IPS - PROXY tab
Both of these features have been condensed in a single tab for ease of use.
|Automatically detect and inspect the protocol
||If this protocol has been enabled, it will automatically be used for discovering corresponding packets in filter rules.
Mail traffic is based not only on SMTP but also on POP3. This protocol will enable a user to retrieve mail from distant servers onto his workstation using a mail software program. Since this mail server can be located outside the local network or on a separate interface, POP3 traffic passes through and is analyzed by the firewall.
|Filter the welcome banner sent by the server
||When this option is selected, your mail server’s banner will no longer be sent during a POP3 connection. This banner contains information that may be exploited by hackers (server type, software version, etc).
|Keep original source IP address
||When a request is made by a web client (browser) to the server, the firewall will intercept it and check that the request complies with URL filter rules and then relays the request.
If this option is selected, the new request will use the original source IP address of the web client that sent the packet. Otherwise, the firewall’s address will be used.
|Disable intrusion prevention
||When this option is selected, the scan of the POP3 protocol will be disabled and traffic will be authorized if the filter policy allows it.
|Log each POP3 request
||Enables or disables the logging of POP3 requests.