HP Email Firewall Appliance Series Instrukcja Użytkownika

Przeglądaj online lub pobierz Instrukcja Użytkownika dla Oprogramowanie HP Email Firewall Appliance Series. HP Email Firewall Appliance Series User's Manual Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 154
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów

Podsumowanie treści

Strona 1 - User Guide

http://www.3com.com/Part No. DUA-MFA100-AAA01Published January 2005Email FirewallUser GuideUser Guide for the 3Com® Email Firewall

Strona 2 - MA 01752-3064

10 ABOUT THIS GUIDEConventions Table 1 and Table 2 list conventions that are used throughout this guide.Table 1 Notice IconsIcon Notice Type Descrip

Strona 3 - CONTENTS

100 CHAPTER 7: SYSTEM MANAGEMENTUtility Functions The Utility Functions section allows you to control mail services and run network and diagnostic uti

Strona 4 - 4 ANTI-SPAM CONFIGURATION

Status and Utility101SMTP Probe The SMTP (Simple Mail Transport Protocol) Probe is used to test email connectivity with a remote SMTP server. This all

Strona 5 - 6 SYSTEM CONFIGURATION

102 CHAPTER 7: SYSTEM MANAGEMENTThe response field will show the result of the SMTP diagnostic probe, including the response for each SMTP command sen

Strona 6 - 7 SYSTEM MANAGEMENT

Status and Utility103Traceroute UtilityTraceroute is used to see the routing steps between two hosts. If you are losing connectivity somewhere in betw

Strona 7 - A CUSTOMIZING SYSTEM MESSAGES

104 CHAPTER 7: SYSTEM MANAGEMENTCurrent Admin and Spam Quarantine UsersThe Current Admin and Spam Quarantine Users section displays who is logged in v

Strona 8

Quarantine105Quarantine The Quarantine area contains messages that have been quarantined because of a virus, malformed message, illegal attachment, or

Strona 9 - ABOUT THIS GUIDE

106 CHAPTER 7: SYSTEM MANAGEMENT Expire automatically — Enable this feature to expire messages automatically. Days — Enter how many days to keep a q

Strona 10 - Contents

Backup and Restore107Backup and Restore The 3Com Email Firewall can backup all data, including the database, quarantined items, mail queues, mailboxes

Strona 11 - Comments

108 CHAPTER 7: SYSTEM MANAGEMENTConfirm the listed options, and then click Create backup now to begin.The file (backup.gz) will be then be downloaded

Strona 12 - 12 ABOUT THIS GUIDE

Backup and Restore109 Use PASV mode — PASV (Passive) mode may be required for some types of FTP servers. Choose this option if you are having problem

Strona 13 - 3COM EMAIL FIREWALL OVERVIEW

Related Documentation11Related DocumentationIn addition to this guide, each 3Com Email Firewall documentation set includes the following: 3Com Email F

Strona 14

110 CHAPTER 7: SYSTEM MANAGEMENTConfirm the listed options, and then click Create backup now to begin. Alternately, you can click Create scheduled bac

Strona 15 - Features

Backup and Restore111Restores To perform a system restore, select the type of restore to perform (Local Disk or FTP) and click the Next >> butto

Strona 16 - Administration

112 CHAPTER 7: SYSTEM MANAGEMENTRestore from FTPTo restore from FTP, enter the following required information to connect to your FTP server. Remote

Strona 17 - Activity

Reboot and Shutdown113Reboot and ShutdownThe 3Com Email Firewall can be safely rebooted or shut down from the System Mgmt -> Reboot and Shutdown sc

Strona 18

114 CHAPTER 7: SYSTEM MANAGEMENT

Strona 19 - CONFIGURING MAIL DELIVERY

8MONITORING ACTIVITY AND STATUSThis chapter describes how to monitor the 3Com Email Firewall’s mail processing activity and system status, and include

