38CHAPTER 3: CONFIGURING MAIL SECURITY

Specific Access Patterns Click the Add Pattern button to add a new specific access pattern.

Pattern — Enter a mail address, hostname, domain name, or IP Address.

Client Access — This parameter is used for domain, hostname, or IP address patterns. This item is the most reliable and may be used to block spam as well as whitelist.

Only the Client Access parameter can be relied upon because spammers can easily forge all other message properties. The other parameters, however, are useful for whitelisting.

HELO Access — This parameter requires either a domain or hostname pattern. It is not reliable as spammers can fake this property.

Envelope-From Access — This parameter requires a valid email address pattern. It is not reliable as spammers can fake this property.

Envelope-To Access — This parameter requires a valid email address pattern. It is not reliable as spammers can fake this property.

If Pattern Matches:

Reject: The connection will be dropped.

Allow relaying: Messages from this address will be relayed and processed for spam.

Trust: Messages from this address will be relayed and not processed for spam.

Page 38
Image 38
HP Email Firewall Appliance manual Configuring Mail Security