HP Email Firewall Appliance Series Bedienungsanleitung

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Software HP Email Firewall Appliance Series herunter. HP Email Firewall Appliance Series User's Manual Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 154
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen

Inhaltsverzeichnis

Seite 1 - User Guide

http://www.3com.com/Part No. DUA-MFA100-AAA01Published January 2005Email FirewallUser GuideUser Guide for the 3Com® Email Firewall

Seite 2 - MA 01752-3064

10 ABOUT THIS GUIDEConventions Table 1 and Table 2 list conventions that are used throughout this guide.Table 1 Notice IconsIcon Notice Type Descrip

Seite 3 - CONTENTS

100 CHAPTER 7: SYSTEM MANAGEMENTUtility Functions The Utility Functions section allows you to control mail services and run network and diagnostic uti

Seite 4 - 4 ANTI-SPAM CONFIGURATION

Status and Utility101SMTP Probe The SMTP (Simple Mail Transport Protocol) Probe is used to test email connectivity with a remote SMTP server. This all

Seite 5 - 6 SYSTEM CONFIGURATION

102 CHAPTER 7: SYSTEM MANAGEMENTThe response field will show the result of the SMTP diagnostic probe, including the response for each SMTP command sen

Seite 6 - 7 SYSTEM MANAGEMENT

Status and Utility103Traceroute UtilityTraceroute is used to see the routing steps between two hosts. If you are losing connectivity somewhere in betw

Seite 7 - A CUSTOMIZING SYSTEM MESSAGES

104 CHAPTER 7: SYSTEM MANAGEMENTCurrent Admin and Spam Quarantine UsersThe Current Admin and Spam Quarantine Users section displays who is logged in v

Seite 8

Quarantine105Quarantine The Quarantine area contains messages that have been quarantined because of a virus, malformed message, illegal attachment, or

Seite 9 - ABOUT THIS GUIDE

106 CHAPTER 7: SYSTEM MANAGEMENT Expire automatically — Enable this feature to expire messages automatically. Days — Enter how many days to keep a q

Seite 10 - Contents

Backup and Restore107Backup and Restore The 3Com Email Firewall can backup all data, including the database, quarantined items, mail queues, mailboxes

Seite 11 - Comments

108 CHAPTER 7: SYSTEM MANAGEMENTConfirm the listed options, and then click Create backup now to begin.The file (backup.gz) will be then be downloaded

Seite 12 - 12 ABOUT THIS GUIDE

Backup and Restore109 Use PASV mode — PASV (Passive) mode may be required for some types of FTP servers. Choose this option if you are having problem

Seite 13 - 3COM EMAIL FIREWALL OVERVIEW

Related Documentation11Related DocumentationIn addition to this guide, each 3Com Email Firewall documentation set includes the following: 3Com Email F

Seite 14

110 CHAPTER 7: SYSTEM MANAGEMENTConfirm the listed options, and then click Create backup now to begin. Alternately, you can click Create scheduled bac

Seite 15 - Features

Backup and Restore111Restores To perform a system restore, select the type of restore to perform (Local Disk or FTP) and click the Next >> butto

Seite 16 - Administration

112 CHAPTER 7: SYSTEM MANAGEMENTRestore from FTPTo restore from FTP, enter the following required information to connect to your FTP server. Remote

Seite 17 - Activity

Reboot and Shutdown113Reboot and ShutdownThe 3Com Email Firewall can be safely rebooted or shut down from the System Mgmt -> Reboot and Shutdown sc

Seite 18

114 CHAPTER 7: SYSTEM MANAGEMENT

Seite 19 - CONFIGURING MAIL DELIVERY

8MONITORING ACTIVITY AND STATUSThis chapter describes how to monitor the 3Com Email Firewall’s mail processing activity and system status, and include

Seite 20

116 CHAPTER 8: MONITORING ACTIVITY AND STATUSMail Server Status The mail system status is shown in the top left window. Mail will either be running or

