McAfee MAP-3300-SWG Product Guide - Page 87

Benefits of using the permit and deny lists, Permitted and blocked connections, Table 67

Page 87 highlights

Overview of Email features Email Configuration • Permitted and blocked connections • Permitted and blocked senders Benefits of using the permit and deny lists The permit and deny lists for connections and senders are located on a single page within the user interface, allowing you to easily configure these settings. Once set, the permit and deny lists help prevent your users from being swamped by unwanted email messages, whilst helping ensure that email messages from trusted senders do not accidentally get blocked. Permitted and blocked connections Use this section to specify IP addresses that are always permitted or blocked when connecting to the appliance. Table 67 Option definitions Option IP address (Permitted connections) IP address (Blocked connections) Definition The appliance accepts email from this address even if a detected threat caused a "Deny connection" action. This setting ensures that the appliance does not delay email from trusted senders. Displays the IP addresses for connections that the appliance is currently blocking. Addresses remain in this list for a specified period during which email is not accepted. Permitting a connection does not override any time constraints set up by the policy that blocks the connection. For example, if a policy states that a connection will be blocked for 600 seconds and you change the connection to "permitted" within the 600 seconds, the connection continues to be blocked until the 600 seconds have elapsed. This is why a connection can temporarily appear in both the Blocked and Permitted connections list. Port VLAN ID Displays the number of the port on which the message was received. This is typically port 25. Displays the ID of the virtual LAN on which the message was received. This is typically 1 to 4094. Applicable to Transparent Bridge mode only. Seconds remaining Refresh Unblock Store a maximum of items in the blocked connections list Displays the time that must pass before the appliance again allows a connection from this IP address. When clicked, updates the list of connections. The list is not automatically updated. When clicked, enables the selected IP address to try to reconnect. If the limit is reached, the appliance can only add more IP addresses to the list when an existing address expires or is removed manually by clicking Unblock. Default value is 5000. Import List Export List To prevent you having to enter the permitted connections individually onto each of your appliances, you can import a list of permitted connections. Once you have configured the permitted connections list for one of your appliances, you can export the permitted connections list, to be imported onto other appliances. The file is created in comma separated variables (CSV) format. McAfee Email and Web Security Appliances 5.6.0 Product Guide 87

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336

Permitted and blocked connections
Permitted and blocked senders
Benefits of using the permit and deny lists
The permit and deny lists for connections and senders are located on a single page within the user
interface, allowing you to easily configure these settings.
Once set, the permit and deny lists help prevent your users from being swamped by unwanted email
messages, whilst helping ensure that email messages from trusted senders do not accidentally get
blocked.
Permitted and blocked connections
Use this section to specify IP addresses that are always permitted or blocked when connecting to the
appliance.
Table 67
Option definitions
Option
Definition
IP address (Permitted
connections)
The appliance accepts email from this address even if a detected threat caused a
"Deny connection" action. This setting ensures that the appliance does not delay
email from trusted senders.
IP address (Blocked
connections)
Displays the IP addresses for connections that the appliance is currently blocking.
Addresses remain in this list for a specified period during which email is not
accepted.
Permitting a connection does not override any time constraints set up by the
policy that blocks the connection. For example, if a policy states that a
connection will be blocked for 600 seconds and you change the connection to
“permitted” within the 600 seconds, the connection continues to be blocked until
the 600 seconds have elapsed. This is why a connection can temporarily appear
in both the Blocked and Permitted connections list.
Port
Displays the number of the port on which the message was received. This is
typically port 25.
VLAN ID
Displays the ID of the virtual LAN on which the message was received. This is
typically 1 to 4094.
Applicable to Transparent Bridge mode only.
Seconds remaining
Displays the time that must pass before the appliance again allows a connection
from this IP address.
Refresh
When clicked, updates the list of connections. The list is not automatically updated.
Unblock
When clicked, enables the selected IP address to try to reconnect.
Store a maximum of
items in the blocked
connections list
If the limit is reached, the appliance can only add more IP addresses to the list
when an existing address expires or is removed manually by clicking
Unblock
.
Default value is 5000.
Import List
To prevent you having to enter the permitted connections individually onto each
of your appliances, you can import a list of permitted connections.
Export List
Once you have configured the permitted connections list for one of your
appliances, you can export the permitted connections list, to be imported onto
other appliances.
The file is created in comma separated variables (CSV) format.
Overview of Email features
Email Configuration
McAfee Email and Web Security Appliances 5.6.0 Product Guide
87