Strona 20

116 CHAPTER 8: MONITORING ACTIVITY AND STATUSMail Server Status The mail system status is shown in the top left window. Mail will either be running or

Strona 21 - Mail Routing

Email Firewall Status117Email Firewall Status Select Status from the main menu to determine if all services and servers are functioning properly.For e

Strona 22 - Message Part

118 CHAPTER 8: MONITORING ACTIVITY AND STATUSEnsure that the following services are running and the information displayed is correct.System Alarms Ind

Strona 23 - Delivery Settings

Email Firewall Status119If there are issues with a certain service, click the service check icon beside the help button to perform a test of that part

Strona 24

12 ABOUT THIS GUIDE

Strona 25

120 CHAPTER 8: MONITORING ACTIVITY AND STATUSTroubleshooting Mail Delivery ProblemsWhen experiencing any mail delivery problems, the first step is to

Strona 26

Troubleshooting Mail Delivery Problems121a period of time. You can view the Mail Transport logs to see the relevant messages that may indicate why you

Strona 27 - Mail Mappings

122 CHAPTER 8: MONITORING ACTIVITY AND STATUSUtility FunctionsIn the System Mgmt -> Status and Utility screen, there are utilities that can be used

Strona 28

Troubleshooting Content Issues123Troubleshooting Content IssuesIf the mail has been delivered to the 3Com Email Firewall successfully, it will undergo

Strona 29 - Virtual Mappings

124 CHAPTER 8: MONITORING ACTIVITY AND STATUSClick on a specific message to see the details of its processing and final disposition.

Strona 30

ACUSTOMIZING SYSTEM MESSAGESMessage variables can be used to customize the content of notification, annotation, and delivery messages. The 3Com Email

Strona 31 - CONFIGURING MAIL SECURITY

126 APPENDIX A: CUSTOMIZING SYSTEM MESSAGES%HOSTNAME% Hostname entered on the Network Settings screenmail.example.com%POSTMASTER_MAIL_ADDR%Email addre

Strona 32

BRESET TO FACTORY DEFAULT SETTINGS FROM CONSOLEIf you need to return the 3Com Email Firewall to its factory default settings, you should use the Syste

Strona 33 - Anti-Virus

128 APPENDIX B: RESET TO FACTORY DEFAULT SETTINGS FROM CONSOLE8 You will need to reinstall and license the system using the Setup Wizard and License W

Strona 34 - Attachment Types

CTHIRD PARTY COPYRIGHT AND LICENSE AGREEMENTSAPACHEApache LicenseVersion 2.0, January 2004http://www.apache.org/licenses/TERMS AND CONDITIONS FOR USE,

Strona 35 - Attachment Control

13COM EMAIL FIREWALL OVERVIEWThis chapter provides an overview of the 3Com Email Firewall and its features, and includes the following topics: Deploy

Strona 36 - Disable Content Scan

130 APPENDIX C: THIRD PARTY COPYRIGHT AND LICENSE AGREEMENTS"Contributor" shall mean Licensor and any individual or Legal Entity on behalf o

Strona 37 - Mail Access/Mail Filtering

1319. Accepting Warranty or Additional Liability. While redistributing the Work or Derivative Works thereof, You may choose to offer, and charge a fee

Strona 38

132 APPENDIX C: THIRD PARTY COPYRIGHT AND LICENSE AGREEMENTSDCCDistributed Checksum ClearinghouseCopyright (c) 2004 by Rhyolite SoftwarePermission to

Strona 39 - Mail Access/Filtering

133FreeBSDCopyright 1994-2004 The FreeBSD Project. All rights reserved.Redistribution and use in source and binary forms, with or without modification

Strona 40

134 APPENDIX C: THIRD PARTY COPYRIGHT AND LICENSE AGREEMENTSLegal Terms ===========Definitions --------------Throughout this license, the terms `pack

Strona 41 - SMTP Security

1354. Contacts -----------There are two mailing lists related to FreeType:* [email protected] general use and applications of FreeType, a