Seite 21 - Mail Routing

Email Firewall Status117Email Firewall Status Select Status from the main menu to determine if all services and servers are functioning properly.For e

Seite 22 - Message Part

118 CHAPTER 8: MONITORING ACTIVITY AND STATUSEnsure that the following services are running and the information displayed is correct.System Alarms Ind

Seite 23 - Delivery Settings

Email Firewall Status119If there are issues with a certain service, click the service check icon beside the help button to perform a test of that part

Seite 24

12 ABOUT THIS GUIDE

Seite 25

120 CHAPTER 8: MONITORING ACTIVITY AND STATUSTroubleshooting Mail Delivery ProblemsWhen experiencing any mail delivery problems, the first step is to

Seite 26

Troubleshooting Mail Delivery Problems121a period of time. You can view the Mail Transport logs to see the relevant messages that may indicate why you

Seite 27 - Mail Mappings

122 CHAPTER 8: MONITORING ACTIVITY AND STATUSUtility FunctionsIn the System Mgmt -> Status and Utility screen, there are utilities that can be used

Seite 28

Troubleshooting Content Issues123Troubleshooting Content IssuesIf the mail has been delivered to the 3Com Email Firewall successfully, it will undergo

Seite 29 - Virtual Mappings

124 CHAPTER 8: MONITORING ACTIVITY AND STATUSClick on a specific message to see the details of its processing and final disposition.

Seite 30

ACUSTOMIZING SYSTEM MESSAGESMessage variables can be used to customize the content of notification, annotation, and delivery messages. The 3Com Email

Seite 31 - CONFIGURING MAIL SECURITY

126 APPENDIX A: CUSTOMIZING SYSTEM MESSAGES%HOSTNAME% Hostname entered on the Network Settings screenmail.example.com%POSTMASTER_MAIL_ADDR%Email addre

Seite 32

BRESET TO FACTORY DEFAULT SETTINGS FROM CONSOLEIf you need to return the 3Com Email Firewall to its factory default settings, you should use the Syste

Seite 33 - Anti-Virus

128 APPENDIX B: RESET TO FACTORY DEFAULT SETTINGS FROM CONSOLE8 You will need to reinstall and license the system using the Setup Wizard and License W

Seite 34 - Attachment Types

CTHIRD PARTY COPYRIGHT AND LICENSE AGREEMENTSAPACHEApache LicenseVersion 2.0, January 2004http://www.apache.org/licenses/TERMS AND CONDITIONS FOR USE,

Seite 35 - Attachment Control

13COM EMAIL FIREWALL OVERVIEWThis chapter provides an overview of the 3Com Email Firewall and its features, and includes the following topics: Deploy

Seite 36 - Disable Content Scan

130 APPENDIX C: THIRD PARTY COPYRIGHT AND LICENSE AGREEMENTS"Contributor" shall mean Licensor and any individual or Legal Entity on behalf o

Seite 37 - Mail Access/Mail Filtering

1319. Accepting Warranty or Additional Liability. While redistributing the Work or Derivative Works thereof, You may choose to offer, and charge a fee

Seite 38

132 APPENDIX C: THIRD PARTY COPYRIGHT AND LICENSE AGREEMENTSDCCDistributed Checksum ClearinghouseCopyright (c) 2004 by Rhyolite SoftwarePermission to

Seite 39 - Mail Access/Filtering

133FreeBSDCopyright 1994-2004 The FreeBSD Project. All rights reserved.Redistribution and use in source and binary forms, with or without modification

Seite 40

134 APPENDIX C: THIRD PARTY COPYRIGHT AND LICENSE AGREEMENTSLegal Terms ===========Definitions --------------Throughout this license, the terms `pack

Seite 41 - SMTP Security

1354. Contacts -----------There are two mailing lists related to FreeType:* [email protected] general use and applications of FreeType, a

