Symantec 10547829 - Mail Security For Smtp 5.0 Smb Installation Manual

Installation guide
Hide thumbs Also See for 10547829 - Mail Security For Smtp 5.0 Smb:

Advertisement

Symantec Mail Security
Appliance Installation Guide
Symantec Information Foundation

Advertisement

Table of Contents
loading

Summary of Contents for Symantec 10547829 - Mail Security For Smtp 5.0 Smb

  • Page 1 Symantec Mail Security Appliance Installation Guide Symantec Information Foundation...
  • Page 2: Legal Notice

    All rights reserved. Symantec, the Symantec Logo, and LiveUpdate are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering.
  • Page 3 Symantec Corporation 20330 Stevens Creek Blvd. Cupertino, CA 95014 http://www.symantec.com...
  • Page 4: Technical Support

    The Technical Support group also authors content for our online Knowledge Base. The Technical Support group works collaboratively with the other functional areas within Symantec to answer your questions in a timely fashion. For example, the Technical Support group works with Product Engineering and Symantec Security Response to provide alerting services and virus definition updates.
  • Page 5: Customer Service

    Troubleshooting that was performed before contacting Symantec Recent software configuration changes and network changes Licensing and registration If your Symantec product requires registration or a license key, access our technical support Web page at the following URL: www.symantec.com/techsupp/ Select your region or language under Global Support, and then select the Licensing and Registration page.
  • Page 6 North America and Latin America: supportsolutions@symantec.com Additional Enterprise services Symantec offers a comprehensive set of services that allow you to maximize your investment in Symantec products and to develop your knowledge, expertise, and global insight, which enable you to manage your business risks proactively.
  • Page 7 To access more information about Enterprise services, please visit our Web site at the following URL: www.symantec.com Select your country or language from the site index.
  • Page 9: Table Of Contents

    Factors that affect performance ............19 Environmental factors that affect performance ......19 Settings that affect performance ..........20 Ports used by Symantec Mail Security ..........21 Configuring your firewall for connections to public IM network servers ................24 Chapter 3 Setting up the Symantec Mail Security Appliance Before you set up your appliance .............
  • Page 10 Completing setup ..............44 Logging in and logging out ............. 45 Having trouble logging in or out? ..........49 Migrating to Symantec Mail Security 7.5 ........... 49 Migration considerations ............49 Backing up existing Control Center data ........51 Running software update ............52...
  • Page 11: Planning Your Deployment

    Symantec Mail Security contains a Message Transfer Agent (MTA), which processes and relays messages to support filtering activities. Note: Symantec Mail Security provides neither mailbox access for end users nor message storage. You must provide an MTA for use in your email infrastructure.
  • Page 12: Positioning With Other Filtering Products

    General deployment considerations Positioning with other filtering products In order for Symantec Mail Security's spam and Content Compliance filters to function properly, you should avoid placing the product behind other filtering products (such as content filters) or MTAs that alter or remove pre-existing message headers or modify the message body.
  • Page 13: Load Balancing

    Adjusting MX records When you implement Symantec Mail Security in front of a separate MTA that receives inbound messages, you must to change the DNS mail exchange (MX) records. The records must point incoming messages to the system. Symantec Mail Security should have a higher priority than the existing MTA.
  • Page 14: Deployment Models

    To prevent spammers from circumventing the new spam-filtering servers, you should do one of the following: The MX record should point at your Symantec Mail Security. Do not point the MX record at downstream MTAs. Remove the previous MTA's MX record from DNS.
  • Page 15: Multi-Tier Gateway Deployment

    Basic gateway deployment Figure 1-1 Advantages The basic gateway deployment takes advantage of Symantec Mail Security's proximity to the Internet. Because spam emanates from the outside world, the gateway is the logical and effective place to deploy Symantec Mail Security.
  • Page 16 Multi-tier gateway deployment Figure 1-2 Advantages A multi-tier gateway deployment maximizes Symantec Mail Security's network administration capacities. This configuration meets a common security audit requirement in that all data stores are in the second tier, including the Control Center and Spam Quarantine databases.
  • Page 17: Post-Gateway Deployment

    Post-Gateway deployment Figure 1-3 MTAs at the gateway layer accept unfiltered mail from the Internet then relay it to Symantec Mail Security. The system filters mail from the gateway layer and relays mail to other MTAs downstream. Advantages Your network configuration may require that you place your Scanner hosts with your SMTP gateway MTA in a "demilitarized zone"...
  • Page 18 Planning your deployment Deployment models then read, filter, and take some action based on the verdict. Such redundancy may add overhead, thereby decreasing throughput.
  • Page 19: Understanding System Requirements

    Factors that affect performance Ports used by Symantec Mail Security Factors that affect performance The performance of Symantec Mail Security appliances can be affected by many factors. This section provides guidelines regarding those factors, and suggestions that may improve performance.
  • Page 20: Settings That Affect Performance

