriptions ZyWALL USG 300 User s Guide 1014 ...
Page 1124: ...Appendix F Open Software Announcements ZyWALL USG 300 User s Guide 1124 ...