Fortinet FortiGate FortiGate-1000A Administration Manual page 243

Fortinet fortigate fortigate-1000a: user guide
Hide thumbs Also See for FortiGate FortiGate-1000A:
Table of Contents

Advertisement

Firewall
FortiGate-1000A/FA2 Administration Guide
Spam Action
Append to
Append with
Note: Some popular email clients cannot filter messages based on the MIME header. Check
your email client features before deciding how to tag spam.
Configuring IPS options
Figure 117:Protection profile IPS options
The following options are available for IPS through the protection profile. See
page 293
for more IPS configuration options.
IPS Signature
IPS Anomaly
Configuring content archive options
Figure 118:Protection profile content archive options
01-28011-0254-20051115
The action for the spam filter to take. Tagged allows you to append
a custom tag to the subject or header of email identified as spam.
For SMTP, if you have virus scan or streaming mode (splice, which
is enabled from the CLI) enabled, you will only be able to discard
spam email. (Note that streaming mode is enabled automatically
when you enable virus scanning and streaming mode is always
enabled for SMTP email in the US Domestic distribution) Discard
immediately drops the connection. Without splice or scanning
enabled, you can chose to tag or discard SMTP spam.
You can tag email by adding a custom word or phrase to the subject
or inserting a MIME header and value into the email header. You
can choose to log any spam action in the event log.
In the US Domestic distribution, spam filter email tagging is not
supported. Because SMTP virus scanning operates in streaming
mode the FortiGate unit discards spam email and immediately
drops the connection.
Choose to append the tag to the subject or MIME header of the
email identified as spam.
Enter a word or phrase (tag) to append to email identified as spam.
The maximum length is 63 characters.
Enable or disable signature based intrusion detection and
prevention for all protocols.
Enable or disable anomaly based intrusion detection and
prevention for all protocols.
Protection profile
"IPS" on
243

Advertisement

Table of Contents
loading

Table of Contents