42 Configuring system settings
Configuring Control Center settings
3
Delete the host control access items from the database.
truncate settings_host_access_control
;
About specifying host names for Control Center access
When specifying host names for Control Center access, the Control Center
allows clients to connect based on the Control Center’s own DNS perspective. If
the client’s IP address resolves into a name that is allowed (a “reverse lookup”),
then it’s a match and the client is allowed to access the Control Center. The
reverse lookup of an IP address is controlled by the owner of a netblock, not
necessarily a user of that netblock, so users often have no control over what
name their IP addresses resolve to. Also, two different DNS servers may each
have mappings for the same netblock that are not the same. For example, the
client’s authoritative DNS server has a reverse lookup record of
m1.example.com for the client’s IP address, while the DNS that is configured to
be the Control Center’s primary DNS server has a reverse mapping of
dhcp23.example.com for the same IP address. In this case, the Control Center
will see the dhcp23.example.com name whenever the client connects, so that is
the name that should be entered into the host access control list in the Control
Center. This situation happens more frequently on private networks than on the
public Internet.
Control Center certificate
Through the Control Center, you can designate a user interface HTTPS
certificate. This enhances the security for the Control Center and those logging
into it.
To designate a Control Center certificate
1
In the Control Center, click
Settings
>
Control Center
.
2
Through the
User interface HTTPS certificate
dropdown list, select the
desired choice.
3
Click
Save
to store the current settings.
Configuring, enabling and scheduling Scanner replication
In the Control Center, replication refers to the process by which LDAP data are
propagated from the Control Center to attached and enabled Scanners.
Replication is controlled by global settings in the Control Center and by locally
configurable settings on each Scanner. The following information will assist you
in configuring and scheduling replication. However, no replication can occur
until you have defined one or more LDAP servers to the Control Center and one
Содержание Mail Security
Страница 1: ...Symantec Mail Security for SMTP Administration Guide ...
Страница 16: ...16 About Symantec Mail Security for SMTP Where to get more information ...
Страница 60: ...60 Configuring email settings Configuring scanning settings ...
Страница 116: ...116 Configuring email filtering Managing policy resources ...
Страница 142: ...142 Working with Spam Quarantine Configuring Spam Quarantine ...
Страница 150: ...150 Working with Suspect Virus Quarantine Configuring Suspect Virus Quarantine ...
Страница 162: ...162 Configuring alerts and logs Configuring logs ...
Страница 208: ...208 Feature Cross Reference About email filtering and message handling options ...