Seite 42

136 APPENDIX C: THIRD PARTY COPYRIGHT AND LICENSE AGREEMENTSJPEGThe authors make NO WARRANTY or representation, either express or implied, with respec

Seite 43 - Enforce TLS

137ModSSLCopyright (c) 1998-2004 Ralf S. Engelschall. All rights reserved.Redistribution and use in source and binary forms, with or without modificat

Seite 44

138 APPENDIX C: THIRD PARTY COPYRIGHT AND LICENSE AGREEMENTSNTPCopyright (c) David L. Mills 1992-2004Permission to use, copy, modify, and distribute t

Seite 45 - for a full

139OpenSSHThe licences which components of this software fall under are as follows. First, we will summarize and say that all components are under a B

Seite 46

14 CHAPTER 1: 3COM EMAIL FIREWALL OVERVIEWInstallation For detailed information on installation, see the Installation Guide that came with your 3Com E

Seite 47 - ANTI-SPAM CONFIGURATION

140 APPENDIX C: THIRD PARTY COPYRIGHT AND LICENSE AGREEMENTS4) The Rijndael implementation by Vincent Rijmen, Antoon Bosselaers and Paulo Barreto is i

Seite 48

1412. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentat

Seite 49

142 APPENDIX C: THIRD PARTY COPYRIGHT AND LICENSE AGREEMENTSPAMRedistribution and use in source and binary forms of Linux-PAM, with or without modific

Seite 50

143Info-ZIPCopyright (c) 1990-2003 Info-ZIP. All rights reserved.For the purposes of this copyright and license, "Info-ZIP" is defined as t

Seite 51

144 APPENDIX C: THIRD PARTY COPYRIGHT AND LICENSE AGREEMENTS

Seite 52

GLOSSARYAttachment Control A feature that allows you to block attachments based on their extension or MIME type.BCC Blind Carbon Copy. The copy of an

Seite 53

146 GLOSSARYIP Internet Protocol. IP is a layer 3 network protocol that is the standard for sending data through a network. IP is part of the TCP/IP s

Seite 54 - Message Filtering

147Quarantine A protected area for storing messages that contain viruses or are considered spam. Messages can be deleted from the quarantine or releas

Seite 55

148 GLOSSARYTLS Transport Layer Security. A protocol for encrypting and providing data integrity over the Internet.Traceroute A utility used to verify

Seite 56

AActivity 115Admin Account 86lost password 127Administrator Privileges 67, 87Advanced Anti-Spam Options 69AnnotationsDelivery Settings 24A

Seite 57

Features15Attachment Control Attachment filtering can be used to control a wide range of problems originating from the use of attachments, such as vir

Seite 58 - Valid, Accept)

Distributed Checksum Clearinghouse (DCC) 49DNS 89, 103DNS Server status 118Domain 89Double Bounce 26EEmail backup 106, 109Email History

Seite 59 - Preferences

Local Disk backup 107Local users 86Login failure 81Lost admin password 127MMail Access 37, 70Mail Configuration 85Mail Filtering 37, 70M

Seite 60

BCC Action 60Preferences 59priority 58Ping 102, 122QQuarantine 105Queue ID 79Queue Sizes 81RRaw Mail Body 57RBL (Realtime Blackhole Li

Seite 61 - Content Filtering

Tokens 57Training 54Status 117Status and Utility 99Strip Received Headers 23Swap usage 81Syslog 78, 89System History 80System Logs 7

Seite 62

3COM CORPORATION LIMITED WARRANTYThis warranty applies to customers located in the United States, Australia, Canada (except Quebec), Ireland, New Zeal

Seite 63 - for details

16 CHAPTER 1: 3COM EMAIL FIREWALL OVERVIEWSystem AdministrationThe 3Com Email Firewall is administered via a web browser. The following web browsers

Seite 64 - Redirect To

System Administration17Main Menu The main menu provides quick access to the 3Com Email Firewall’s configuration and management options.The menu is div