Strona 42

136 APPENDIX C: THIRD PARTY COPYRIGHT AND LICENSE AGREEMENTSJPEGThe authors make NO WARRANTY or representation, either express or implied, with respec

Strona 43 - Enforce TLS

137ModSSLCopyright (c) 1998-2004 Ralf S. Engelschall. All rights reserved.Redistribution and use in source and binary forms, with or without modificat

Strona 44

138 APPENDIX C: THIRD PARTY COPYRIGHT AND LICENSE AGREEMENTSNTPCopyright (c) David L. Mills 1992-2004Permission to use, copy, modify, and distribute t

Strona 45 - for a full

139OpenSSHThe licences which components of this software fall under are as follows. First, we will summarize and say that all components are under a B

Strona 46

14 CHAPTER 1: 3COM EMAIL FIREWALL OVERVIEWInstallation For detailed information on installation, see the Installation Guide that came with your 3Com E

Strona 47 - ANTI-SPAM CONFIGURATION

140 APPENDIX C: THIRD PARTY COPYRIGHT AND LICENSE AGREEMENTS4) The Rijndael implementation by Vincent Rijmen, Antoon Bosselaers and Paulo Barreto is i

Strona 48

1412. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentat

Strona 49

142 APPENDIX C: THIRD PARTY COPYRIGHT AND LICENSE AGREEMENTSPAMRedistribution and use in source and binary forms of Linux-PAM, with or without modific

Strona 50

143Info-ZIPCopyright (c) 1990-2003 Info-ZIP. All rights reserved.For the purposes of this copyright and license, "Info-ZIP" is defined as t

Strona 51

144 APPENDIX C: THIRD PARTY COPYRIGHT AND LICENSE AGREEMENTS

Strona 52

GLOSSARYAttachment Control A feature that allows you to block attachments based on their extension or MIME type.BCC Blind Carbon Copy. The copy of an

Strona 53

146 GLOSSARYIP Internet Protocol. IP is a layer 3 network protocol that is the standard for sending data through a network. IP is part of the TCP/IP s

Strona 54 - Message Filtering

147Quarantine A protected area for storing messages that contain viruses or are considered spam. Messages can be deleted from the quarantine or releas

Strona 55

148 GLOSSARYTLS Transport Layer Security. A protocol for encrypting and providing data integrity over the Internet.Traceroute A utility used to verify

Strona 56

AActivity 115Admin Account 86lost password 127Administrator Privileges 67, 87Advanced Anti-Spam Options 69AnnotationsDelivery Settings 24A

Strona 57

Features15Attachment Control Attachment filtering can be used to control a wide range of problems originating from the use of attachments, such as vir

Strona 58 - Valid, Accept)

Distributed Checksum Clearinghouse (DCC) 49DNS 89, 103DNS Server status 118Domain 89Double Bounce 26EEmail backup 106, 109Email History

Strona 59 - Preferences

Local Disk backup 107Local users 86Login failure 81Lost admin password 127MMail Access 37, 70Mail Configuration 85Mail Filtering 37, 70M

Strona 60

BCC Action 60Preferences 59priority 58Ping 102, 122QQuarantine 105Queue ID 79Queue Sizes 81RRaw Mail Body 57RBL (Realtime Blackhole Li

Strona 61 - Content Filtering

Tokens 57Training 54Status 117Status and Utility 99Strip Received Headers 23Swap usage 81Syslog 78, 89System History 80System Logs 7

Strona 62

3COM CORPORATION LIMITED WARRANTYThis warranty applies to customers located in the United States, Australia, Canada (except Quebec), Ireland, New Zeal

Strona 63 - for details

16 CHAPTER 1: 3COM EMAIL FIREWALL OVERVIEWSystem AdministrationThe 3Com Email Firewall is administered via a web browser. The following web browsers