    Percentage of virus-infected messages in the email traffic Types of end-users (ISP or enterprise) Settings that affect performance The choices you make when configuring Symantec Mail Security appliances affect their performance. Filtering performance considerations If a message has more than one recipient, each with different group policies, then the Scanner may need to bifurcate the message (split it into one or more messages) for modification prior to delivery.
  • Page 21: Ports Used By Symantec Mail Security

    CPU cycles it may consume. Ports used by Symantec Mail Security The following tables list ports reserved for Symantec Mail Security for SMTP components and functions. These assignments may differ slightly depending on your environment and filtering types (inbound, outbound, or both).
  • Page 22 Understanding system requirements Ports used by Symantec Mail Security Reserved ports for the Symantec Mail Security Appliance (continued) Table 2-1 Port Protocol From Description Appliance Internal mail servers Inbound internal mail traffic Internal mail Appliance Outbound internal mail traffic servers...
  • Page 23 Understanding system requirements Ports used by Symantec Mail Security Reserved ports for the Symantec Mail Security Appliance (continued) Table 2-1 Port Protocol From Description 7007 IM remote command Note: IMRelay will only accept connections from 127.0.0.1 on this port. 8086...
  • Page 24: Configuring Your Firewall For Connections To Public Im Network Servers

    Understanding system requirements Ports used by Symantec Mail Security Protocol Port Description pool.ntp.org Used for the appliance to sync time clock.isc.org Used for the appliance to sync time time.nist.gov Used for the appliance to sync time liveupdate.symantecliveupdate Default automatic antivirus .symantec.com...
  • Page 25: Setting Up The Symantec Mail Security Appliance

    Before you set up your appliance How to set up the appliance Logging in and logging out Migrating to Symantec Mail Security 7.5 Before you set up your appliance Each appliance can be used to perform a variety of functions in your system. For smaller installations, the same appliance can be used to perform all needed functions.
  • Page 26: Compatible Browsers

    Setting up the Symantec Mail Security Appliance Before you set up your appliance Control Center Deployed as a Control Center, a Symantec Mail Security host allows you to configure and manage email filtering, SMTP routing, system settings, and all other functions from a Web-based interface.
  • Page 27: Configuring Your Dns For Im Filtering

    Before you set up your appliance Configuring your DNS for IM filtering If you want to use your Symantec Mail Security Appliance to filter IM traffic, two differently configured types of DNS servers are required: DNS accessed by internal hosts that routes internal IM traffic to a Scanner for...
  • Page 28: How To Set Up The Appliance

    Setting up the Symantec Mail Security Appliance How to set up the appliance Caution: This DNS cannot be the same internal DNS that you use to direct your IM clients to the Scanner. If it is, a loopback condition occurs where IM messages are directed back to the Scanner instead of to the Internet.
  • Page 29: Configuring Your Network To Include The New Appliance

    For Scanners also, ensure that your network is configured to permit outbound connections to Symantec on port 443. For registration and ongoing operations, Symantec appliances communicate with Symantec Security Response over a secure connection.
  • Page 30: Initialize Your New Appliance

    Setting up the Symantec Mail Security Appliance How to set up the appliance Front Panel Indicators (continued) Table 3-2 LED Indicator Description Power indicator The green indicator in the center of the power button flashes if AC power is available to the system, but the system is not powered on.
  • Page 31 Setting up the Symantec Mail Security Appliance How to set up the appliance Type your new password twice when prompted. Create your password wisely. Do not use something found in a dictionary (in any language or jargon). Do not use a name (including that of a spouse, parent, child, pet, fantasy character, famous person, and location) or any variation of your personal or account name.
  • Page 32 Setting up the Symantec Mail Security Appliance How to set up the appliance Type YES if you want to use interface 2. Otherwise, skip to step 6. When prompted, type the IP address for Ethernet interface 2. For example: 192.168.12.3 When prompted, type the netmask for Ethernet interface 2.
  • Page 33: Registering Your System

    To complete registration, you need the license file (.slf file) provided to you by Symantec. Place this file on the computer from which you are accessing the Control Center. Each time you add a Scanner, you must confirm your licenses or register again.
  • Page 34 For registration and ongoing operations, the appliance communicates with Symantec Security Response over a secure connection. If registration has failed, ensure that your network is configured to permit outbound connections...
  • Page 35: Updating A New Appliance To The Latest Software