Seite 65 - Spam Quarantine

18 CHAPTER 1: 3COM EMAIL FIREWALL OVERVIEW Reporting — This menu allows you to view and configure the reporting and system log features of the 3Com E

Seite 66 - Interface

2CONFIGURING MAIL DELIVERYThis chapter describes how to configure your 3Com Email Firewall to accept and deliver mail, and includes the following topi

Seite 67 - Trusted Senders List

3Com Corporation 350 Campus Drive Marlborough, MA 01752-3064Copyright © 2000-2005, BorderWare Technologies Inc. Used under license by 3Com Corporatio

Seite 68

20 CHAPTER 2: CONFIGURING MAIL DELIVERY Route-to — Enter the address for the mail server to which mail will be delivered. This is your local mail ser

Seite 69 - Advanced Anti-Spam

Mail Routing21Additional Mail Route RulesWhen adding an additional mail route for a local email server, you must add a Specific Access Pattern and a P

Seite 70

22 CHAPTER 2: CONFIGURING MAIL DELIVERY4 Select Client Access5 Select Trust for the action if the pattern matches, and click OK.Adding a Pattern Based

Seite 71 - REPORTING

Delivery Settings23Delivery Settings You can customize various delivery settings that affect how you accept and deliver mail messages.Select Mail Deli

Seite 72 - 72 CHAPTER 5: REPORTING

24 CHAPTER 2: CONFIGURING MAIL DELIVERYchecked against the Mail Routing table, and if the destination is not specified the email will be sent to the D

Seite 73 - Generating Reports

Delivery Settings25Advanced Delivery SettingsClick the Advanced button to reveal options for advanced SMTP (Simple Mail Transport Protocol) settings a

Seite 74 - HAPTER 5: REPORTING

26 CHAPTER 2: CONFIGURING MAIL DELIVERYdouble bounce message with a copy of the entire single bounce message. Delay — Inform the postmaster of delaye

Seite 75

Mail Mappings27Click Add to add a new mapping to your list. External mail address — Enter the external mail address that you want to be converted to

Seite 76

28 CHAPTER 2: CONFIGURING MAIL DELIVERYVirtual Mappings Virtual Mappings are used to redirect mail addressed for one domain to a different domain. Thi

Seite 77 - System Logs

Virtual Mappings29Uploading Virtual Mapping ListA list of virtual mappings can also be uploaded in one text file. The file must contain comma or tab s

Seite 78 - 78 CHAPTER 5: REPORTING

CONTENTSABOUT THIS GUIDEConventions 10Related Documentation 11Documentation Comments 111 3COM EMAIL FIREWALL OVERVIEWDeployment and Instal

Seite 79 - Email History

30 CHAPTER 2: CONFIGURING MAIL DELIVERY

Seite 80 - Table 4 System Events

3CONFIGURING MAIL SECURITYThis chapter describes how to configure mail security settings on your 3Com Email Firewall, and includes the following topic

Seite 81 - System History

32 CHAPTER 3: CONFIGURING MAIL SECURITYSelect Mail Delivery -> Anti-Virus from the menu to enable and configure virus scanning. Enable virus scann

Seite 82 - Configure History

Anti-Virus33Notifications Notifications for inbound and outbound messages can be enabled for all recipients, the sender, and the administrator. Custom

Seite 83 - SYSTEM CONFIGURATION

34 CHAPTER 3: CONFIGURING MAIL SECURITYAttachment Control Attachment filtering can be used to control a wide range of problems originating from the us

Seite 84

Attachment Control35Notifications Notifications for inbound and outbound messages can be enabled for all recipients, the sender, and the administrato

Seite 85 - Setup Wizard

36 CHAPTER 3: CONFIGURING MAIL SECURITYEditing Attachment TypesClick the Edit button to edit your attachment types. You can add file extensions (.mp3)

Seite 86

Mail Access/Filtering37Mail Access/Filtering The 3Com Email Firewall provides a number of filtering options to ensure that specific mail messages are

Seite 87 - Administrator Privileges

38 CHAPTER 3: CONFIGURING MAIL SECURITYSpecific Access Patterns Click the Add Pattern button to add a new specific access pattern. Pattern — Enter a

Seite 88

Mail Access/Filtering39Pattern Based Message FilteringPattern Based Message Filtering is the primary tool for whitelisting and blacklisting messages.

