http://www.3com.com/Part No. DUA-MFA100-AAA01Published January 2005Email FirewallUser GuideUser Guide for the 3Com® Email Firewall
10 ABOUT THIS GUIDEConventions Table 1 and Table 2 list conventions that are used throughout this guide.Table 1 Notice IconsIcon Notice Type Descrip
100 CHAPTER 7: SYSTEM MANAGEMENTUtility Functions The Utility Functions section allows you to control mail services and run network and diagnostic uti
Status and Utility101SMTP Probe The SMTP (Simple Mail Transport Protocol) Probe is used to test email connectivity with a remote SMTP server. This all
102 CHAPTER 7: SYSTEM MANAGEMENTThe response field will show the result of the SMTP diagnostic probe, including the response for each SMTP command sen
Status and Utility103Traceroute UtilityTraceroute is used to see the routing steps between two hosts. If you are losing connectivity somewhere in betw
104 CHAPTER 7: SYSTEM MANAGEMENTCurrent Admin and Spam Quarantine UsersThe Current Admin and Spam Quarantine Users section displays who is logged in v
Quarantine105Quarantine The Quarantine area contains messages that have been quarantined because of a virus, malformed message, illegal attachment, or
106 CHAPTER 7: SYSTEM MANAGEMENT Expire automatically — Enable this feature to expire messages automatically. Days — Enter how many days to keep a q
Backup and Restore107Backup and Restore The 3Com Email Firewall can backup all data, including the database, quarantined items, mail queues, mailboxes
108 CHAPTER 7: SYSTEM MANAGEMENTConfirm the listed options, and then click Create backup now to begin.The file (backup.gz) will be then be downloaded
Backup and Restore109 Use PASV mode — PASV (Passive) mode may be required for some types of FTP servers. Choose this option if you are having problem
Related Documentation11Related DocumentationIn addition to this guide, each 3Com Email Firewall documentation set includes the following: 3Com Email F
110 CHAPTER 7: SYSTEM MANAGEMENTConfirm the listed options, and then click Create backup now to begin. Alternately, you can click Create scheduled bac
Backup and Restore111Restores To perform a system restore, select the type of restore to perform (Local Disk or FTP) and click the Next >> butto
112 CHAPTER 7: SYSTEM MANAGEMENTRestore from FTPTo restore from FTP, enter the following required information to connect to your FTP server. Remote
Reboot and Shutdown113Reboot and ShutdownThe 3Com Email Firewall can be safely rebooted or shut down from the System Mgmt -> Reboot and Shutdown sc
114 CHAPTER 7: SYSTEM MANAGEMENT
8MONITORING ACTIVITY AND STATUSThis chapter describes how to monitor the 3Com Email Firewall’s mail processing activity and system status, and include
116 CHAPTER 8: MONITORING ACTIVITY AND STATUSMail Server Status The mail system status is shown in the top left window. Mail will either be running or
Email Firewall Status117Email Firewall Status Select Status from the main menu to determine if all services and servers are functioning properly.For e
118 CHAPTER 8: MONITORING ACTIVITY AND STATUSEnsure that the following services are running and the information displayed is correct.System Alarms Ind
Email Firewall Status119If there are issues with a certain service, click the service check icon beside the help button to perform a test of that part
12 ABOUT THIS GUIDE
120 CHAPTER 8: MONITORING ACTIVITY AND STATUSTroubleshooting Mail Delivery ProblemsWhen experiencing any mail delivery problems, the first step is to
Troubleshooting Mail Delivery Problems121a period of time. You can view the Mail Transport logs to see the relevant messages that may indicate why you
122 CHAPTER 8: MONITORING ACTIVITY AND STATUSUtility FunctionsIn the System Mgmt -> Status and Utility screen, there are utilities that can be used
Troubleshooting Content Issues123Troubleshooting Content IssuesIf the mail has been delivered to the 3Com Email Firewall successfully, it will undergo
124 CHAPTER 8: MONITORING ACTIVITY AND STATUSClick on a specific message to see the details of its processing and final disposition.
