HP Email Firewall Appliance Series Manual de usuario Pagina 1

Busca en linea o descarga Manual de usuario para Software HP Email Firewall Appliance Series. HP Email Firewall Appliance Series User's Manual Manual de usuario

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 154
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente

Indice de contenidos

Pagina 1 - User Guide

http://www.3com.com/Part No. DUA-MFA100-AAA01Published January 2005Email FirewallUser GuideUser Guide for the 3Com® Email Firewall

Pagina 2 - MA 01752-3064

10 ABOUT THIS GUIDEConventions Table 1 and Table 2 list conventions that are used throughout this guide.Table 1 Notice IconsIcon Notice Type Descrip

Pagina 3 - CONTENTS

100 CHAPTER 7: SYSTEM MANAGEMENTUtility Functions The Utility Functions section allows you to control mail services and run network and diagnostic uti

Pagina 4 - 4 ANTI-SPAM CONFIGURATION

Status and Utility101SMTP Probe The SMTP (Simple Mail Transport Protocol) Probe is used to test email connectivity with a remote SMTP server. This all

Pagina 5 - 6 SYSTEM CONFIGURATION

102 CHAPTER 7: SYSTEM MANAGEMENTThe response field will show the result of the SMTP diagnostic probe, including the response for each SMTP command sen

Pagina 6 - 7 SYSTEM MANAGEMENT

Status and Utility103Traceroute UtilityTraceroute is used to see the routing steps between two hosts. If you are losing connectivity somewhere in betw

Pagina 7 - A CUSTOMIZING SYSTEM MESSAGES

104 CHAPTER 7: SYSTEM MANAGEMENTCurrent Admin and Spam Quarantine UsersThe Current Admin and Spam Quarantine Users section displays who is logged in v

Pagina 8

Quarantine105Quarantine The Quarantine area contains messages that have been quarantined because of a virus, malformed message, illegal attachment, or

Pagina 9 - ABOUT THIS GUIDE

106 CHAPTER 7: SYSTEM MANAGEMENT Expire automatically — Enable this feature to expire messages automatically. Days — Enter how many days to keep a q

Pagina 10 - Contents

Backup and Restore107Backup and Restore The 3Com Email Firewall can backup all data, including the database, quarantined items, mail queues, mailboxes

Pagina 11 - Comments

108 CHAPTER 7: SYSTEM MANAGEMENTConfirm the listed options, and then click Create backup now to begin.The file (backup.gz) will be then be downloaded

Pagina 12 - 12 ABOUT THIS GUIDE

Backup and Restore109 Use PASV mode — PASV (Passive) mode may be required for some types of FTP servers. Choose this option if you are having problem

Pagina 13 - 3COM EMAIL FIREWALL OVERVIEW

Related Documentation11Related DocumentationIn addition to this guide, each 3Com Email Firewall documentation set includes the following: 3Com Email F

Pagina 14

110 CHAPTER 7: SYSTEM MANAGEMENTConfirm the listed options, and then click Create backup now to begin. Alternately, you can click Create scheduled bac

Pagina 15 - Features

Backup and Restore111Restores To perform a system restore, select the type of restore to perform (Local Disk or FTP) and click the Next >> butto

Pagina 16 - Administration

112 CHAPTER 7: SYSTEM MANAGEMENTRestore from FTPTo restore from FTP, enter the following required information to connect to your FTP server. Remote

Pagina 17 - Activity

Reboot and Shutdown113Reboot and ShutdownThe 3Com Email Firewall can be safely rebooted or shut down from the System Mgmt -> Reboot and Shutdown sc

Pagina 18

114 CHAPTER 7: SYSTEM MANAGEMENT

Pagina 19 - CONFIGURING MAIL DELIVERY

8MONITORING ACTIVITY AND STATUSThis chapter describes how to monitor the 3Com Email Firewall’s mail processing activity and system status, and include

