
639
Field descriptions
Policy field descriptions
Antispam Configuration tab
–
Blacklisted Senders to Allow dialog box
If you use the real-time blacklists feature, you might find that a mail server or the relay that is making
the connection has been incorrectly identified by the blacklist operators as a source of spam. The
security gateway lets you create a custom list of mail transfer agent IP addresses that are permitted to
bypass the real-time blacklist processing.
Associated tasks
The task that you can perform with this dialog box is:
■
“Reducing false positives by bypassing the real-time blacklists”
POP3
Indicates response to heuristic scanning.
■
Prepend to the mail subject
The default text is [Spam]. When no text is typed in the box, the subject line is
not modified.
■
No response
The default value is Prepend to the mail subject.
Email senders identified as
spam (SMTP only)
Indicates an additional response when email senders are identified as spam.
■
Block the mail message
■
No response
The default value is Block the mail message.
Subject patterns identified
as spam (SMTP only)
Indicates and additional response when subject patterns are identified as spam.
■
Block the mail message
■
No response
The default value is Block the mail message.
Table D-79
Antispam Configuration tab—Blacklisted Senders to Allow dialog box
Field
Description
IP address
Specifies the IP address of an email sender that should not be checked against real-time
blacklists.
You can specify up to 500 IP addresses. Each address must be entered individually.
Table D-78
Antispam—Response tab (Continued)
Field
Description
Содержание Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Страница 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Страница 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Страница 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Страница 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Страница 319: ...318 Controlling traffic at the security gateway Blocking inappropriate content with content filtering...
Страница 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Страница 409: ...408 Providing remote access using VPN tunnels Multicast traffic through gateway to gateway IPsec tunnels...
Страница 509: ...508 Generating reports Upgrade reports...
Страница 553: ...552 Advanced system settings Configuring advanced options...
Страница 557: ...556 SSL server certificate management Installing a signed certificate...
Страница 861: ...860 Index...