Seite 89 - Network Settings The

Virtual Mappings 28Uploading Virtual Mapping List 293 CONFIGURING MAIL SECURITYAnti-Virus 31Notifications 33Pattern Files 33Attach

Seite 90 - Auto select

40 CHAPTER 3: CONFIGURING MAIL SECURITYSMTP Authenticated RelayThis feature allows authenticated clients to use the 3Com Email Firewall as an external

Seite 91 - Web Proxy

SMTP Security41SMTP Security The 3Com Email Firewall offers a simple mechanism for encrypting mail delivery via SSL (Secure Sockets Layer) and TLS (Tr

Seite 92

42 CHAPTER 3: CONFIGURING MAIL SECURITYSelect Mail Delivery -> SMTP Security from the menu to enable and configure email encryption.Incoming Mail

Seite 93 - Degraded

SMTP Security43Specific Site PolicyThis option supports the specification of exceptions to the default settings for SSL/TLS. For example, you may need

Seite 94 - New License Key

44 CHAPTER 3: CONFIGURING MAIL SECURITYMalformed Email Many viruses try to elude virus scanners by concealing themselves in malformed messages. The sc

Seite 95 - SSL Certificates

Malformed Email45 Actions — Select an action to be performed. Options include: Just log: Log the event and take no further action. Reject mail: The

Seite 96

46 CHAPTER 3: CONFIGURING MAIL SECURITY

Seite 97 - Software Updates

4ANTI-SPAM CONFIGURATIONThis chapter describes how to configure the Anti-Spam features of your 3Com Email Firewall, and includes the following topics:

Seite 98

48 CHAPTER 4: ANTI-SPAM CONFIGURATIONSelect Mail Delivery -> Anti-Spam from the menu to configure the 3Com Email Firewall’s Anti-Spam features.The

Seite 99 - SYSTEM MANAGEMENT

DCC49DCC DCC (Distributed Checksum Clearinghouse) is a tool used to identify bulk mail and is based on a number of servers that maintain databases of

Seite 100 - Utility Functions

59Objectionable Content Filtering 61Actions 61Notifications 62Upload and Download Filter List 62Trusted Senders List 62Adding

Seite 101 - Status and Utility

50 CHAPTER 4: ANTI-SPAM CONFIGURATION Redirect to: The message will be delivered to the mail address specified in Action Data. Reject mail: The mail

Seite 102 - HAPTER 7: SYSTEM MANAGEMENT

STA51 Mail identified as "bulk" by DCC is also analyzed to provide an example of local spam.Select STA from the Mail Delivery -> Anti-Sp

Seite 103

52 CHAPTER 4: ANTI-SPAM CONFIGURATIONSpam Action Specify an action when STA flags a message as spam. Action — The action can be one of the following:

Seite 104 - Mail Queues

STA53 Redirect to: The message will be delivered to the mail address specified in Action Data. Reject mail: The mail will not be accepted and the co

Seite 105 - Quarantine The

54 CHAPTER 4: ANTI-SPAM CONFIGURATIONSTA Training The STA training section displays statistics of all mail analyzed by the 3Com Email Firewall. Click

Seite 106 - Daily Tasks The

Pattern Based Message Filtering55Some default PBMF rules are provided and more can be added by clicking the Add button.Message Part Select a Message P