ACUSTOMIZING SYSTEM MESSAGESMessage variables can be used to customize the content of notification, annotation, and delivery messages. The 3Com Email
126 APPENDIX A: CUSTOMIZING SYSTEM MESSAGES%HOSTNAME% Hostname entered on the Network Settings screenmail.example.com%POSTMASTER_MAIL_ADDR%Email addre
BRESET TO FACTORY DEFAULT SETTINGS FROM CONSOLEIf you need to return the 3Com Email Firewall to its factory default settings, you should use the Syste
128 APPENDIX B: RESET TO FACTORY DEFAULT SETTINGS FROM CONSOLE8 You will need to reinstall and license the system using the Setup Wizard and License W
CTHIRD PARTY COPYRIGHT AND LICENSE AGREEMENTSAPACHEApache LicenseVersion 2.0, January 2004http://www.apache.org/licenses/TERMS AND CONDITIONS FOR USE,
13COM EMAIL FIREWALL OVERVIEWThis chapter provides an overview of the 3Com Email Firewall and its features, and includes the following topics: Deploy
130 APPENDIX C: THIRD PARTY COPYRIGHT AND LICENSE AGREEMENTS"Contributor" shall mean Licensor and any individual or Legal Entity on behalf o
1319. Accepting Warranty or Additional Liability. While redistributing the Work or Derivative Works thereof, You may choose to offer, and charge a fee
132 APPENDIX C: THIRD PARTY COPYRIGHT AND LICENSE AGREEMENTSDCCDistributed Checksum ClearinghouseCopyright (c) 2004 by Rhyolite SoftwarePermission to
133FreeBSDCopyright 1994-2004 The FreeBSD Project. All rights reserved.Redistribution and use in source and binary forms, with or without modification
134 APPENDIX C: THIRD PARTY COPYRIGHT AND LICENSE AGREEMENTSLegal Terms ===========Definitions --------------Throughout this license, the terms `pack
1354. Contacts -----------There are two mailing lists related to FreeType:* [email protected] general use and applications of FreeType, a
136 APPENDIX C: THIRD PARTY COPYRIGHT AND LICENSE AGREEMENTSJPEGThe authors make NO WARRANTY or representation, either express or implied, with respec
137ModSSLCopyright (c) 1998-2004 Ralf S. Engelschall. All rights reserved.Redistribution and use in source and binary forms, with or without modificat
138 APPENDIX C: THIRD PARTY COPYRIGHT AND LICENSE AGREEMENTSNTPCopyright (c) David L. Mills 1992-2004Permission to use, copy, modify, and distribute t
139OpenSSHThe licences which components of this software fall under are as follows. First, we will summarize and say that all components are under a B
14 CHAPTER 1: 3COM EMAIL FIREWALL OVERVIEWInstallation For detailed information on installation, see the Installation Guide that came with your 3Com E
140 APPENDIX C: THIRD PARTY COPYRIGHT AND LICENSE AGREEMENTS4) The Rijndael implementation by Vincent Rijmen, Antoon Bosselaers and Paulo Barreto is i
1412. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentat
142 APPENDIX C: THIRD PARTY COPYRIGHT AND LICENSE AGREEMENTSPAMRedistribution and use in source and binary forms of Linux-PAM, with or without modific
143Info-ZIPCopyright (c) 1990-2003 Info-ZIP. All rights reserved.For the purposes of this copyright and license, "Info-ZIP" is defined as t
144 APPENDIX C: THIRD PARTY COPYRIGHT AND LICENSE AGREEMENTS
GLOSSARYAttachment Control A feature that allows you to block attachments based on their extension or MIME type.BCC Blind Carbon Copy. The copy of an
146 GLOSSARYIP Internet Protocol. IP is a layer 3 network protocol that is the standard for sending data through a network. IP is part of the TCP/IP s
147Quarantine A protected area for storing messages that contain viruses or are considered spam. Messages can be deleted from the quarantine or releas
148 GLOSSARYTLS Transport Layer Security. A protocol for encrypting and providing data integrity over the Internet.Traceroute A utility used to verify
AActivity 115Admin Account 86lost password 127Administrator Privileges 67, 87Advanced Anti-Spam Options 69AnnotationsDelivery Settings 24A
Features15Attachment Control Attachment filtering can be used to control a wide range of problems originating from the use of attachments, such as vir
Distributed Checksum Clearinghouse (DCC) 49DNS 89, 103DNS Server status 118Domain 89Double Bounce 26EEmail backup 106, 109Email History
Local Disk backup 107Local users 86Login failure 81Lost admin password 127MMail Access 37, 70Mail Configuration 85Mail Filtering 37, 70M
