Chapter 6 Device Security Settings
Vantage CNM User’s Guide
144
From, To
Select the directions of travel of packets that you want to check. Select or
clear a row or column’s first check box (with the interface label) to select or
clear the interface’s whole row or column.
For example,
From
LAN To LAN
means packets traveling from a computer
on one LAN subnet to a computer on another LAN subnet on the LAN
interface of the device or the device itself. The device does not check
packets traveling from a LAN computer to another LAN computer on the
same subnet.
From VPN
means traffic that came into the device through a VPN tunnel and
is going to the selected “to” interface. For example,
From VPN To LAN
specifies the VPN traffic that is going to the LAN or terminating at the
device’s LAN interface. The device checks the traffic after decrypting it.
To VPN
is traffic that comes in through the selected “from” interface and
goes out through any VPN tunnel. For example,
From LAN To VPN
specifies the traffic that is coming from the LAN and going out through a VPN
tunnel. The device checks the traffic before encrypting it.
From VPN To VPN
means traffic that comes in through a VPN tunnel and
goes out through (another) VPN tunnel or terminates at the device. This is
the case when the device is the hub in a hub-and-spoke VPN. This is also
the case if you allow someone to use a service (like Telnet or HTTP) through
a VPN tunnel to manage the device. The device checks the traffic after
decrypting it (before encrypting it again).
Note: The VPN connection directions apply to the traffic going
to or from the device’s VPN tunnels. They do not apply
to other VPN traffic for which the device is not one of the
gateways (VPN pass-through traffic).
Action for Spam Mails
Use this section to set how the device is to handle spam mail.
X-Header
An X-Header is a line (preceded by "X-") in the SMTP mail header.
Enter an X-tag to insert into the X-header of mails that match a black list or
are identified as spam by the anti-spam external database. You can enter up
to 30 ASCII characters before the colon (:) and up to 47 ASCII characters
after the colon (:).
You can put any information as an X-tag or use "%status" and/or "%score".
For example, if you enter "Mail status: %status %score", you may see "Mail
status: SPAM 25" in the mail header. That means the mail is classified as
spam and the spam score is 25.
Phishing Tag
Enter a message or label (up to 16 ASCII characters) to add to the mail
subject of e-mails that the anti-spam external database classifies as
phishing.
Note: You must register for and enable the anti-spam external
database feature in order for the device to use this tag
(see the chapter on registration for details).
Spam Tag
Enter a message or label (up to 16 ASCII characters) to add to the mail
subject of e-mails that the device classifies as spam.
Forward SMTP & POP3
mail with tag in mail
subject
Select this radio button to have the device forward spam e-mail with the tag
that you define.
Even if you plan to use the discard option, you may want to use this initially
as a test to check how accurate your anti-spam settings are. Check the e-
mail the device forwards to you to make sure that unwanted e-mail is marked
as spam and legitimate e-mail is not marked as spam.
Table 55
Device Operation > Device Configuration > Security > Anti-Spam > General
LABEL
DESCRIPTION
Содержание Centralized Network Management Vantage CNM
Страница 1: ...www zyxel com Vantage CNM Centralized Network Management User s Guide Version 3 0 11 2007 Edition 1...
Страница 2: ......
Страница 24: ...Vantage CNM User s Guide 24...
Страница 30: ...Vantage CNM User s Guide 30...
Страница 33: ...33 PART I Introduction Introducing Vantage CNM 31 GUI Introduction 35...
Страница 34: ...34...
Страница 52: ...52...
Страница 58: ...Chapter 4 Device General Settings Vantage CNM User s Guide 58...
Страница 108: ...Chapter 5 Device Network Settings Vantage CNM User s Guide 108...
Страница 184: ...Chapter 6 Device Security Settings Vantage CNM User s Guide 184...
Страница 207: ...Chapter 7 Device Advanced Settings Vantage CNM User s Guide 207...
Страница 208: ...Chapter 7 Device Advanced Settings Vantage CNM User s Guide 208...
Страница 210: ...Chapter 8 Device Log Vantage CNM User s Guide 210...
Страница 234: ...Chapter 9 Device Configuration Management Vantage CNM User s Guide 234...
Страница 248: ...248...
Страница 264: ...Chapter 14 VPN Monitor Vantage CNM User s Guide 264...
Страница 265: ...265 PART IV Monitor Device Status Monitor 267 Device HA Status Monitor 269 Device Alarm 271...
Страница 266: ...266...
Страница 276: ...Chapter 17 Device Alarm Vantage CNM User s Guide 276...
Страница 277: ...277 PART V Log Report Device Operation Report 279 CNM Logs 291 VRPT 293...
Страница 278: ...278...
Страница 296: ...Chapter 20 VRPT Vantage CNM User s Guide 296...
Страница 298: ...298...
Страница 312: ...Chapter 21 CNM System Setting Vantage CNM User s Guide 312...
Страница 318: ...Chapter 24 Vantage CNM Software Upgrade Vantage CNM User s Guide 318...
Страница 322: ...Chapter 26 About Vantage CNM Vantage CNM User s Guide 322...
Страница 323: ...323 PART VII Account Management Group 325 Account 329...
Страница 324: ...324...
Страница 328: ...Chapter 27 Group Vantage CNM User s Guide 328...
Страница 332: ...Chapter 28 Account Vantage CNM User s Guide 332...
Страница 333: ...333 PART VIII Troubleshooting Troubleshooting 335...
Страница 334: ...334...
Страница 338: ...Chapter 29 Troubleshooting Vantage CNM User s Guide 338...
Страница 340: ...340...
Страница 378: ...Appendix E IP Address Assignment Conflicts Vantage CNM User s Guide 378...
Страница 382: ...Appendix F Common Services Vantage CNM User s Guide 382...
Страница 416: ...Appendix H Open Software Announcements Vantage CNM User s Guide 416...
Страница 424: ...Appendix J Customer Support Vantage CNM User s Guide 424...
Страница 428: ...Index Vantage CNM User s Guide 428...
Страница 429: ...Index Vantage CNM User s Guide 429...
Страница 430: ...Index Vantage CNM User s Guide 430...