Symantec™ Messaging Gateway 10.0 Getting Started Guide: Powered by Brightmail™
Symantec™ Messaging Gateway 10.0 Getting Started Guide: Powered by Brightmail™
powered by Brightmail™
The software described in this book is furnished under a license agreement and may be used
only in accordance with the terms of the agreement.
PN: 21257306
Legal Notice
Copyright © 2012 Symantec Corporation. All rights reserved.
Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec
Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks
of their respective owners.
This Symantec product may contain third party software for which Symantec is required
to provide attribution to the third party (“Third Party Programs”). Some of the Third Party
Programs are available under open source or free software licenses. The License Agreement
accompanying the Software does not alter any rights or obligations you may have under
those open source or free software licenses. Please see the Third Party Legal Notice Appendix
to this Documentation or TPIP ReadMe File accompanying this Symantec product for more
information on the Third Party Programs.
The product described in this document is distributed under licenses restricting its use,
copying, distribution, and decompilation/reverse engineering. No part of this document
may be reproduced in any form by any means without prior written authorization of
Symantec Corporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS,
REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT,
ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO
BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL
OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING,
PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED
IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
The Licensed Software and Documentation are deemed to be commercial computer software
as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19
"Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in
Commercial Computer Software or Commercial Computer Software Documentation", as
applicable, and any successor regulations. Any use, modification, reproduction release,
performance, display or disclosure of the Licensed Software and Documentation by the U.S.
Government shall be solely in accordance with the terms of this Agreement.
Symantec Corporation
350 Ellis Street
Mountain View, CA 94043
http://www.symantec.com
10 9 8 7 6 5 4 3 2 1
Technical Support
Symantec Technical Support maintains support centers globally. Technical
Support’s primary role is to respond to specific queries about product features
and functionality. The Technical Support group also creates content for our online
Knowledge Base. The Technical Support group works collaboratively with the
other functional areas within Symantec to answer your questions in a timely
fashion. For example, the Technical Support group works with Product Engineering
and Symantec Security Response to provide alerting services and virus definition
updates.
Symantec’s support offerings include the following:
■ A range of support options that give you the flexibility to select the right
amount of service for any size organization
■ Telephone and/or Web-based support that provides rapid response and
up-to-the-minute information
■ Upgrade assurance that delivers software upgrades
■ Global support purchased on a regional business hours or 24 hours a day, 7
days a week basis
■ Premium service offerings that include Account Management Services
For information about Symantec’s support offerings, you can visit our Web site
at the following URL:
www.symantec.com/business/support/
All support services will be delivered in accordance with your support agreement
and the then-current enterprise technical support policy.
Customer service
Customer service information is available at the following URL:
www.symantec.com/business/support/
Customer Service is available to assist with non-technical questions, such as the
following types of issues:
■ Questions regarding product licensing or serialization
■ Product registration updates, such as address or name changes
■ General product information (features, language availability, local dealers)
■ Latest information about product updates and upgrades
■ Information about upgrade assurance and support contracts
■ Information about the Symantec Buying Programs
■ Advice about Symantec's technical support options
■ Nontechnical presales questions
■ Issues that are related to CD-ROMs, DVDs, or manuals
Support agreement resources
If you want to contact Symantec regarding an existing support agreement, please
contact the support agreement administration team for your region as follows:
Table 1-1 Symantec Messaging Gateway new features and enhanced features
Creation of custom spam You can obtain custom spam rules specifically for your
rules organization based on the missed spam messages and false
positive messages that administrators and end users submit.
This feature provides the following benefits:
Table 1-1 Symantec Messaging Gateway new features and enhanced features
(continued)
IPv6 addresses are Symantec Messaging Gateway lets any host in a deployment be
supported provisioned with IPv6 addresses.
Ability to bypass You can conserve scanning resources when you select the
scanning content malware policy action to bypass the scanning of content filtering
filtering policies when policies. Symantec Messaging Gateway takes the actions that
Symantec Messaging you specify for that malware policy but does not scan the
Gateway detects malware message for content filtering policies. When you select this
action, you can bypass the scanning of specific content filtering
policies or of all content filtering policies.
Improvements to spam You can now send spam or suspected messages to content
filtering incident folders. This feature lets you categorize spam and
suspected spam messages into content incident folders so that
you can analyze them and fine-tune your spam policies.
When you create or modify a spam policy, you now have the
option to Create an informational incident or Create a
quarantine incident for a policy action. Then you specify the
informational incident or quarantine incident folder that you
want to use (you must have previously created these folders).
