Is there a way with out using Quaratine to have a global safelist and blocklist?? I see the exception Table, but I have over 400 email addresses to add (migrating from Barracuda).....these are full email addresses....can anyone think of an easy way to do this?? Is there an easy way to bulk import these??
perhaps you could share a bit more about what type of addresses you're blocking? individual sender addresses? IP blocks? entire domain names?
anyways, it may be a matter of just using either your incoming mail policies or mail flow policies / HAT, or even a combination of the two, to accomplish this. in terms of importing a big list, this would differ based on your end solution.
1) create a new incoming mail policy ('blocklist' for instance) A) in the creation page, there is a text box to enter new addresses. B) enter your list delimited by either commas or line breaks, ie: email@example.com firstname.lastname@example.org email@example.com C) add this list as 'sender' addresses, commit D) create a new incoming content filter with no match criteria and have a final action to drop or quarantine or something final. E) enable this content filter on your new incoming mail policy
2) combine the match criteria and drop action into a single filter and stick that in your default mail policy A) create a new dictionary and enter the same addresses in it as terms, just like you did above B) create a new incoming content filter with your new dictionary as match criteria for the 'envelope sender' field C) add an action to drop or quarantine as desired D) enable this content filter on your existing incoming mail policy
i'd highly recommend reading through the list and seeing if anything is outdated and can be pruned out. this will save processing power. for instance, we can match firstname.lastname@example.org, email@example.com, firstname.lastname@example.org, and email@example.com, all with a single REGEX rather than looking four separate times. so a bit of manual work upfront may save your box some valuable processing power in the future...
with the IronPort product, it's not really necessary to maintain large static lists like this, because SenderBase and IPAS scoring systems greatly reduce the number of false positives that drive lists like these.
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...