Strona 64 - Redirect To

System Administration17Main Menu The main menu provides quick access to the 3Com Email Firewall’s configuration and management options.The menu is div

Strona 65 - Spam Quarantine

18 CHAPTER 1: 3COM EMAIL FIREWALL OVERVIEW Reporting — This menu allows you to view and configure the reporting and system log features of the 3Com E

Strona 66 - Interface

2CONFIGURING MAIL DELIVERYThis chapter describes how to configure your 3Com Email Firewall to accept and deliver mail, and includes the following topi

Strona 67 - Trusted Senders List

3Com Corporation 350 Campus Drive Marlborough, MA 01752-3064Copyright © 2000-2005, BorderWare Technologies Inc. Used under license by 3Com Corporatio

Strona 68

20 CHAPTER 2: CONFIGURING MAIL DELIVERY Route-to — Enter the address for the mail server to which mail will be delivered. This is your local mail ser

Strona 69 - Advanced Anti-Spam

Mail Routing21Additional Mail Route RulesWhen adding an additional mail route for a local email server, you must add a Specific Access Pattern and a P

Strona 70

22 CHAPTER 2: CONFIGURING MAIL DELIVERY4 Select Client Access5 Select Trust for the action if the pattern matches, and click OK.Adding a Pattern Based

Strona 71 - REPORTING

Delivery Settings23Delivery Settings You can customize various delivery settings that affect how you accept and deliver mail messages.Select Mail Deli

Strona 72 - 72 CHAPTER 5: REPORTING

24 CHAPTER 2: CONFIGURING MAIL DELIVERYchecked against the Mail Routing table, and if the destination is not specified the email will be sent to the D

Strona 73 - Generating Reports

Delivery Settings25Advanced Delivery SettingsClick the Advanced button to reveal options for advanced SMTP (Simple Mail Transport Protocol) settings a

Strona 74 - HAPTER 5: REPORTING

26 CHAPTER 2: CONFIGURING MAIL DELIVERYdouble bounce message with a copy of the entire single bounce message. Delay — Inform the postmaster of delaye

Strona 75

Mail Mappings27Click Add to add a new mapping to your list. External mail address — Enter the external mail address that you want to be converted to

Strona 76

28 CHAPTER 2: CONFIGURING MAIL DELIVERYVirtual Mappings Virtual Mappings are used to redirect mail addressed for one domain to a different domain. Thi

Strona 77 - System Logs

Virtual Mappings29Uploading Virtual Mapping ListA list of virtual mappings can also be uploaded in one text file. The file must contain comma or tab s

Strona 78 - 78 CHAPTER 5: REPORTING

CONTENTSABOUT THIS GUIDEConventions 10Related Documentation 11Documentation Comments 111 3COM EMAIL FIREWALL OVERVIEWDeployment and Instal

Strona 79 - Email History

30 CHAPTER 2: CONFIGURING MAIL DELIVERY

Strona 80 - Table 4 System Events

3CONFIGURING MAIL SECURITYThis chapter describes how to configure mail security settings on your 3Com Email Firewall, and includes the following topic

Strona 81 - System History

32 CHAPTER 3: CONFIGURING MAIL SECURITYSelect Mail Delivery -> Anti-Virus from the menu to enable and configure virus scanning. Enable virus scann

Strona 82 - Configure History

Anti-Virus33Notifications Notifications for inbound and outbound messages can be enabled for all recipients, the sender, and the administrator. Custom

Strona 83 - SYSTEM CONFIGURATION

34 CHAPTER 3: CONFIGURING MAIL SECURITYAttachment Control Attachment filtering can be used to control a wide range of problems originating from the us

Strona 84

Attachment Control35Notifications Notifications for inbound and outbound messages can be enabled for all recipients, the sender, and the administrato

Strona 85 - Setup Wizard

36 CHAPTER 3: CONFIGURING MAIL SECURITYEditing Attachment TypesClick the Edit button to edit your attachment types. You can add file extensions (.mp3)

Strona 86

Mail Access/Filtering37Mail Access/Filtering The 3Com Email Firewall provides a number of filtering options to ensure that specific mail messages are

Strona 87 - Administrator Privileges

38 CHAPTER 3: CONFIGURING MAIL SECURITYSpecific Access Patterns Click the Add Pattern button to add a new specific access pattern. Pattern — Enter a

Strona 88

Mail Access/Filtering39Pattern Based Message FilteringPattern Based Message Filtering is the primary tool for whitelisting and blacklisting messages.

