•
Email Notify Scan-Error Sender (IMAP, POP3, SMTP only): Notifies an e-mail sender
if the e-mail was dropped due to a scan error.
•
Email Notify Scan-Error Recipient (IMAP, POP3, SMTP only): Notifies an e-mail
recipient if the e-mail was passed due to a scan error.
Configuring Extension Lists
You can configure AV profiles to scan (or not scan) files based on their file extension.
File extension include lists and exclude lists are the same kind of lists. They become
include or exclude lists depending on how they are added to a profile.
To create a file extension list object, select
Object Manager > UTM >ScreenOS >AV
Objects > Internal > Extension lists
. Click
Add
.
Populate the following fields in the New Internal Antivirus Ext List dialog:
•
Name: Give the extension list a descriptive name.
•
Color: Assign a color, if desired.
•
Comment: Provide a comment describing the list and its use.
•
File Extension: Enter a list of file extensions, separated by semicolons. Example:
html;htm;jpg.
Configuring ICAP AV Servers and Profiles
Before a security device can forward traffic to an ICAP AV server, you must create a server
object in NSM. You can create multiple server objects and assign some or all of them to
server groups. You can then assign this server object or server group to an AV profile, then
assign that profile to a security policy.
To specify a server, you will need the following information:
•
Name
: The name of the ICAP server as it will appear in the NSM GUI.
•
Host
: The IP address of the ICAP server.
•
Port
: The ICAP server port. (Default: 1143)
•
Enable
: If selected, indicates that the server should be reachable and usable by a
security device. Deselect this check box if the server is unavailable or should not be
used by a security device.
•
Probe URL
: The path on the ICAP AV server to probe for availability.
•
Probe Interval (in seconds and multiples of 5)
: Indicates how often the security device
should check to see that the server is in service and available to process traffic. If this
value is set to 0, then the security device will assume that the ICAP service is available
at all times. If it is set to a positive number of seconds, the security device will check
the server’s status at that interval. If the server returns as in-service, the security device
will send it traffic. If it returns as out-of-service, the security device will not send traffic.
•
Maximum Connections
: The maximum number of TCP connections between the
security device and the ICAP AV server.
Copyright © 2010, Juniper Networks, Inc.
376
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...