Pagina 20

116 CHAPTER 8: MONITORING ACTIVITY AND STATUSMail Server Status The mail system status is shown in the top left window. Mail will either be running or

Pagina 21 - Mail Routing

Email Firewall Status117Email Firewall Status Select Status from the main menu to determine if all services and servers are functioning properly.For e

Pagina 22 - Message Part

118 CHAPTER 8: MONITORING ACTIVITY AND STATUSEnsure that the following services are running and the information displayed is correct.System Alarms Ind

Pagina 23 - Delivery Settings

Email Firewall Status119If there are issues with a certain service, click the service check icon beside the help button to perform a test of that part

Pagina 24

12 ABOUT THIS GUIDE

Pagina 25

120 CHAPTER 8: MONITORING ACTIVITY AND STATUSTroubleshooting Mail Delivery ProblemsWhen experiencing any mail delivery problems, the first step is to

Pagina 26

Troubleshooting Mail Delivery Problems121a period of time. You can view the Mail Transport logs to see the relevant messages that may indicate why you

Pagina 27 - Mail Mappings

122 CHAPTER 8: MONITORING ACTIVITY AND STATUSUtility FunctionsIn the System Mgmt -> Status and Utility screen, there are utilities that can be used

Pagina 28

Troubleshooting Content Issues123Troubleshooting Content IssuesIf the mail has been delivered to the 3Com Email Firewall successfully, it will undergo

Pagina 29 - Virtual Mappings

124 CHAPTER 8: MONITORING ACTIVITY AND STATUSClick on a specific message to see the details of its processing and final disposition.

Pagina 30

ACUSTOMIZING SYSTEM MESSAGESMessage variables can be used to customize the content of notification, annotation, and delivery messages. The 3Com Email

Pagina 31 - CONFIGURING MAIL SECURITY

126 APPENDIX A: CUSTOMIZING SYSTEM MESSAGES%HOSTNAME% Hostname entered on the Network Settings screenmail.example.com%POSTMASTER_MAIL_ADDR%Email addre

Pagina 32

BRESET TO FACTORY DEFAULT SETTINGS FROM CONSOLEIf you need to return the 3Com Email Firewall to its factory default settings, you should use the Syste

Pagina 33 - Anti-Virus

128 APPENDIX B: RESET TO FACTORY DEFAULT SETTINGS FROM CONSOLE8 You will need to reinstall and license the system using the Setup Wizard and License W

Pagina 34 - Attachment Types

CTHIRD PARTY COPYRIGHT AND LICENSE AGREEMENTSAPACHEApache LicenseVersion 2.0, January 2004http://www.apache.org/licenses/TERMS AND CONDITIONS FOR USE,

Pagina 35 - Attachment Control

13COM EMAIL FIREWALL OVERVIEWThis chapter provides an overview of the 3Com Email Firewall and its features, and includes the following topics: Deploy

Pagina 36 - Disable Content Scan

130 APPENDIX C: THIRD PARTY COPYRIGHT AND LICENSE AGREEMENTS"Contributor" shall mean Licensor and any individual or Legal Entity on behalf o

Pagina 37 - Mail Access/Mail Filtering

1319. Accepting Warranty or Additional Liability. While redistributing the Work or Derivative Works thereof, You may choose to offer, and charge a fee

Pagina 38

132 APPENDIX C: THIRD PARTY COPYRIGHT AND LICENSE AGREEMENTSDCCDistributed Checksum ClearinghouseCopyright (c) 2004 by Rhyolite SoftwarePermission to

Pagina 39 - Mail Access/Filtering

133FreeBSDCopyright 1994-2004 The FreeBSD Project. All rights reserved.Redistribution and use in source and binary forms, with or without modification

Pagina 40

134 APPENDIX C: THIRD PARTY COPYRIGHT AND LICENSE AGREEMENTSLegal Terms ===========Definitions --------------Throughout this license, the terms `pack

Pagina 41 - SMTP Security

1354. Contacts -----------There are two mailing lists related to FreeType:* [email protected] general use and applications of FreeType, a