You can also select these options when you configure sender
authentication failure.
12 Introducing Symantec Messaging Gateway
What's new in Symantec Messaging Gateway
Table 1-1 Symantec Messaging Gateway new features and enhanced features
(continued)
Additional information The message queue now provides details about how many times
about messages in the the MTA attempted to deliver a message and when the next
message queue and delivery attempt is scheduled.
message audit log
The message audit log also includes details about the message
delivery attempts and contains the logical IP address as well.
The logical IP address is derived from the “Received:” headers
of the message content. Symantec Messaging Gateway uses this
IP address for filtering purposes. Based on your deployment,
this address may be identical to the “Accepted from” IP address.
Greater flexibility to Symantec Messaging Gateway now lets you customize your
customize your backups backups. In addition to a full backup, you can back up all
configuration data (which includes policies), plus one or more
of the following: log data, reports, and messages in content
incident folders.
Additional negative Negative rules are rules in which a condition must not be present
content filtering policy to trigger a violation. An example of a negative rule is: does not
conditions contain Subject.
Ability to scan HTML Previously, Symantec Messaging Gateway only scanned the
tags in the message body HTML body. Now you can scan HTML tags in the body of the
message.
Introducing Symantec Messaging Gateway 13
What's new in Symantec Messaging Gateway
Table 1-1 Symantec Messaging Gateway new features and enhanced features
(continued)
Specify subsequent You can now define how you want Symantec Messaging Gateway
content filtering policy to address subsequent content filtering policies. When a policy
actions is triggered, you may still want to have Symantec Messaging
Gateway perform any non-conflicting actions for the next policy
that it evaluates. Or you can specify that for the next policy
evaluated, to only create incidents in an incident folder or send
a notification if those actions are specified. Another option
would be that once a message triggers a content filtering policy,
no subsequent content filtering policies are evaluated. This
option conserves scanning resources.
All predefined All of the predefined attachment lists that Symantec provides
attachment lists are now in Symantec Messaging Gateway are now premium attachment
premium attachment lists. These premium attachment lists cannot be modified nor
lists deleted. But you can copy any of these lists and modify the
copies. You can also delete custom lists when they are no longer
needed.
New content filtering These new variables provide links to the Control Center pages
incident notification where users can view or remediate incidents. The new variables
message variables also let you specify whether users can auto-authenticate or if
they must type their credentials to access the Control Center.
14 Introducing Symantec Messaging Gateway
Where to get more information
Table 1-1 Symantec Messaging Gateway new features and enhanced features
(continued)
New custom policy In addition to the ability to approve incidents or reject incidents
actions in quarantine incident folders, you can also create a custom
action. You define the custom action when you configure policy
actions.
www.symantec.com/business/support/
documentation.jsp?language=englishview=
manualspid=53991
Symantec Web site Visit the Symantec Web site for more information about
your product as follows:
■ www.symantec.com/enterprise/support
Provides access to the technical support knowledge base,
newsgroups, contact information, downloads, and
mailing list subscriptions
■ https://licensing.symantec.com/acctmgmt/index.jsp
Provides information about registration, frequently
asked questions, how to respond to error messages, and
how to contact Symantec License Administration
■ www.symantec.com/business/index.jsp
Provides product news and updates
■ www.symantec.com/business/security_response/index.jsp
Provides you access to the virus encyclopedia, which
contains information about all known threats;
information about hoaxes; and access to white papers
about threats
Control Center A Control Center lets you configure and manage all of the following
from a Web-based interface:
■ Email filtering
■ SMTP routing
■ System settings
■ Spam Quarantine
■ Suspect Virus Quarantine
■ Content filtering incident folders
■ All other functions
You must configure one Control Center for your site. One Control
Center controls one or more Scanners.
Control Center and Performs both functions. This configuration is suitable for smaller
Scanner installations.
Note: This documentation assumes that you will configure a single appliance as
both a Control Center and a Scanner, and that your Scanner will perform inbound
and outbound mail filtering. If your filtering requirements exceed this basic
scenario, refer to the Symantec Messaging Gateway Installation Guide.
Chapter 2
Installing your appliance
This chapter includes the following topics:
■ Installation checklist
■ System requirements
Symantec Messaging Install and run a virtual appliance, using your choice of
Gateway Virtual Edition hardware.
Installation checklist
Table 2-1 describes the information to have on hand and the hardware to have in
before you install Symantec Messaging Gateway.
