Realtime Blackhole List Configuration; Configuring Realtime Blackhole Lists - F-SECURE ANTI-VIRUS FOR MICROSOFT EXCHANGE 9.00 Deployment Manual

Hide thumbs Also See for ANTI-VIRUS FOR MICROSOFT EXCHANGE 9.00:
Table of Contents

Advertisement

64
4.2

Realtime Blackhole List Configuration

4.2.1

Configuring Realtime Blackhole Lists

This section describes how to enable and disable Realtime Blackhole
Lists, how to optimize F-Secure Spam Control performance, and how to
specify blocked and safe recipients and senders by using black- and
whitelisting.
The product supports DNS Blackhole List (DNSBL), also known as
Realtime Blackhole List (RBL), functionality in spam filtering. The
functionality is enabled by default.
To test DNSBL/RBL:
1. Make sure you have a working DNS server configured in Windows
Server networking. The primary DNS server should be configured to
allow recursive DNS queries. DNS protocol is used to make the
DNSBL/RBL queries.
2.
Make sure you do not have a firewall preventing DNS access from
the host where F-Secure Spam Control is running.
3.
Test the DNS functionality by running the nslookup command at
Microsoft Windows command prompt on the host running F-Secure
Spam Control. 
An example:
C:\>nslookup 2.0.0.127.sbl-xbl.spamhaus.org.
Server: <your primary DNS server's name should appear
here>
Address: <your primary DNS server's IP address should
appear here>
Non-authoritative answer:
Name:
2.0.0.127.sbl-xbl.spamhaus.org
Addresses: 127.0.0.2, 127.0.0.4, 127.0.0.6
4.
If the test is successful, continue with these instructions. If the test is
not successful, you should double-check your DNS and firewall
configuration.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Anti-virus for microsoft exchange

Table of Contents