Pagina 42

136 APPENDIX C: THIRD PARTY COPYRIGHT AND LICENSE AGREEMENTSJPEGThe authors make NO WARRANTY or representation, either express or implied, with respec

Pagina 43 - Enforce TLS

137ModSSLCopyright (c) 1998-2004 Ralf S. Engelschall. All rights reserved.Redistribution and use in source and binary forms, with or without modificat

Pagina 44

138 APPENDIX C: THIRD PARTY COPYRIGHT AND LICENSE AGREEMENTSNTPCopyright (c) David L. Mills 1992-2004Permission to use, copy, modify, and distribute t

Pagina 45 - for a full

139OpenSSHThe licences which components of this software fall under are as follows. First, we will summarize and say that all components are under a B

Pagina 46

14 CHAPTER 1: 3COM EMAIL FIREWALL OVERVIEWInstallation For detailed information on installation, see the Installation Guide that came with your 3Com E

Pagina 47 - ANTI-SPAM CONFIGURATION

140 APPENDIX C: THIRD PARTY COPYRIGHT AND LICENSE AGREEMENTS4) The Rijndael implementation by Vincent Rijmen, Antoon Bosselaers and Paulo Barreto is i

Pagina 48

1412. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentat

Pagina 49

142 APPENDIX C: THIRD PARTY COPYRIGHT AND LICENSE AGREEMENTSPAMRedistribution and use in source and binary forms of Linux-PAM, with or without modific

Pagina 50

143Info-ZIPCopyright (c) 1990-2003 Info-ZIP. All rights reserved.For the purposes of this copyright and license, "Info-ZIP" is defined as t

Pagina 51

144 APPENDIX C: THIRD PARTY COPYRIGHT AND LICENSE AGREEMENTS

Pagina 52

GLOSSARYAttachment Control A feature that allows you to block attachments based on their extension or MIME type.BCC Blind Carbon Copy. The copy of an

Pagina 53

146 GLOSSARYIP Internet Protocol. IP is a layer 3 network protocol that is the standard for sending data through a network. IP is part of the TCP/IP s

Pagina 54 - Message Filtering

147Quarantine A protected area for storing messages that contain viruses or are considered spam. Messages can be deleted from the quarantine or releas

Pagina 55

148 GLOSSARYTLS Transport Layer Security. A protocol for encrypting and providing data integrity over the Internet.Traceroute A utility used to verify

Pagina 56

AActivity 115Admin Account 86lost password 127Administrator Privileges 67, 87Advanced Anti-Spam Options 69AnnotationsDelivery Settings 24A

Pagina 57

Features15Attachment Control Attachment filtering can be used to control a wide range of problems originating from the use of attachments, such as vir

Pagina 58 - Valid, Accept)

Distributed Checksum Clearinghouse (DCC) 49DNS 89, 103DNS Server status 118Domain 89Double Bounce 26EEmail backup 106, 109Email History

Pagina 59 - Preferences

Local Disk backup 107Local users 86Login failure 81Lost admin password 127MMail Access 37, 70Mail Configuration 85Mail Filtering 37, 70M

Pagina 60

BCC Action 60Preferences 59priority 58Ping 102, 122QQuarantine 105Queue ID 79Queue Sizes 81RRaw Mail Body 57RBL (Realtime Blackhole Li

Pagina 61 - Content Filtering

Tokens 57Training 54Status 117Status and Utility 99Strip Received Headers 23Swap usage 81Syslog 78, 89System History 80System Logs 7

Pagina 62

3COM CORPORATION LIMITED WARRANTYThis warranty applies to customers located in the United States, Australia, Canada (except Quebec), Ireland, New Zeal

Pagina 63 - for details

16 CHAPTER 1: 3COM EMAIL FIREWALL OVERVIEWSystem AdministrationThe 3Com Email Firewall is administered via a web browser. The following web browsers