Item Description
Console access to Keyboard and VGA monitor or through another computer through
appliance for initial a serial port. After initial setup, you can log into an appliance's
setup command line interface using SSH.
Valid license file The same license file can be used to license multiple appliances.
Hostname The URL you use to access the appliance's Control Center Web
interface.
Domain Name Servers DNS is required to route email. You can use the Internet root
(DNS) DNS servers or specify internal DNS servers.
Item Description
Hostname, port, user Instead of using a direct connection, you can optionally specify
name, and password for a proxy for registration, filters, and retrieval of virus definitions
proxy (optional) using LiveUpdate.
IP addresses from If there are MTAs configured between your Scanners and the
which to permit traffic Internet, on the Inbound Mail Filtering - Connections wizard
page, configure the Scanners to only accept email from the
upstream MTAs. If there is a firewall between any of your
appliances and the Internet, the firewall must be configured to
permit network traffic through certain ports.
System requirements
Table 2-2 lists the minimal system requirements.
Item Requirement
5 Connect an Ethernet cable to the Ethernet jack that is labeled 1 on the back
panel of the appliance, which corresponds to eth0.
To use the second Ethernet port for outbound traffic, connect a second cable
to the Ethernet jack that is labeled 2 on the back of the appliance and
corresponds to eth1.
See “Starting the appliance software set up” on page 20.
4 When you are prompted, type a fully qualified domain name for this host.
To avoid problems with message routing, this host name should not be your
mail domain, such as symantecexample.com.
For example, the name should be similar in form to:
host6.symantecexample.com
192.168.0.1
2 When you are prompted, type the subnet mask for Ethernet interface 1.
For example:
255.255.255.0
22 Installing your appliance
Specifying a static IP address for routing
3 When you are prompted if you want to use the second Ethernet interface,
interface 2, type one of the following responses:
4 When you are prompted, type the IP address for Ethernet interface 2.
For example:
192.168.12.3
5 When you are prompted, type the subnet mask for Ethernet interface 2.
For example:
255.255.255.0
2 When you are prompted, specify the IP address or CIDR block of the
destination host or network.
3 If you configure multiple Ethernet interfaces, you are prompted to specify
the Ethernet Interface number (either 1 or 2, the default is 1).
This setting is to force the route to be associated with the specified device.
4 When you are prompted whether you want to add another static IP address,
type one of the following responses:
4 To continue installation, next you specify the role for the appliance.
See “Specifying the role for the appliance” on page 24.
2 For Scanner only, when prompted, type the IP address of the Control Center
that you intend to use to manage this Scanner.
3 When you are prompted, type one of the following responses:
Note: For your Scanners, ensure that your network is configured to permit
outbound connections to Symantec on port 443. Symantec Messaging Gateway
communicates with Symantec Security Response over a secure connection for
product registration and ongoing operations.
If you are performing the initial setup of your appliance, these steps appear in
the setup wizard after the appliance restarts.
See “Specifying the role for the appliance” on page 24.
26 Installing your appliance
Registering your license
10 If you have another license file for a different feature, repeat the process for
registering each license.
11 When all of the license files are successfully registered, click Next.
If your software is up-to-date, the setup wizard appears. Continue with the
installation process.
See “Configuring the Control Center” on page 28.
If a software update is available, the Software Update page appears.
See “Updating to the latest software during initial setup” on page 27.
Do not change the time The time is correct and you do not want to make
changes. This option is the default setting.
Set time manually You want to manually change the time. Type the proper
values in the Date and Set Time fields.
Use NTP servers You want to use NTP servers to manage time. Type the
IP address for up to three NTP servers.
5 Click Next.
6 On the System Locale page, specify the locale that the appliance should use
for formatting numbers, dates, and times. This setting is the language and
regional formatting Symantec Messaging Gateway uses for messages.
7 Select a Quarantine fallback encoding format.
Fallback encoding is the formatting that the product uses for quarantined
messages if the formatting that you specified in the System Locale field fails.
30 Installing your appliance
Adding a Scanner through the Control Center
8 Click Next.
If your appliance has been set up as a Control Center and a Scanner, the
Scanner Role page appears, and you must define your Scanner role as
described in the following topics:
See “Configuring the Scanner for inbound and outbound mail filtering”
on page 32.
If you set up your appliance as a Control Center only, the Setup Summary
page lists your selected configuration options.
9 On the Setup Summary page, select any of the following options:
Finish You are satisfied with the settings and do not want to
make changes. This option is the default setting.
Cancel You want to end the setup without saving your changes.
You cannot use the appliance until you complete the
setup.