BCC Action 60Preferences 59priority 58Ping 102, 122QQuarantine 105Queue ID 79Queue Sizes 81RRaw Mail Body 57RBL (Realtime Blackhole Li
Tokens 57Training 54Status 117Status and Utility 99Strip Received Headers 23Swap usage 81Syslog 78, 89System History 80System Logs 7
3COM CORPORATION LIMITED WARRANTYThis warranty applies to customers located in the United States, Australia, Canada (except Quebec), Ireland, New Zeal
16 CHAPTER 1: 3COM EMAIL FIREWALL OVERVIEWSystem AdministrationThe 3Com Email Firewall is administered via a web browser. The following web browsers
System Administration17Main Menu The main menu provides quick access to the 3Com Email Firewall’s configuration and management options.The menu is div
18 CHAPTER 1: 3COM EMAIL FIREWALL OVERVIEW Reporting — This menu allows you to view and configure the reporting and system log features of the 3Com E
2CONFIGURING MAIL DELIVERYThis chapter describes how to configure your 3Com Email Firewall to accept and deliver mail, and includes the following topi
3Com Corporation 350 Campus Drive Marlborough, MA 01752-3064Copyright © 2000-2005, BorderWare Technologies Inc. Used under license by 3Com Corporatio
20 CHAPTER 2: CONFIGURING MAIL DELIVERY Route-to — Enter the address for the mail server to which mail will be delivered. This is your local mail ser
Mail Routing21Additional Mail Route RulesWhen adding an additional mail route for a local email server, you must add a Specific Access Pattern and a P
22 CHAPTER 2: CONFIGURING MAIL DELIVERY4 Select Client Access5 Select Trust for the action if the pattern matches, and click OK.Adding a Pattern Based
Delivery Settings23Delivery Settings You can customize various delivery settings that affect how you accept and deliver mail messages.Select Mail Deli
24 CHAPTER 2: CONFIGURING MAIL DELIVERYchecked against the Mail Routing table, and if the destination is not specified the email will be sent to the D
Delivery Settings25Advanced Delivery SettingsClick the Advanced button to reveal options for advanced SMTP (Simple Mail Transport Protocol) settings a
26 CHAPTER 2: CONFIGURING MAIL DELIVERYdouble bounce message with a copy of the entire single bounce message. Delay — Inform the postmaster of delaye
Mail Mappings27Click Add to add a new mapping to your list. External mail address — Enter the external mail address that you want to be converted to
28 CHAPTER 2: CONFIGURING MAIL DELIVERYVirtual Mappings Virtual Mappings are used to redirect mail addressed for one domain to a different domain. Thi
Virtual Mappings29Uploading Virtual Mapping ListA list of virtual mappings can also be uploaded in one text file. The file must contain comma or tab s
CONTENTSABOUT THIS GUIDEConventions 10Related Documentation 11Documentation Comments 111 3COM EMAIL FIREWALL OVERVIEWDeployment and Instal
30 CHAPTER 2: CONFIGURING MAIL DELIVERY
3CONFIGURING MAIL SECURITYThis chapter describes how to configure mail security settings on your 3Com Email Firewall, and includes the following topic
32 CHAPTER 3: CONFIGURING MAIL SECURITYSelect Mail Delivery -> Anti-Virus from the menu to enable and configure virus scanning. Enable virus scann
Anti-Virus33Notifications Notifications for inbound and outbound messages can be enabled for all recipients, the sender, and the administrator. Custom
34 CHAPTER 3: CONFIGURING MAIL SECURITYAttachment Control Attachment filtering can be used to control a wide range of problems originating from the us
Attachment Control35Notifications Notifications for inbound and outbound messages can be enabled for all recipients, the sender, and the administrato
36 CHAPTER 3: CONFIGURING MAIL SECURITYEditing Attachment TypesClick the Edit button to edit your attachment types. You can add file extensions (.mp3)
Mail Access/Filtering37Mail Access/Filtering The 3Com Email Firewall provides a number of filtering options to ensure that specific mail messages are
38 CHAPTER 3: CONFIGURING MAIL SECURITYSpecific Access Patterns Click the Add Pattern button to add a new specific access pattern. Pattern — Enter a
Mail Access/Filtering39Pattern Based Message FilteringPattern Based Message Filtering is the primary tool for whitelisting and blacklisting messages.