Pagina 64 - Redirect To

System Administration17Main Menu The main menu provides quick access to the 3Com Email Firewall’s configuration and management options.The menu is div

Pagina 65 - Spam Quarantine

18 CHAPTER 1: 3COM EMAIL FIREWALL OVERVIEW Reporting — This menu allows you to view and configure the reporting and system log features of the 3Com E

Pagina 66 - Interface

2CONFIGURING MAIL DELIVERYThis chapter describes how to configure your 3Com Email Firewall to accept and deliver mail, and includes the following topi

Pagina 67 - Trusted Senders List

3Com Corporation 350 Campus Drive Marlborough, MA 01752-3064Copyright © 2000-2005, BorderWare Technologies Inc. Used under license by 3Com Corporatio

Pagina 68

20 CHAPTER 2: CONFIGURING MAIL DELIVERY Route-to — Enter the address for the mail server to which mail will be delivered. This is your local mail ser

Pagina 69 - Advanced Anti-Spam

Mail Routing21Additional Mail Route RulesWhen adding an additional mail route for a local email server, you must add a Specific Access Pattern and a P

Pagina 70

22 CHAPTER 2: CONFIGURING MAIL DELIVERY4 Select Client Access5 Select Trust for the action if the pattern matches, and click OK.Adding a Pattern Based

Pagina 71 - REPORTING

Delivery Settings23Delivery Settings You can customize various delivery settings that affect how you accept and deliver mail messages.Select Mail Deli

Pagina 72 - 72 CHAPTER 5: REPORTING

24 CHAPTER 2: CONFIGURING MAIL DELIVERYchecked against the Mail Routing table, and if the destination is not specified the email will be sent to the D

Pagina 73 - Generating Reports

Delivery Settings25Advanced Delivery SettingsClick the Advanced button to reveal options for advanced SMTP (Simple Mail Transport Protocol) settings a

Pagina 74 - HAPTER 5: REPORTING

26 CHAPTER 2: CONFIGURING MAIL DELIVERYdouble bounce message with a copy of the entire single bounce message. Delay — Inform the postmaster of delaye

Pagina 75

Mail Mappings27Click Add to add a new mapping to your list. External mail address — Enter the external mail address that you want to be converted to

Pagina 76

28 CHAPTER 2: CONFIGURING MAIL DELIVERYVirtual Mappings Virtual Mappings are used to redirect mail addressed for one domain to a different domain. Thi

Pagina 77 - System Logs

Virtual Mappings29Uploading Virtual Mapping ListA list of virtual mappings can also be uploaded in one text file. The file must contain comma or tab s

Pagina 78 - 78 CHAPTER 5: REPORTING

CONTENTSABOUT THIS GUIDEConventions 10Related Documentation 11Documentation Comments 111 3COM EMAIL FIREWALL OVERVIEWDeployment and Instal

Pagina 79 - Email History

30 CHAPTER 2: CONFIGURING MAIL DELIVERY

Pagina 80 - Table 4 System Events

3CONFIGURING MAIL SECURITYThis chapter describes how to configure mail security settings on your 3Com Email Firewall, and includes the following topic

Pagina 81 - System History

32 CHAPTER 3: CONFIGURING MAIL SECURITYSelect Mail Delivery -> Anti-Virus from the menu to enable and configure virus scanning. Enable virus scann

Pagina 82 - Configure History

Anti-Virus33Notifications Notifications for inbound and outbound messages can be enabled for all recipients, the sender, and the administrator. Custom

Pagina 83 - SYSTEM CONFIGURATION

34 CHAPTER 3: CONFIGURING MAIL SECURITYAttachment Control Attachment filtering can be used to control a wide range of problems originating from the us

Pagina 84

Attachment Control35Notifications Notifications for inbound and outbound messages can be enabled for all recipients, the sender, and the administrato

Pagina 85 - Setup Wizard

36 CHAPTER 3: CONFIGURING MAIL SECURITYEditing Attachment TypesClick the Edit button to edit your attachment types. You can add file extensions (.mp3)

Pagina 86

Mail Access/Filtering37Mail Access/Filtering The 3Com Email Firewall provides a number of filtering options to ensure that specific mail messages are

Pagina 87 - Administrator Privileges

38 CHAPTER 3: CONFIGURING MAIL SECURITYSpecific Access Patterns Click the Add Pattern button to add a new specific access pattern. Pattern — Enter a

Pagina 88

Mail Access/Filtering39Pattern Based Message FilteringPattern Based Message Filtering is the primary tool for whitelisting and blacklisting messages.

