McAfee MAP-3300-SWG Product Guide - Page 88

Permitted and blocked senders, Task - How do I add a permitted connection?, Table 68

Page 88 highlights

Overview of Email features Email Configuration Permitted and blocked senders Use this section to specify senders, networks and domains that are always permitted or blocked when connecting to the appliance. Table 68 Option definitions Option Value type (Permitted senders) Value (Permitted senders) Definition If an email is from a permitted sender, Sender Authentication checks are bypassed, and the sender is accepted. Displays the details of the sender: • Email address - For example, network_user@ example.com • IP address - For example, 192.168.255.240 • Domain name - For example, www.example.com Value type (Blocked senders) Value (Blocked senders) Response if a sender is in the block list If an email is from a blocked sender, it will be refused unless there is a corresponding entry in the permitted senders list. Displays the details of the sender (email address, IP address and domain name). Offers various actions, including: • Allow through • Accept and drop • Reject • Reject and close • Reject, close and deny Resolve permitted / blocked host names to IP addresses Reverse lookup sender IP address Import List Export List When selected, causes the appliance to use DNS to resolve host names to IP addresses from a domain name. These lookups take place when the SMTP proxy is initialized. The default value is Yes. When selected, causes the appliance to use DNS to do a reverse lookup of the sending IP address to match domains in the list. Because this requires an extra lookup for each connection, this can affect performance. The default value is No. To prevent you having to enter the permitted or denied senders individually onto each of your appliances, you can import lists of permitted or denied senders. Once you have configured the permitted or denied senders list for one of your appliances, you can export the information, to be imported onto other appliances. The files are created in comma separated variables (CSV) format. Task - How do I add a permitted connection? To add a permitted connection: 1 Browse to Email | Email Configuration | Receiving Email | Permit and Deny Lists | Permitted and blocked connections | Permitted connections. 2 Click Add. 3 Type the IP address and the netmask for the connection that you want listed as permitted. 4 Save the changes. 88 McAfee Email and Web Security Appliances 5.6.0 Product Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336

Permitted and blocked senders
Use this section to specify senders, networks and domains that are always permitted or blocked when
connecting to the appliance.
Table 68
Option definitions
Option
Definition
Value type (Permitted
senders)
If an email is from a permitted sender, Sender Authentication checks are
bypassed, and the sender is accepted.
Value (Permitted
senders)
Displays the details of the sender:
Email address — For example, network_user@ example.com
IP address — For example, 192.168.255.240
Domain name — For example, www.example.com
Value type (Blocked
senders)
If an email is from a blocked sender, it will be refused unless there is a
corresponding entry in the permitted senders list.
Value (Blocked senders)
Displays the details of the sender (email address, IP address and domain name).
Response if a sender is
in the block list
Offers various actions, including:
Allow through
Accept and drop
• Reject
Reject and close
Reject, close and deny
Resolve permitted /
blocked host names to
IP addresses
When selected, causes the appliance to use DNS to resolve host names to IP
addresses from a domain name. These lookups take place when the SMTP proxy
is initialized. The default value is Yes.
Reverse lookup sender
IP address
When selected, causes the appliance to use DNS to do a reverse lookup of the
sending IP address to match domains in the list. Because this requires an extra
lookup for each connection, this can affect performance. The default value is No.
Import List
To prevent you having to enter the permitted or denied senders individually onto
each of your appliances, you can import lists of permitted or denied senders.
Export List
Once you have configured the permitted or denied senders list for one of your
appliances, you can export the information, to be imported onto other appliances.
The files are created in comma separated variables (CSV) format.
Task — How do I add a permitted connection?
To add a permitted connection:
1
Browse to
Email
|
Email Configuration
|
Receiving Email
|
Permit and Deny Lists
|
Permitted and blocked connections
|
Permitted connections
.
2
Click
Add
.
3
Type the
IP address
and the netmask for the connection that you want listed as permitted.
4
Save the changes.
Overview of Email features
Email Configuration
88
McAfee Email and Web Security Appliances 5.6.0 Product Guide