Symantec 10547849 - Mail Security For SMTP Installation Manual page 36

Installation guide
Table of Contents

Advertisement

36
Installing Symantec Mail Security for SMTP
Setting up
You can choose to filter inbound mail, outbound mail, or both. If you
choose to filter inbound mail, you will see the Inbound Mail Filtering panel.
Proceed with step 2.
If you choose to filter outbound mail only, you will see the Outbound Mail
Filtering panel.
Proceed with
To specify outbound mail filtering settings
2
On the Inbound Mail Filtering panel, choose the IP address to use for inbound
mail.
You can use the Test button to ensure that the mail server responds.
The Test button scans the local network TCP table to see if an address/port
is in use; any address that is not listed in this table is assumed to be
unavailable.
3
If desired, change the port specification for inbound mail, and then click Next.
Be sure not to use a port already in use on your system.
4
On the Inbound Mail Filtering - Connections panel, specify the mail servers
from which this Scanner will accept inbound mail.
You can choose All IP addresses or specify IP addresses or hostnames. A
typical choice would be All IP addresses, thus allowing the Scanner to accept
mail from any MTA on the Internet.
If you specify one or more IP addresses, you must include the IP address of
the Control Center so that Spam Quarantine and Suspect Virus Quarantine
can release messages.
After you add the first entry, the IP address of the Control Center is added
automatically and selected. If you are using a different IP address for the
Control Center, or have the Control Center and Scanner installed on different
machines, you must add the new IP address and disable the one that was
added automatically.
Warning: If you are deploying this Scanner behind a gateway, and are
specifying one or more IP addresses instead of All IP addresses, you must
add the IP addresses of ALL upstream mail servers in use by your organization.
Upstream mail servers that are not specified here may be classified as spam
sources.
.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Mail security for smtp

Table of Contents