    If your software is up-to-date, the Setup Wizard is displayed. Skip to the next section. If a software update is available, the Software Update page is displayed. Symantec strongly recommends that you apply all available updates. On the Software Update page you can: Click Skip to update your software later.
  • Page 36 Setting up the Symantec Mail Security Appliance How to set up the appliance Note: None of the settings you specify using the wizard are final until you click Finish at the end of the wizard. If you step through all the panels of the wizard and do not click Finish, configuration settings will be unchanged.
  • Page 37 Setting up the Symantec Mail Security Appliance How to set up the appliance To specify the Scanner role On the Scanner Role panel, specify how you will use this Scanner. You can choose to filter inbound mail, outbound mail, or both inbound and outbound mail, and instant messaging filtering.
  • Page 38 Setting up the Symantec Mail Security Appliance How to set up the appliance On the Inbound Mail Filtering - Local Relay panel, specify the internal host to which this Scanner will relay inbound mail after filtering is complete. You can select a host from the list or define a new host. A typical value is a downstream mail server such as your corporate mail server.
  • Page 39 Setting up the Symantec Mail Security Appliance How to set up the appliance On the Outbound Mail Filtering - Nonlocal Relay panel, specify how you want to relay outbound mail after filtering is complete. You can use default MX lookup, select a host from the list, or define a new host.
  • Page 40: Setting Up A Scanner

    Setting up the Symantec Mail Security Appliance How to set up the appliance To review and finalize settings On the Setup Wizard Summary panel, review the settings shown. If you are satisfied with the settings, click Finish to save them.
  • Page 41 Setting up the Symantec Mail Security Appliance How to set up the appliance To register the Scanner and specify time settings On the License Registration Information panel, click Browse to find your .slf file. Select your .slf file and click Open to return to the License Registration Information panel.
  • Page 42 Setting up the Symantec Mail Security Appliance How to set up the appliance If you select both inbound and outbound and you have specified two physical ports, you will see the Create Optional Virtual IP Address panel next. Proceed with step 2.
  • Page 43 Setting up the Symantec Mail Security Appliance How to set up the appliance To specify outbound mail filtering settings On the Outbound Mail Filtering panel, choose the IP address to use for outbound mail. If desired, change the port specification for outbound mail.
  • Page 44: Completing Setup

    Setting up the Symantec Mail Security Appliance How to set up the appliance Select primary and secondary internal IP addresses from the Primary IM IP address and Secondary IM IP address drop-down lists. The primary IP address listens for incoming instant messages. The secondary IP address routes file transfers through the Scanner and must be a different IP address from the primary IP address.
  • Page 45: Logging In And Logging Out

    Logging in and logging out Setting mail filtering policies When you set up Symantec Mail Security, a set of ready-made default message filtering policies are in place. You can use these policies or customize them. The initial default policies are as follows:...
  • Page 46 Setting up the Symantec Mail Security Appliance Logging in and logging out Note: Do not create an account for an administrator that is identical to a user account name. Do not create an end user account that is identical to an administrator account name.
  • Page 47 Setting up the Symantec Mail Security Appliance Logging in and logging out Access your Control Center from a browser. The default login address is: https:// :41443 <hostname> where is the hostname you designated for your appliance during <hostname> initialization. Or, you can use the IP address in place of <hostname>...
  • Page 48 Setting up the Symantec Mail Security Appliance Logging in and logging out If necessary, choose the language in which you want to operate the Control Center. Below the text entry fields you will see a list of names of languages. The name of the language currently in use is displayed in normal text.
  • Page 49: Having Trouble Logging In Or Out

    You are automatically logged out if you don’t use the Control Center for 30 minutes. If it happens, log in again. Migrating to Symantec Mail Security 7.5 This section is intended for customers who have a version of Symantec Mail Security previous to version 7.5. Migration considerations Before running software update, review this information.
  • Page 50 Existing data and settings are migrated as follows: Existing settings will migrate to Symantec Mail Security 7.5 unchanged. Data such as Spam Quarantine, logs, and report data will migrate to Symantec Mail Security 7.5 unchanged. Policies may be changed slightly and the behavior of the policies may be different because multiple dispositions are now supported.
  • Page 51: Backing Up Existing Control Center Data

    Scanners at the same time. For example, you can update some Scanners to version 7.5 and leave some with the older version so that some Scanners continue to protect your site while you migrate others. However, a Symantec Mail Security 7.5 Control Center cannot make configuration changes to a pre-version 7.5 Scanner.
  • Page 52: Running Software Update

    51. In the Control Center, click Administration > Software Updates. If you already updated the Control Center to Symantec Mail Security 7.5 and are updating Scanners, click Administration > Hosts > Version and then click the Updates tab.
  • Page 53 Index Numerics Environmental factors that affect performance 19 Ethernet interfaces 31 jacks 29 administrator email address for alerts 36 alerts address to send to 36 Factors that affect performance 19 Filtering performance considerations 20 filtering balance intra-enterprise 12 load 13 filters basic gateway deployment 14 instant messaging 43...
  • Page 54 Index LDAP (continued) performance considerations 21 Quarantine performance considerations 21 lights front panel 29 load balancing 13 registration local domains initial 33 initial settings 36 Scanners 41 log in 45 Requirements Logs system 19 performance impact 20 reserved ports 21 role of appliance choices 25 mail filters..

This manual is also suitable for:

Mail security appliance

Table of Contents