Virtual Mappings 28Uploading Virtual Mapping List 293 CONFIGURING MAIL SECURITYAnti-Virus 31Notifications 33Pattern Files 33Attach
40 CHAPTER 3: CONFIGURING MAIL SECURITYSMTP Authenticated RelayThis feature allows authenticated clients to use the 3Com Email Firewall as an external
SMTP Security41SMTP Security The 3Com Email Firewall offers a simple mechanism for encrypting mail delivery via SSL (Secure Sockets Layer) and TLS (Tr
42 CHAPTER 3: CONFIGURING MAIL SECURITYSelect Mail Delivery -> SMTP Security from the menu to enable and configure email encryption.Incoming Mail
SMTP Security43Specific Site PolicyThis option supports the specification of exceptions to the default settings for SSL/TLS. For example, you may need
44 CHAPTER 3: CONFIGURING MAIL SECURITYMalformed Email Many viruses try to elude virus scanners by concealing themselves in malformed messages. The sc
Malformed Email45 Actions — Select an action to be performed. Options include: Just log: Log the event and take no further action. Reject mail: The
46 CHAPTER 3: CONFIGURING MAIL SECURITY
4ANTI-SPAM CONFIGURATIONThis chapter describes how to configure the Anti-Spam features of your 3Com Email Firewall, and includes the following topics:
48 CHAPTER 4: ANTI-SPAM CONFIGURATIONSelect Mail Delivery -> Anti-Spam from the menu to configure the 3Com Email Firewall’s Anti-Spam features.The
DCC49DCC DCC (Distributed Checksum Clearinghouse) is a tool used to identify bulk mail and is based on a number of servers that maintain databases of
59Objectionable Content Filtering 61Actions 61Notifications 62Upload and Download Filter List 62Trusted Senders List 62Adding
50 CHAPTER 4: ANTI-SPAM CONFIGURATION Redirect to: The message will be delivered to the mail address specified in Action Data. Reject mail: The mail
STA51 Mail identified as "bulk" by DCC is also analyzed to provide an example of local spam.Select STA from the Mail Delivery -> Anti-Sp
52 CHAPTER 4: ANTI-SPAM CONFIGURATIONSpam Action Specify an action when STA flags a message as spam. Action — The action can be one of the following:
STA53 Redirect to: The message will be delivered to the mail address specified in Action Data. Reject mail: The mail will not be accepted and the co
54 CHAPTER 4: ANTI-SPAM CONFIGURATIONSTA Training The STA training section displays statistics of all mail analyzed by the 3Com Email Firewall. Click
Pattern Based Message Filtering55Some default PBMF rules are provided and more can be added by clicking the Add button.Message Part Select a Message P
56 CHAPTER 4: ANTI-SPAM CONFIGURATIONMessage Envelope ParametersThese parameters will not be visible to the user. They are the “handshake” part of the
Pattern Based Message Filtering57Message Header ParametersSpammers will typically enter false information into these fields and, except for the Subjec
58 CHAPTER 4: ANTI-SPAM CONFIGURATIONMatch Option The match option looks for the specified text in each line. You can specify one of the following: C
Pattern Based Message Filtering59 Do Not Train — Do not use the message for STA training purposes. This option will not override other PBMF’s if it a
Time Zone 84Network Configuration 85Mail Configuration 85Admin Account 86System Users 86Creating an Admin User 87Upload and Do
60 CHAPTER 4: ANTI-SPAM CONFIGURATION Modify Subject Header: The text specified in Action Data will be inserted into the message subject line. Add h
Objectionable Content Filtering61Objectionable Content FilteringThe Objectionable Content Filter defines a list of key words that will cause a message
62 CHAPTER 4: ANTI-SPAM CONFIGURATIONNotifications Notifications for inbound and outbound messages can be enabled for all recipients, the sender, and
Trusted Senders List63 Maximum number of entries per user — Enter a maximum number of list entries for each user.Adding Trusted Senders When the Trus
64 CHAPTER 4: ANTI-SPAM CONFIGURATIONSpam Quarantine The Spam Quarantine contains quarantined mail messages for each local user on the 3Com Email Fire
Spam Quarantine65User Notification Enable Summary Email — Select the check box to enable a summary email notification that alerts users to mail that
66 CHAPTER 4: ANTI-SPAM CONFIGURATIONEnabling User Access on a Network InterfaceYou must enable User Access on the network interface to allow users to
Quarantine and Trusted Senders List Users67Quarantine and Trusted Senders List UsersYou must add local users to the 3Com Email Firewall if you require
68 CHAPTER 4: ANTI-SPAM CONFIGURATIONUpload and Download User ListsYou can upload lists of users using comma or tab separated text files. You can spe
Advanced Anti-Spam Options69Advanced Anti-Spam OptionsClick the Advanced button to reveal the following advanced Anti-Spam options.RBL (Realtime Black
8 MONITORING ACTIVITY AND STATUSMonitoring Mail Processing Activity 115Mail Server Status 116Mail Queue (Mail Q) 116Mail Queue Statistics
70 CHAPTER 4: ANTI-SPAM CONFIGURATION Add header: An "X-" mail header will be added as specified in the Action Data. Redirect to: The mess
5REPORTINGThis chapter describes the reporting features of the 3Com Email Firewall, and includes the following topics: Generating Reports System Log
72 CHAPTER 5: REPORTINGAdministrators can specify which data is to be included in each report, how it is to be displayed, the order of data, and the n
Generating Reports73 Paper Size — For PDF format, select the paper size such as Letter, A4, or Legal. Describe fields in report — Select this option
74 CHAPTER 5: REPORTINGReport Fields The Fields section allows you to choose which fields or items of information you wish to include in the report. Y
Generating Reports75Blocking pie chart A pie chart of the same data as the right hand column of Traffic Blocking (timespan).Total traffic Received Gra
76 CHAPTER 5: REPORTINGTop senders The top sender (judged by Envelope from, not Header from) during the report timespan, sorted by number of messages.
