WSM User Guide - WatchGuard Technologies
WSM User Guide - WatchGuard Technologies WSM User Guide - WatchGuard Technologies
Configuring the SMTP ProxyConfiguring the SMTP ProxyYou use the SMTP proxy to control e-mail messages and e-mail content. The proxy scans SMTP messagesfor a number of filtered parameters, and compares them against the rules set in the proxy configuration.To configure the SMTP proxy:1 Add the SMTP proxy to Policy Manager. To learn how to add policies to Policy Manager, see “AddingPolicies” on page 146.2 Double-click the SMTP icon and select the Properties tab.The Edit Policy Properties dialog box appears and shows the General Settings information.3 In the Proxy drop-down list, select to configure SMTP-Incoming or SMTP-Outgoing.You can also clone a proxy action to create a new proxy action.4 Click the View/Edit Proxy icon.166 WatchGuard System Manager
Configuring the SMTP ProxyConfiguring general settingsYou use the General Settings fields to configure basic SMTP proxy parameters such as idle time-outand message limits.Idle timeoutYou can set the length of time an incoming SMTP connection can idle before the connectiontimes out. The default value is 600 seconds (10 minutes). For no time-out, clear the Set thetimeout to check box.Maximum e-mail recipientsWith the Set the maximum e-mail recipients to check box, you can set the maximum numberof e-mail recipients to which a message can be sent. The Firebox® counts and allows thespecified number of addresses through, and then drops the other addresses. For example, if youuse the default value of 50 and there is a message for 52 addresses, the first 50 addresses getthe e-mail message. The last two addresses do not get a copy of the message. A distribution listappears as one SMTP e-mail address (for example, support@watchguard.com). The Fireboxcounts this as one address.You can use this feature to decrease spam e-mail because spam usually includes a largerecipient list. Be careful when you do this because you can also deny legitimate e-mail.Maximum address lengthWith the Set the maximum address length to check box, you can set the maximum length ofe-mail addresses.Maximum e-mail sizeWith the Set the maximum e-mail size to check box, you can set the maximum length of anincoming SMTP message. Most e-mail is sent as 7-bit ASCII text. The exceptions are Binary MIMEUser Guide 167
- Page 134 and 135: Using 1-to-1 NAT4 Click OK. Save th
- Page 136 and 137: Using 1-to-1 NATa VPN tunnel is con
- Page 138 and 139: Configuring Static NAT for a Policy
- Page 140 and 141: How User Authentication Worksvent a
- Page 142 and 143: Configuring the Firebox as an Authe
- Page 144 and 145: Configuring the Firebox as an Authe
- Page 146 and 147: Configuring SecurID Authentication6
- Page 148 and 149: Configuring LDAP Authentication3 In
- Page 150 and 151: Configuring a Policy with User Auth
- Page 152 and 153: Configuring a Policy with User Auth
- Page 154 and 155: Using Default Packet Handling Optio
- Page 156 and 157: Setting Blocked Sitesconfigure the
- Page 158 and 159: Setting Blocked SitesUsing an exter
- Page 160 and 161: Blocking PortsBlocking PortsYou can
- Page 162 and 163: Blocking Ports144 WatchGuard System
- Page 164 and 165: Adding Policies• Attacks that use
- Page 166 and 167: Adding Policies4 Click Add.The New
- Page 168 and 169: Configuring Policy Properties- ESP-
- Page 170 and 171: Configuring Policy Properties2 To a
- Page 172 and 173: Configuring Policy PropertiesRepeat
- Page 174 and 175: Configuring Policy PropertiesSettin
- Page 176 and 177: Setting Policy Precedence2 Traffic
- Page 178 and 179: Setting Policy Precedence160 WatchG
- Page 180 and 181: Defining RulesThe fields you use fo
- Page 182 and 183: Customizing Logging and Notificatio
- Page 186 and 187: Configuring the SMTP Proxyand 8-bit
- Page 188 and 189: Configuring the SMTP ProxyDefining
- Page 190 and 191: Configuring the FTP Proxy2 For info
- Page 192 and 193: Configuring the HTTP ProxyConfiguri
- Page 194 and 195: Configuring the HTTP ProxyBrowsers
- Page 196 and 197: Configuring the HTTP ProxyThis rule
- Page 198 and 199: Configuring the DNS ProxyConfigurin
- Page 200 and 201: Configuring the DNS ProxyAdding a n
- Page 202 and 203: Configuring the TCP Proxy184 WatchG
- Page 204 and 205: Creating and Editing ReportsStartin
- Page 206 and 207: Setting Report Properties“yesterd
- Page 208 and 209: Exporting ReportsSetting report pro
- Page 210 and 211: Using Report FiltersExcludeTo make
- Page 212 and 213: Report Sections and Consolidated Se
- Page 214 and 215: Report Sections and Consolidated Se
- Page 216 and 217: WatchGuard Management Server Passph
- Page 218 and 219: Changing the Management Server Conf
- Page 220 and 221: Configuring the Certificate Authori
- Page 222 and 223: Backing up or Restoring the Managem
- Page 224 and 225: Moving the WatchGuard Management Se
- Page 226 and 227: Managing Devices with the Managemen
- Page 228 and 229: Managing Devices with the Managemen
- Page 230 and 231: Managing Devices with the Managemen
- Page 232 and 233: Adding Devices to the Management Se
Configuring the SMTP ProxyConfiguring general settingsYou use the General Settings fields to configure basic SMTP proxy parameters such as idle time-outand message limits.Idle timeoutYou can set the length of time an incoming SMTP connection can idle before the connectiontimes out. The default value is 600 seconds (10 minutes). For no time-out, clear the Set thetimeout to check box.Maximum e-mail recipientsWith the Set the maximum e-mail recipients to check box, you can set the maximum numberof e-mail recipients to which a message can be sent. The Firebox® counts and allows thespecified number of addresses through, and then drops the other addresses. For example, if youuse the default value of 50 and there is a message for 52 addresses, the first 50 addresses getthe e-mail message. The last two addresses do not get a copy of the message. A distribution listappears as one SMTP e-mail address (for example, support@watchguard.com). The Fireboxcounts this as one address.You can use this feature to decrease spam e-mail because spam usually includes a largerecipient list. Be careful when you do this because you can also deny legitimate e-mail.Maximum address lengthWith the Set the maximum address length to check box, you can set the maximum length ofe-mail addresses.Maximum e-mail sizeWith the Set the maximum e-mail size to check box, you can set the maximum length of anincoming SMTP message. Most e-mail is sent as 7-bit ASCII text. The exceptions are Binary MIME<strong>User</strong> <strong>Guide</strong> 167