38
C
3: C
HAPTER
ONFIGURING
Specific Access Patterns
M
S
AIL
ECURITY
Click the Add Pattern button to add a new specific access pattern.
Pattern — Enter a mail address, hostname, domain name, or IP
■
Address.
Client Access — This parameter is used for domain, hostname, or IP
■
address patterns. This item is the most reliable and may be used to
block spam as well as whitelist.
Only the Client Access parameter can be relied upon because spammers
can easily forge all other message properties. The other parameters,
however, are useful for whitelisting.
HELO Access — This parameter requires either a domain or hostname
■
pattern. It is not reliable as spammers can fake this property.
Envelope-From Access — This parameter requires a valid email address
■
pattern. It is not reliable as spammers can fake this property.
Envelope-To Access — This parameter requires a valid email address
■
pattern. It is not reliable as spammers can fake this property.
If Pattern Matches:
■
Reject: The connection will be dropped.
■
Allow relaying: Messages from this address will be relayed and
■
processed for spam.
Trust: Messages from this address will be relayed and not
■
processed for spam.