Specific Access Patterns - 3Com 3CR3MFA-92 User Manual

Email firewall
Hide thumbs Also See for 3CR3MFA-92:
Table of Contents

Advertisement

38
C
3: C
HAPTER
ONFIGURING

Specific Access Patterns

M
S
AIL
ECURITY
Click the Add Pattern button to add a new specific access pattern.
Pattern — Enter a mail address, hostname, domain name, or IP
Address.
Client Access — This parameter is used for domain, hostname, or IP
address patterns. This item is the most reliable and may be used to
block spam as well as whitelist.
Only the Client Access parameter can be relied upon because spammers
can easily forge all other message properties. The other parameters,
however, are useful for whitelisting.
HELO Access — This parameter requires either a domain or hostname
pattern. It is not reliable as spammers can fake this property.
Envelope-From Access — This parameter requires a valid email address
pattern. It is not reliable as spammers can fake this property.
Envelope-To Access — This parameter requires a valid email address
pattern. It is not reliable as spammers can fake this property.
If Pattern Matches:
Reject: The connection will be dropped.
Allow relaying: Messages from this address will be relayed and
processed for spam.
Trust: Messages from this address will be relayed and not
processed for spam.

Advertisement

Table of Contents
loading

Table of Contents