Pagina 89 - Network Settings The

Virtual Mappings 28Uploading Virtual Mapping List 293 CONFIGURING MAIL SECURITYAnti-Virus 31Notifications 33Pattern Files 33Attach

Pagina 90 - Auto select

40 CHAPTER 3: CONFIGURING MAIL SECURITYSMTP Authenticated RelayThis feature allows authenticated clients to use the 3Com Email Firewall as an external

Pagina 91 - Web Proxy

SMTP Security41SMTP Security The 3Com Email Firewall offers a simple mechanism for encrypting mail delivery via SSL (Secure Sockets Layer) and TLS (Tr

Pagina 92

42 CHAPTER 3: CONFIGURING MAIL SECURITYSelect Mail Delivery -> SMTP Security from the menu to enable and configure email encryption.Incoming Mail

Pagina 93 - Degraded

SMTP Security43Specific Site PolicyThis option supports the specification of exceptions to the default settings for SSL/TLS. For example, you may need

Pagina 94 - New License Key

44 CHAPTER 3: CONFIGURING MAIL SECURITYMalformed Email Many viruses try to elude virus scanners by concealing themselves in malformed messages. The sc

Pagina 95 - SSL Certificates

Malformed Email45 Actions — Select an action to be performed. Options include: Just log: Log the event and take no further action. Reject mail: The

Pagina 96

46 CHAPTER 3: CONFIGURING MAIL SECURITY

Pagina 97 - Software Updates

4ANTI-SPAM CONFIGURATIONThis chapter describes how to configure the Anti-Spam features of your 3Com Email Firewall, and includes the following topics:

Pagina 98

48 CHAPTER 4: ANTI-SPAM CONFIGURATIONSelect Mail Delivery -> Anti-Spam from the menu to configure the 3Com Email Firewall’s Anti-Spam features.The

Pagina 99 - SYSTEM MANAGEMENT

DCC49DCC DCC (Distributed Checksum Clearinghouse) is a tool used to identify bulk mail and is based on a number of servers that maintain databases of

Pagina 100 - Utility Functions

59Objectionable Content Filtering 61Actions 61Notifications 62Upload and Download Filter List 62Trusted Senders List 62Adding

Pagina 101 - Status and Utility

50 CHAPTER 4: ANTI-SPAM CONFIGURATION Redirect to: The message will be delivered to the mail address specified in Action Data. Reject mail: The mail

Pagina 102 - HAPTER 7: SYSTEM MANAGEMENT

STA51 Mail identified as "bulk" by DCC is also analyzed to provide an example of local spam.Select STA from the Mail Delivery -> Anti-Sp

Pagina 103

52 CHAPTER 4: ANTI-SPAM CONFIGURATIONSpam Action Specify an action when STA flags a message as spam. Action — The action can be one of the following:

Pagina 104 - Mail Queues

STA53 Redirect to: The message will be delivered to the mail address specified in Action Data. Reject mail: The mail will not be accepted and the co

Pagina 105 - Quarantine The

54 CHAPTER 4: ANTI-SPAM CONFIGURATIONSTA Training The STA training section displays statistics of all mail analyzed by the 3Com Email Firewall. Click

Pagina 106 - Daily Tasks The

Pattern Based Message Filtering55Some default PBMF rules are provided and more can be added by clicking the Add button.Message Part Select a Message P