System Logs77System Logs The system logs provide detailed information on all mail transport and system related events.Select Reporting -> System Lo
78 CHAPTER 5: REPORTINGViewing Log Details Select a specific log to view, search, and download its detailed entry information.Configuring a Syslog Ser
Email History79Email History Every message that passes through the 3Com Email Firewall generates a database entry that records information about how i
80 CHAPTER 5: REPORTINGSystem History The system history is a record of system events, such as login failures, and disk space and CPU usage.Select Rep
System History81DCC Preferred The round trip time to preferred DCC serverName of preferred serverDisk IO MB per second transfer, KB per transfer, tran
82 CHAPTER 5: REPORTINGConfigure History SettingsIn the Configure Reporting History Size screen, you can configure how many emails and system events t
6SYSTEM CONFIGURATIONThis chapter describes how to view and modify the system configuration of the 3Com Email Firewall, and includes the following top
84 CHAPTER 6: SYSTEM CONFIGURATIONSelect System Config -> Setup Wizard from the menu to start the Setup Wizard.Click Finish at any time to exit the
Setup Wizard85Network Configuration Modify your network settings if required, and click Apply if you have made any changes. If you do not want to modi
86 CHAPTER 6: SYSTEM CONFIGURATIONAdmin Account Select System Config -> Admin Account from the menu to modify the administrator account settings.Yo
System Users87Click the Add a New User button to add a new user to the system.Enter a User ID and a Password.Creating an Admin User If this user will
88 CHAPTER 6: SYSTEM CONFIGURATIONUpload and Download User ListsYou can upload lists of users using comma or tab separated text files. You can specify
Network Settings89Network Settings The Network Settings screen allows you to modify your network settings such as the Hostname, Domain name, IP addres
ABOUT THIS GUIDEThe instructions in this guide are designed to help you with configuration and system administration tasks for the 3Com® Email Firewal
90 CHAPTER 6: SYSTEM CONFIGURATIONNetwork Interfaces In the Network Interfaces section, you can modify your network interface information such as the
Web Proxy91Web Proxy A secure proxy server may be used to cache and proxy requests to systems external to your network, such as an HTTP web proxy serv
92 CHAPTER 6: SYSTEM CONFIGURATIONStatic Routes Static routes are required if the mail servers to which mail must be relayed are located on another ne
Licensing93Licensing Your 3Com Email Firewall must be licensed before it can process mail. The Licensing screen allows you to view your current licen
94 CHAPTER 6: SYSTEM CONFIGURATIONLicense Agreements Click the specified button to view the license agreements for the 3Com Email Firewall, the Anti-V
SSL Certificates95To install a commercial certificate:1 Select System Config -> SSL Certificates from the menu to view and manage your certificates
96 CHAPTER 6: SYSTEM CONFIGURATIONSoftware Updates It is important to keep your 3Com Email Firewall software updated with the latest patches and upgra
Software Updates97When the system restarts, the update will appear in the Installed Updates section.Before applying any update, backup your system con
98 CHAPTER 6: SYSTEM CONFIGURATION
7SYSTEM MANAGEMENTThis chapter describes how to use the system management features of the 3Com Email Firewall, and includes the following topics: Sta
Kommentare zu diesen Handbüchern