
14
C
HAPTER
1: 3C
OM
E
F
IREWALL
O
VERVIEW
Installation
For detailed information on installation, see the
Installation Guide
that
came with your 3Com Email Firewall.
Features
The following sections provide an overview of the main features of the
3Com Email Firewall.
Anti-Spam
The 3Com Email Firewall contains a variety of powerful features to
prevent spam messages, including the following:
■
Server-based tools such as DCC (Distributed Checksum
Clearinghouse), STA (Statistical Token Analysis), Objectionable
Content Filtering, and Pattern Based Message Filtering that prevent
spam messages from being delivered to an end user’s mailbox.
■
User-based tools for managing quarantined spam and building trusted
senders lists for whitelisting.
Anti-Virus Scanning
The 3Com Email Firewall provides a built-in virus scanning service.
When enabled, all messages (inbound and outbound) passing through
the 3Com Email Firewall are scanned for viruses.
Viruses can be selectively blocked depending on whether they are found
in inbound or outbound messages. Message attachments are recursively
disassembled to help ensure that viruses cannot be concealed.
Malformed Email
Checks
Many viruses try to elude virus scanners by concealing themselves in
malformed messages. The scan engines cannot detect the attachment
and pass the complete message through to an internal server.
Some mail clients try to rebuild malformed messages and may rebuild or
activate a virus-infected attachment. Other types of malformed messages
are designed to attack mail servers directly. These types of messages are
often used in denial-of-service (DoS) attacks.
The 3Com Email Firewall analyzes each message with very extensive
integrity checks. Malformed messages are quarantined if they cannot be
processed.
Содержание 3CR3MFA-92
Страница 8: ......
Страница 12: ...12 ABOUT THIS GUIDE ...
Страница 30: ...30 CHAPTER 2 CONFIGURING MAIL DELIVERY ...
Страница 46: ...46 CHAPTER 3 CONFIGURING MAIL SECURITY ...
Страница 98: ...98 CHAPTER 6 SYSTEM CONFIGURATION ...
Страница 114: ...114 CHAPTER 7 SYSTEM MANAGEMENT ...
Страница 144: ...144 APPENDIX C THIRD PARTY COPYRIGHT AND LICENSE AGREEMENTS ...