38CHAPTER 3: CONFIGURING MAIL SECURITY
Specific Access Patterns Click the Add Pattern button to add a new specific access pattern.
■Pattern — Enter a mail address, hostname, domain name, or IP Address.
■Client Access — This parameter is used for domain, hostname, or IP address patterns. This item is the most reliable and may be used to block spam as well as whitelist.
Only the Client Access parameter can be relied upon because spammers can easily forge all other message properties. The other parameters, however, are useful for whitelisting.
■HELO Access — This parameter requires either a domain or hostname pattern. It is not reliable as spammers can fake this property.
■
■
■If Pattern Matches:
■Reject: The connection will be dropped.
■Allow relaying: Messages from this address will be relayed and processed for spam.
■Trust: Messages from this address will be relayed and not processed for spam.