Strona 89 - Network Settings The

Virtual Mappings 28Uploading Virtual Mapping List 293 CONFIGURING MAIL SECURITYAnti-Virus 31Notifications 33Pattern Files 33Attach

Strona 90 - Auto select

40 CHAPTER 3: CONFIGURING MAIL SECURITYSMTP Authenticated RelayThis feature allows authenticated clients to use the 3Com Email Firewall as an external

Strona 91 - Web Proxy

SMTP Security41SMTP Security The 3Com Email Firewall offers a simple mechanism for encrypting mail delivery via SSL (Secure Sockets Layer) and TLS (Tr

Strona 92

42 CHAPTER 3: CONFIGURING MAIL SECURITYSelect Mail Delivery -> SMTP Security from the menu to enable and configure email encryption.Incoming Mail

Strona 93 - Degraded

SMTP Security43Specific Site PolicyThis option supports the specification of exceptions to the default settings for SSL/TLS. For example, you may need

Strona 94 - New License Key

44 CHAPTER 3: CONFIGURING MAIL SECURITYMalformed Email Many viruses try to elude virus scanners by concealing themselves in malformed messages. The sc

Strona 95 - SSL Certificates

Malformed Email45 Actions — Select an action to be performed. Options include: Just log: Log the event and take no further action. Reject mail: The

Strona 96

46 CHAPTER 3: CONFIGURING MAIL SECURITY

Strona 97 - Software Updates

4ANTI-SPAM CONFIGURATIONThis chapter describes how to configure the Anti-Spam features of your 3Com Email Firewall, and includes the following topics:

Strona 98

48 CHAPTER 4: ANTI-SPAM CONFIGURATIONSelect Mail Delivery -> Anti-Spam from the menu to configure the 3Com Email Firewall’s Anti-Spam features.The

Strona 99 - SYSTEM MANAGEMENT

DCC49DCC DCC (Distributed Checksum Clearinghouse) is a tool used to identify bulk mail and is based on a number of servers that maintain databases of

Strona 100 - Utility Functions

59Objectionable Content Filtering 61Actions 61Notifications 62Upload and Download Filter List 62Trusted Senders List 62Adding

Strona 101 - Status and Utility

50 CHAPTER 4: ANTI-SPAM CONFIGURATION Redirect to: The message will be delivered to the mail address specified in Action Data. Reject mail: The mail

Strona 102 - HAPTER 7: SYSTEM MANAGEMENT

STA51 Mail identified as "bulk" by DCC is also analyzed to provide an example of local spam.Select STA from the Mail Delivery -> Anti-Sp

Strona 103

52 CHAPTER 4: ANTI-SPAM CONFIGURATIONSpam Action Specify an action when STA flags a message as spam. Action — The action can be one of the following:

Strona 104 - Mail Queues

STA53 Redirect to: The message will be delivered to the mail address specified in Action Data. Reject mail: The mail will not be accepted and the co

Strona 105 - Quarantine The

54 CHAPTER 4: ANTI-SPAM CONFIGURATIONSTA Training The STA training section displays statistics of all mail analyzed by the 3Com Email Firewall. Click

Strona 106 - Daily Tasks The

Pattern Based Message Filtering55Some default PBMF rules are provided and more can be added by clicking the Add button.Message Part Select a Message P