Seite 107 - Daily Tasks

56 CHAPTER 4: ANTI-SPAM CONFIGURATIONMessage Envelope ParametersThese parameters will not be visible to the user. They are the “handshake” part of the

Seite 108

Pattern Based Message Filtering57Message Header ParametersSpammers will typically enter false information into these fields and, except for the Subjec

Seite 109 - Backup and Restore

58 CHAPTER 4: ANTI-SPAM CONFIGURATIONMatch Option The match option looks for the specified text in each line. You can specify one of the following: C

Seite 110

Pattern Based Message Filtering59 Do Not Train — Do not use the message for STA training purposes. This option will not override other PBMF’s if it a

Seite 111

Time Zone 84Network Configuration 85Mail Configuration 85Admin Account 86System Users 86Creating an Admin User 87Upload and Do

Seite 112

60 CHAPTER 4: ANTI-SPAM CONFIGURATION Modify Subject Header: The text specified in Action Data will be inserted into the message subject line. Add h

Seite 113 - Settings

Objectionable Content Filtering61Objectionable Content FilteringThe Objectionable Content Filter defines a list of key words that will cause a message

Seite 114

62 CHAPTER 4: ANTI-SPAM CONFIGURATIONNotifications Notifications for inbound and outbound messages can be enabled for all recipients, the sender, and

Seite 115 - ONITORING ACTIVITY AND STATUS

Trusted Senders List63 Maximum number of entries per user — Enter a maximum number of list entries for each user.Adding Trusted Senders When the Trus

Seite 116

64 CHAPTER 4: ANTI-SPAM CONFIGURATIONSpam Quarantine The Spam Quarantine contains quarantined mail messages for each local user on the 3Com Email Fire

Seite 117 - Email Firewall Status

Spam Quarantine65User Notification Enable Summary Email — Select the check box to enable a summary email notification that alerts users to mail that

Seite 118

66 CHAPTER 4: ANTI-SPAM CONFIGURATIONEnabling User Access on a Network InterfaceYou must enable User Access on the network interface to allow users to

Seite 119

Quarantine and Trusted Senders List Users67Quarantine and Trusted Senders List UsersYou must add local users to the 3Com Email Firewall if you require

Seite 120 - Delivery Problems

68 CHAPTER 4: ANTI-SPAM CONFIGURATIONUpload and Download User ListsYou can upload lists of users using comma or tab separated text files. You can spe

Seite 121 - 6D3872B1D8

Advanced Anti-Spam Options69Advanced Anti-Spam OptionsClick the Advanced button to reveal the following advanced Anti-Spam options.RBL (Realtime Black

Seite 122

8 MONITORING ACTIVITY AND STATUSMonitoring Mail Processing Activity 115Mail Server Status 116Mail Queue (Mail Q) 116Mail Queue Statistics

Seite 123 - Content Issues

70 CHAPTER 4: ANTI-SPAM CONFIGURATION Add header: An "X-" mail header will be added as specified in the Action Data. Redirect to: The mess

Seite 124

5REPORTINGThis chapter describes the reporting features of the 3Com Email Firewall, and includes the following topics: Generating Reports System Log

Seite 125 - CUSTOMIZING SYSTEM MESSAGES

72 CHAPTER 5: REPORTINGAdministrators can specify which data is to be included in each report, how it is to be displayed, the order of data, and the n

Seite 126

Generating Reports73 Paper Size — For PDF format, select the paper size such as Letter, A4, or Legal. Describe fields in report — Select this option

Seite 127 - SETTINGS FROM CONSOLE

74 CHAPTER 5: REPORTINGReport Fields The Fields section allows you to choose which fields or items of information you wish to include in the report. Y

Seite 128 - Installation Guide

Generating Reports75Blocking pie chart A pie chart of the same data as the right hand column of Traffic Blocking (timespan).Total traffic Received Gra

Seite 129 - LICENSE AGREEMENTS

76 CHAPTER 5: REPORTINGTop senders The top sender (judged by Envelope from, not Header from) during the report timespan, sorted by number of messages.