Pagina 107 - Daily Tasks

56 CHAPTER 4: ANTI-SPAM CONFIGURATIONMessage Envelope ParametersThese parameters will not be visible to the user. They are the “handshake” part of the

Pagina 108

Pattern Based Message Filtering57Message Header ParametersSpammers will typically enter false information into these fields and, except for the Subjec

Pagina 109 - Backup and Restore

58 CHAPTER 4: ANTI-SPAM CONFIGURATIONMatch Option The match option looks for the specified text in each line. You can specify one of the following: C

Pagina 110

Pattern Based Message Filtering59 Do Not Train — Do not use the message for STA training purposes. This option will not override other PBMF’s if it a

Pagina 111

Time Zone 84Network Configuration 85Mail Configuration 85Admin Account 86System Users 86Creating an Admin User 87Upload and Do

Pagina 112

60 CHAPTER 4: ANTI-SPAM CONFIGURATION Modify Subject Header: The text specified in Action Data will be inserted into the message subject line. Add h

Pagina 113 - Settings

Objectionable Content Filtering61Objectionable Content FilteringThe Objectionable Content Filter defines a list of key words that will cause a message

Pagina 114

62 CHAPTER 4: ANTI-SPAM CONFIGURATIONNotifications Notifications for inbound and outbound messages can be enabled for all recipients, the sender, and

Pagina 115 - ONITORING ACTIVITY AND STATUS

Trusted Senders List63 Maximum number of entries per user — Enter a maximum number of list entries for each user.Adding Trusted Senders When the Trus

Pagina 116

64 CHAPTER 4: ANTI-SPAM CONFIGURATIONSpam Quarantine The Spam Quarantine contains quarantined mail messages for each local user on the 3Com Email Fire

Pagina 117 - Email Firewall Status

Spam Quarantine65User Notification Enable Summary Email — Select the check box to enable a summary email notification that alerts users to mail that

Pagina 118

66 CHAPTER 4: ANTI-SPAM CONFIGURATIONEnabling User Access on a Network InterfaceYou must enable User Access on the network interface to allow users to

Pagina 119

Quarantine and Trusted Senders List Users67Quarantine and Trusted Senders List UsersYou must add local users to the 3Com Email Firewall if you require

Pagina 120 - Delivery Problems

68 CHAPTER 4: ANTI-SPAM CONFIGURATIONUpload and Download User ListsYou can upload lists of users using comma or tab separated text files. You can spe

Pagina 121 - 6D3872B1D8

Advanced Anti-Spam Options69Advanced Anti-Spam OptionsClick the Advanced button to reveal the following advanced Anti-Spam options.RBL (Realtime Black

Pagina 122

8 MONITORING ACTIVITY AND STATUSMonitoring Mail Processing Activity 115Mail Server Status 116Mail Queue (Mail Q) 116Mail Queue Statistics

Pagina 123 - Content Issues

70 CHAPTER 4: ANTI-SPAM CONFIGURATION Add header: An "X-" mail header will be added as specified in the Action Data. Redirect to: The mess

Pagina 124

5REPORTINGThis chapter describes the reporting features of the 3Com Email Firewall, and includes the following topics: Generating Reports System Log

Pagina 125 - CUSTOMIZING SYSTEM MESSAGES

72 CHAPTER 5: REPORTINGAdministrators can specify which data is to be included in each report, how it is to be displayed, the order of data, and the n

Pagina 126

Generating Reports73 Paper Size — For PDF format, select the paper size such as Letter, A4, or Legal. Describe fields in report — Select this option

Pagina 127 - SETTINGS FROM CONSOLE

74 CHAPTER 5: REPORTINGReport Fields The Fields section allows you to choose which fields or items of information you wish to include in the report. Y

Pagina 128 - Installation Guide

Generating Reports75Blocking pie chart A pie chart of the same data as the right hand column of Traffic Blocking (timespan).Total traffic Received Gra

Pagina 129 - LICENSE AGREEMENTS

76 CHAPTER 5: REPORTINGTop senders The top sender (judged by Envelope from, not Header from) during the report timespan, sorted by number of messages.

