WSM User Guide - WatchGuard Technologies

WSM User Guide - WatchGuard Technologies WSM User Guide - WatchGuard Technologies

watchguard.com
from watchguard.com More from this publisher
12.07.2015 Views

Configuring the SMTP ProxyDefining content type rulesYou use the ruleset for the SMTP-Incoming proxy action to set values for incoming SMTP content filtering.You use the ruleset for the SMTP-Outgoing proxy action to set values for outgoing SMTP content filtering.1 From the Categories section, select Content Types.2 Do the steps used to create rules. For more information, see “Defining Rulesets” on page 79.Defining file name rulesYou use the ruleset for the SMTP-Incoming proxy action to put limits on file names for incoming e-mailattachments. You use the ruleset for the SMTP-Outgoing proxy action to put limits on file names for outgoinge-mail attachments.1 From the Categories section, select Filenames.2 Do the steps used to create rules. For more information, see “Defining Rules” on page 79.Configuring the Mail From and Mail To rulesThe Mail From ruleset can put limits on e-mail to allow e-mail into your network only from specifiedsenders. The default configuration is to allow e-mail from all senders.The Mail To ruleset can put limits on e-mail to allow e-mail out of your network only to specified recipients.The default configuration allows e-mail to all recipients out of your network. On an SMTP-Incomingproxy action, you can use the Mail To ruleset to prevent people from using your e-mail server for e-mailrelaying. To do this, make sure that all domains your e-mail server accepts e-mail for appear in the rulelist. Then, make sure the Action to Take if None Matched is set to Deny. Any e-mail with an addressthat does not match the listed domains is denied.You can also use the Rewrite As feature included in this rule configuration dialog box to have the Fireboxchange the From and To components of your e-mail address to a different value. This feature is alsoknown as “SMTP masquerading.”1 From the Categories section, select Mail From or Mail To.2 Do the steps used to create rules. For more information, see “Defining Rules” on page 79.Defining header rulesHeader rulesets allow you to set values for incoming or outgoing SMTP header filtering.1 From the Categories section, select Headers.2 Do the steps used to create rules. For more information, see “Defining Rules” on page 79.Defining antivirus responsesThe fields in this dialog box set the actions necessary if a virus is found in an e-mail message. It also setsactions for when an e-mail message contains an attachment that is too large or that the Firebox cannotscan.Although you can use the proxy definition screens to activate and configure Gateway AntiVirus, it is easierto use the Tasks menu in Policy Manager to do this. For more information on how to do this, or to usethe antivirus screens in the proxy definition, see the chapter “Using Signature-Based Security Services.”170 WatchGuard System Manager

Configuring the SMTP ProxyChanging the deny messageThe Firebox gives a default deny message that replaces denied content. You can replace that deny messagewith one that you write. You can write a custom deny message with standard HTML. The first line ofthe deny message is a section of the HTTP header. There must be an empty line between the first lineand the body of the message.1 From the Categories section, select Deny Message.2 Type the deny message in the deny message box. You can use these variables:%(reason)%Puts the cause for the Firebox to deny the content.%(type)%Puts the type of content that was denied.%(filename)%Puts the file name of the denied content.%(virus)%Puts the name or status of a virus, for Gateway AntiVirus users only.%(action)%Puts the name of the action taken: lock, strip, and so on.%(recovery)%Allows you to set the text to fill this sentence: “Your network administrator %(recovery)% thisattachment.Configuring the IPS (Intrusion Prevention System) for SMTPHackers use many methods to attack computers on the Internet. The function of these attacks is tocause damage to your network, get sensitive information, or use your computers to attack other networks.These attacks are known as intrusions.Although you can use the proxy definition screens to activate and configure IPS, it is easier to use theTasks menu in Policy Manager to do this. For more information on how to do this, or to use the IPSscreens in the proxy definition, see the chapter “Using Signature-Based Security Services.”Configuring spamBlockerUnwanted e-mail, also known as spam, fills the average inbox at an astonishing rate. A large volume ofspam decreases bandwidth, degrades employee productivity, and wastes network resources. TheWatchGuard® spamBlocker option increases your capacity to catch spam at the edge of your networkwhen it tries to come into your system.Although you can use the proxy definition screens to activate and configure spamBlocker, it is easier touse the Tasks menu in Policy Manager to do this. For more information on how to do this, or to use thespamBlocker screens in the proxy definition, see the chapter “Using spamBlocker.”Configuring proxy and antivirus alarms for SMTPYou can set the action the Firebox does when proxy or antivirus (AV) alarm events occur:1 From the Categories section, select Proxy and AV Alarms.User Guide 171

Configuring the SMTP ProxyDefining content type rulesYou use the ruleset for the SMTP-Incoming proxy action to set values for incoming SMTP content filtering.You use the ruleset for the SMTP-Outgoing proxy action to set values for outgoing SMTP content filtering.1 From the Categories section, select Content Types.2 Do the steps used to create rules. For more information, see “Defining Rulesets” on page 79.Defining file name rulesYou use the ruleset for the SMTP-Incoming proxy action to put limits on file names for incoming e-mailattachments. You use the ruleset for the SMTP-Outgoing proxy action to put limits on file names for outgoinge-mail attachments.1 From the Categories section, select Filenames.2 Do the steps used to create rules. For more information, see “Defining Rules” on page 79.Configuring the Mail From and Mail To rulesThe Mail From ruleset can put limits on e-mail to allow e-mail into your network only from specifiedsenders. The default configuration is to allow e-mail from all senders.The Mail To ruleset can put limits on e-mail to allow e-mail out of your network only to specified recipients.The default configuration allows e-mail to all recipients out of your network. On an SMTP-Incomingproxy action, you can use the Mail To ruleset to prevent people from using your e-mail server for e-mailrelaying. To do this, make sure that all domains your e-mail server accepts e-mail for appear in the rulelist. Then, make sure the Action to Take if None Matched is set to Deny. Any e-mail with an addressthat does not match the listed domains is denied.You can also use the Rewrite As feature included in this rule configuration dialog box to have the Fireboxchange the From and To components of your e-mail address to a different value. This feature is alsoknown as “SMTP masquerading.”1 From the Categories section, select Mail From or Mail To.2 Do the steps used to create rules. For more information, see “Defining Rules” on page 79.Defining header rulesHeader rulesets allow you to set values for incoming or outgoing SMTP header filtering.1 From the Categories section, select Headers.2 Do the steps used to create rules. For more information, see “Defining Rules” on page 79.Defining antivirus responsesThe fields in this dialog box set the actions necessary if a virus is found in an e-mail message. It also setsactions for when an e-mail message contains an attachment that is too large or that the Firebox cannotscan.Although you can use the proxy definition screens to activate and configure Gateway AntiVirus, it is easierto use the Tasks menu in Policy Manager to do this. For more information on how to do this, or to usethe antivirus screens in the proxy definition, see the chapter “Using Signature-Based Security Services.”170 <strong>WatchGuard</strong> System Manager

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!