Seite 130

System Logs77System Logs The system logs provide detailed information on all mail transport and system related events.Select Reporting -> System Lo

Seite 131 - Cyrus-SASL

78 CHAPTER 5: REPORTINGViewing Log Details Select a specific log to view, search, and download its detailed entry information.Configuring a Syslog Ser

Seite 132

Email History79Email History Every message that passes through the 3Com Email Firewall generates a database entry that records information about how i

Seite 134

80 CHAPTER 5: REPORTINGSystem History The system history is a record of system events, such as login failures, and disk space and CPU usage.Select Rep

Seite 135 - GD Graphics Library

System History81DCC Preferred The round trip time to preferred DCC serverName of preferred serverDisk IO MB per second transfer, KB per transfer, tran

Seite 136

82 CHAPTER 5: REPORTINGConfigure History SettingsIn the Configure Reporting History Size screen, you can configure how many emails and system events t

Seite 137

6SYSTEM CONFIGURATIONThis chapter describes how to view and modify the system configuration of the 3Com Email Firewall, and includes the following top

Seite 138 - OpenLDAP

84 CHAPTER 6: SYSTEM CONFIGURATIONSelect System Config -> Setup Wizard from the menu to start the Setup Wizard.Click Finish at any time to exit the

Seite 139

Setup Wizard85Network Configuration Modify your network settings if required, and click Apply if you have made any changes. If you do not want to modi

Seite 140

86 CHAPTER 6: SYSTEM CONFIGURATIONAdmin Account Select System Config -> Admin Account from the menu to modify the administrator account settings.Yo

Seite 141

System Users87Click the Add a New User button to add a new user to the system.Enter a User ID and a Password.Creating an Admin User If this user will

Seite 142

88 CHAPTER 6: SYSTEM CONFIGURATIONUpload and Download User ListsYou can upload lists of users using comma or tab separated text files. You can specify

Seite 143 - Info-ZIP

Network Settings89Network Settings The Network Settings screen allows you to modify your network settings such as the Hostname, Domain name, IP addres

Seite 144

ABOUT THIS GUIDEThe instructions in this guide are designed to help you with configuration and system administration tasks for the 3Com® Email Firewal

Seite 145 - GLOSSARY

90 CHAPTER 6: SYSTEM CONFIGURATIONNetwork Interfaces In the Network Interfaces section, you can modify your network interface information such as the

Seite 146 - 146 GLOSSARY

Web Proxy91Web Proxy A secure proxy server may be used to cache and proxy requests to systems external to your network, such as an HTTP web proxy serv

Seite 147

92 CHAPTER 6: SYSTEM CONFIGURATIONStatic Routes Static routes are required if the mail servers to which mail must be relayed are located on another ne

Seite 148 - 148 GLOSSARY

Licensing93Licensing Your 3Com Email Firewall must be licensed before it can process mail. The Licensing screen allows you to view your current licen

Seite 149

94 CHAPTER 6: SYSTEM CONFIGURATIONLicense Agreements Click the specified button to view the license agreements for the 3Com Email Firewall, the Anti-V

Seite 150

SSL Certificates95To install a commercial certificate:1 Select System Config -> SSL Certificates from the menu to view and manage your certificates

Seite 151

96 CHAPTER 6: SYSTEM CONFIGURATIONSoftware Updates It is important to keep your 3Com Email Firewall software updated with the latest patches and upgra

Seite 152

Software Updates97When the system restarts, the update will appear in the Installed Updates section.Before applying any update, backup your system con

Seite 153

98 CHAPTER 6: SYSTEM CONFIGURATION

Seite 154 - REGULATORY INFORMATION

7SYSTEM MANAGEMENTThis chapter describes how to use the system management features of the 3Com Email Firewall, and includes the following topics: Sta

Kommentare zu diesen Handbüchern

Keine Kommentare