Strona 107 - Daily Tasks

56 CHAPTER 4: ANTI-SPAM CONFIGURATIONMessage Envelope ParametersThese parameters will not be visible to the user. They are the “handshake” part of the

Strona 108

Pattern Based Message Filtering57Message Header ParametersSpammers will typically enter false information into these fields and, except for the Subjec

Strona 109 - Backup and Restore

58 CHAPTER 4: ANTI-SPAM CONFIGURATIONMatch Option The match option looks for the specified text in each line. You can specify one of the following: C

Strona 110

Pattern Based Message Filtering59 Do Not Train — Do not use the message for STA training purposes. This option will not override other PBMF’s if it a

Strona 111

Time Zone 84Network Configuration 85Mail Configuration 85Admin Account 86System Users 86Creating an Admin User 87Upload and Do

Strona 112

60 CHAPTER 4: ANTI-SPAM CONFIGURATION Modify Subject Header: The text specified in Action Data will be inserted into the message subject line. Add h

Strona 113 - Settings

Objectionable Content Filtering61Objectionable Content FilteringThe Objectionable Content Filter defines a list of key words that will cause a message

Strona 114

62 CHAPTER 4: ANTI-SPAM CONFIGURATIONNotifications Notifications for inbound and outbound messages can be enabled for all recipients, the sender, and

Strona 115 - ONITORING ACTIVITY AND STATUS

Trusted Senders List63 Maximum number of entries per user — Enter a maximum number of list entries for each user.Adding Trusted Senders When the Trus

Strona 116

64 CHAPTER 4: ANTI-SPAM CONFIGURATIONSpam Quarantine The Spam Quarantine contains quarantined mail messages for each local user on the 3Com Email Fire

Strona 117 - Email Firewall Status

Spam Quarantine65User Notification Enable Summary Email — Select the check box to enable a summary email notification that alerts users to mail that

Strona 118

66 CHAPTER 4: ANTI-SPAM CONFIGURATIONEnabling User Access on a Network InterfaceYou must enable User Access on the network interface to allow users to

Strona 119

Quarantine and Trusted Senders List Users67Quarantine and Trusted Senders List UsersYou must add local users to the 3Com Email Firewall if you require

Strona 120 - Delivery Problems

68 CHAPTER 4: ANTI-SPAM CONFIGURATIONUpload and Download User ListsYou can upload lists of users using comma or tab separated text files. You can spe

Strona 121 - 6D3872B1D8

Advanced Anti-Spam Options69Advanced Anti-Spam OptionsClick the Advanced button to reveal the following advanced Anti-Spam options.RBL (Realtime Black

Strona 122

8 MONITORING ACTIVITY AND STATUSMonitoring Mail Processing Activity 115Mail Server Status 116Mail Queue (Mail Q) 116Mail Queue Statistics

Strona 123 - Content Issues

70 CHAPTER 4: ANTI-SPAM CONFIGURATION Add header: An "X-" mail header will be added as specified in the Action Data. Redirect to: The mess

Strona 124

5REPORTINGThis chapter describes the reporting features of the 3Com Email Firewall, and includes the following topics: Generating Reports System Log

Strona 125 - CUSTOMIZING SYSTEM MESSAGES

72 CHAPTER 5: REPORTINGAdministrators can specify which data is to be included in each report, how it is to be displayed, the order of data, and the n

Strona 126

Generating Reports73 Paper Size — For PDF format, select the paper size such as Letter, A4, or Legal. Describe fields in report — Select this option

Strona 127 - SETTINGS FROM CONSOLE

74 CHAPTER 5: REPORTINGReport Fields The Fields section allows you to choose which fields or items of information you wish to include in the report. Y

Strona 128 - Installation Guide

Generating Reports75Blocking pie chart A pie chart of the same data as the right hand column of Traffic Blocking (timespan).Total traffic Received Gra

Strona 129 - LICENSE AGREEMENTS

76 CHAPTER 5: REPORTINGTop senders The top sender (judged by Envelope from, not Header from) during the report timespan, sorted by number of messages.

