Realtime Blackhole List Configuration; Configuring Realtime Blackhole Lists - F-SECURE ANTI-VIRUS FOR MICROSOFT EXCHANGE 7.10 Administrator's Manual

Table of Contents

Advertisement

266
9.4

Realtime Blackhole List Configuration

9.4.1

Configuring Realtime Blackhole Lists

This section describes how to enable and disable Realtime Blackhole
Lists, how to optimize F-Secure Spam Control performance, and how to
specify blocked and safe recipients and senders by using black- and
whitelisting.
The product supports DNS Blackhole List (DNSBL), also known as
Realtime Blackhole List (RBL), functionality in spam filtering. The
functionality is enabled by default.
To test DNSBL/RBL:
1. Make sure you have a working DNS server configured in Windows
Server networking. The primary DNS server should be configured to
allow recursive DNS queries. DNS protocol is used to make the
DNSBL/RBL queries.
2.
Make sure you do not have a firewall preventing DNS access from
the host where F-Secure Spam Control is running.
3.
Test the DNS functionality by running the nslookup command at
Microsoft Windows command prompt on the host running F-Secure
Spam Control.
An example:
C:\>nslookup 2.0.0.127.sbl-xbl.spamhaus.org.
Server: <your primary DNS server's name should appear
here>
Address: <your primary DNS server's IP address should
appear here>
Non-authoritative answer:
Name:
2.0.0.127.sbl-xbl.spamhaus.org
Addresses: 127.0.0.2, 127.0.0.4, 127.0.0.6
4.
If the test is successful, continue with these instructions. If the test is
not successful, you should double-check your DNS and firewall
configuration.

Advertisement

Table of Contents
loading

This manual is also suitable for:

F-secure anti-virus for microsoft exchange

Table of Contents