Pagina 130

System Logs77System Logs The system logs provide detailed information on all mail transport and system related events.Select Reporting -> System Lo

Pagina 131 - Cyrus-SASL

78 CHAPTER 5: REPORTINGViewing Log Details Select a specific log to view, search, and download its detailed entry information.Configuring a Syslog Ser

Pagina 132

Email History79Email History Every message that passes through the 3Com Email Firewall generates a database entry that records information about how i

Pagina 134

80 CHAPTER 5: REPORTINGSystem History The system history is a record of system events, such as login failures, and disk space and CPU usage.Select Rep

Pagina 135 - GD Graphics Library

System History81DCC Preferred The round trip time to preferred DCC serverName of preferred serverDisk IO MB per second transfer, KB per transfer, tran

Pagina 136

82 CHAPTER 5: REPORTINGConfigure History SettingsIn the Configure Reporting History Size screen, you can configure how many emails and system events t

Pagina 137

6SYSTEM CONFIGURATIONThis chapter describes how to view and modify the system configuration of the 3Com Email Firewall, and includes the following top

Pagina 138 - OpenLDAP

84 CHAPTER 6: SYSTEM CONFIGURATIONSelect System Config -> Setup Wizard from the menu to start the Setup Wizard.Click Finish at any time to exit the

Pagina 139

Setup Wizard85Network Configuration Modify your network settings if required, and click Apply if you have made any changes. If you do not want to modi

Pagina 140

86 CHAPTER 6: SYSTEM CONFIGURATIONAdmin Account Select System Config -> Admin Account from the menu to modify the administrator account settings.Yo

Pagina 141

System Users87Click the Add a New User button to add a new user to the system.Enter a User ID and a Password.Creating an Admin User If this user will

Pagina 142

88 CHAPTER 6: SYSTEM CONFIGURATIONUpload and Download User ListsYou can upload lists of users using comma or tab separated text files. You can specify

Pagina 143 - Info-ZIP

Network Settings89Network Settings The Network Settings screen allows you to modify your network settings such as the Hostname, Domain name, IP addres

Pagina 144

ABOUT THIS GUIDEThe instructions in this guide are designed to help you with configuration and system administration tasks for the 3Com® Email Firewal

Pagina 145 - GLOSSARY

90 CHAPTER 6: SYSTEM CONFIGURATIONNetwork Interfaces In the Network Interfaces section, you can modify your network interface information such as the

Pagina 146 - 146 GLOSSARY

Web Proxy91Web Proxy A secure proxy server may be used to cache and proxy requests to systems external to your network, such as an HTTP web proxy serv

Pagina 147

92 CHAPTER 6: SYSTEM CONFIGURATIONStatic Routes Static routes are required if the mail servers to which mail must be relayed are located on another ne

Pagina 148 - 148 GLOSSARY

Licensing93Licensing Your 3Com Email Firewall must be licensed before it can process mail. The Licensing screen allows you to view your current licen

Pagina 149

94 CHAPTER 6: SYSTEM CONFIGURATIONLicense Agreements Click the specified button to view the license agreements for the 3Com Email Firewall, the Anti-V

Pagina 150

SSL Certificates95To install a commercial certificate:1 Select System Config -> SSL Certificates from the menu to view and manage your certificates

Pagina 151

96 CHAPTER 6: SYSTEM CONFIGURATIONSoftware Updates It is important to keep your 3Com Email Firewall software updated with the latest patches and upgra

Pagina 152

Software Updates97When the system restarts, the update will appear in the Installed Updates section.Before applying any update, backup your system con

Pagina 153

98 CHAPTER 6: SYSTEM CONFIGURATION

Pagina 154 - REGULATORY INFORMATION

7SYSTEM MANAGEMENTThis chapter describes how to use the system management features of the 3Com Email Firewall, and includes the following topics: Sta

Comentarios a estos manuales

Sin comentarios