Strona 130

System Logs77System Logs The system logs provide detailed information on all mail transport and system related events.Select Reporting -> System Lo

Strona 131 - Cyrus-SASL

78 CHAPTER 5: REPORTINGViewing Log Details Select a specific log to view, search, and download its detailed entry information.Configuring a Syslog Ser

Strona 132

Email History79Email History Every message that passes through the 3Com Email Firewall generates a database entry that records information about how i

Strona 134

80 CHAPTER 5: REPORTINGSystem History The system history is a record of system events, such as login failures, and disk space and CPU usage.Select Rep

Strona 135 - GD Graphics Library

System History81DCC Preferred The round trip time to preferred DCC serverName of preferred serverDisk IO MB per second transfer, KB per transfer, tran

Strona 136

82 CHAPTER 5: REPORTINGConfigure History SettingsIn the Configure Reporting History Size screen, you can configure how many emails and system events t

Strona 137

6SYSTEM CONFIGURATIONThis chapter describes how to view and modify the system configuration of the 3Com Email Firewall, and includes the following top

Strona 138 - OpenLDAP

84 CHAPTER 6: SYSTEM CONFIGURATIONSelect System Config -> Setup Wizard from the menu to start the Setup Wizard.Click Finish at any time to exit the

Strona 139

Setup Wizard85Network Configuration Modify your network settings if required, and click Apply if you have made any changes. If you do not want to modi

Strona 140

86 CHAPTER 6: SYSTEM CONFIGURATIONAdmin Account Select System Config -> Admin Account from the menu to modify the administrator account settings.Yo

Strona 141

System Users87Click the Add a New User button to add a new user to the system.Enter a User ID and a Password.Creating an Admin User If this user will

Strona 142

88 CHAPTER 6: SYSTEM CONFIGURATIONUpload and Download User ListsYou can upload lists of users using comma or tab separated text files. You can specify

Strona 143 - Info-ZIP

Network Settings89Network Settings The Network Settings screen allows you to modify your network settings such as the Hostname, Domain name, IP addres

Strona 144

ABOUT THIS GUIDEThe instructions in this guide are designed to help you with configuration and system administration tasks for the 3Com® Email Firewal

Strona 145 - GLOSSARY

90 CHAPTER 6: SYSTEM CONFIGURATIONNetwork Interfaces In the Network Interfaces section, you can modify your network interface information such as the

Strona 146 - 146 GLOSSARY

Web Proxy91Web Proxy A secure proxy server may be used to cache and proxy requests to systems external to your network, such as an HTTP web proxy serv

Strona 147

92 CHAPTER 6: SYSTEM CONFIGURATIONStatic Routes Static routes are required if the mail servers to which mail must be relayed are located on another ne

Strona 148 - 148 GLOSSARY

Licensing93Licensing Your 3Com Email Firewall must be licensed before it can process mail. The Licensing screen allows you to view your current licen

Strona 149

94 CHAPTER 6: SYSTEM CONFIGURATIONLicense Agreements Click the specified button to view the license agreements for the 3Com Email Firewall, the Anti-V

Strona 150

SSL Certificates95To install a commercial certificate:1 Select System Config -> SSL Certificates from the menu to view and manage your certificates

Strona 151

96 CHAPTER 6: SYSTEM CONFIGURATIONSoftware Updates It is important to keep your 3Com Email Firewall software updated with the latest patches and upgra

Strona 152

Software Updates97When the system restarts, the update will appear in the Installed Updates section.Before applying any update, backup your system con

Strona 153

98 CHAPTER 6: SYSTEM CONFIGURATION

Strona 154 - REGULATORY INFORMATION

7SYSTEM MANAGEMENTThis chapter describes how to use the system management features of the 3Com Email Firewall, and includes the following topics: Sta

Komentarze do niniejszej Instrukcji

Brak uwag