Note: None of the settings that you specify throughout the wizard are final until
you click Finish at the end of the wizard.
■ In the Host description box, type a description for the new Scanner.
■ In the Host name or IP address box, type the host name or IP address for
the new Scanner.
5 Click Next.
6 On the License Registration page, click Browse to locate your license file.
7 Select your license file and click Open to return to the License Registration
page.
8 If your Scanner uses a proxy server for communications with Symantec, click
Proxy Server.
9 To specify a proxy server, check Use HTTP Proxy and type the server host
name and port.
10 Click Register License.
If registration was successful, the License Registration page returns.
If the license registration fails, perform troubleshooting steps.
See “Troubleshooting license file registration” on page 27.
11 If you have another license file for a different feature, repeat the process for
registering each license.
12 When all the license files are successfully registered, click Next.
If your software needs to be updated, the Software Update page appears. If
not, proceed to step 14.
13 On the Software Update page, select any of the following options:
Update Updates your software now. After the update, the setup
wizard returns you to the Time Settings page.
14 On the Time Settings page, verify whether the date in the Current Appliance
Time area is correct. Select one of the following options:
Do not change the time The time is correct and you do not want to make
changes. This option is the default setting.
Set time manually You want to manually change the time. Type the proper
values in the Date and Set Time fields.
Use NTP servers You want to use NTP servers to manage time. Click and
provide the IP address for up to three NTP servers.
15 To complete the Add Scanner wizard, you must now configure the Scanner
based on its function.
See “Configuring the Scanner for inbound and outbound mail filtering”
on page 32.
To configure the Scanner for inbound or outbound filtering only, see the
Symantec Messaging Gateway Installation Guide.
3 Click Next.
Installing your appliance 33
Configuring the Scanner for inbound and outbound mail filtering
5 Click Next.
6 On the Inbound Mail Filtering page, click Inbound mail IP address to select
the IP address to use for inbound mail filtering.
7 In the Inbound mail SMTP port field, type the port, and then click Next.
8 On the Inbound Mail Filtering - Accepted Hosts page, to specify the IP
addresses of the mail servers from which this Scanner should accept inbound
mail, select one of the following options:
All IP addresses You want your Scanner to accept mail from all sources
or the Scanner is deployed at the gateway. For a
Scanner deployed at the Internet gateway, Symantec
recommends that you select this option to accept mail
from any MTA on the Internet.
Specific IP Addresses You want to restrict the domains from which your
Scanner accepts mail. Type IP addresses, CIDR ranges,
or domains. If the Scanner is deployed behind upstream
mail servers, specify the upstream mail servers.
9 Click Next.
34 Installing your appliance
Configuring the Scanner for inbound and outbound mail filtering
10 On the Local Domains page, check the addresses that you want to accept
inbound mail for in the Local Domains list.
To modify the list, do any of the following tasks:
To add an address Type the address into the Domain or email address
field for which to accept inbound mail field, and click
Add.
To import a list of addresses Click Import, and then navigate to an existing file.
11 Click Next.
12 On the Outbound Mail Filtering page, click the drop-down list to select the
IP address to use for outbound mail filtering.
13 In the Outbound mail SMTP port field, type the port, and click Next.
14 On the Outbound Mail Filtering - Accepted Hosts page, do one of the
following tasks:
■ Specify the internal host to which this Scanner should relay local domain
mail after filtering is complete. This server is typically a downstream mail
server, such as your corporate mail server.
■ Check Enable MX Lookup for this host. If you enable MX lookup, specify
a host name instead of an IP address.
15 Click Next.
16 On the Mail Filtering - Mail Delivery page, type a host name or IP address
and port to specify how you want to relay local domain filtered mail.
17 Optionally, check Enable MX lookup for this host.
Installing your appliance 35
Configuring the Scanner for inbound and outbound mail filtering
18 On the Mail Filtering - Non-local Mail Delivery page, select one of the
following options to specify how you want to relay filtered mail:
19 Click Next.
20 On the Setup Summary page, review your settings and select one of the
following options:
Finish You are satisfied with the settings and want to save
them.
You can deploy the Symantec Messaging Gateway as a virtual appliance on your
existing VMware infrastructure in one of the following ways:
■ As an OVF on ESX 4.x and ESXi 5/4.x
See “Deploying an OVF template on an ESX 4.x or ESXi 5/4.x Server”
on page 39.
■ As an ISO or OSrestore CD
See “Installing from an ISO image or OS restore CD onto a virtual machine on
your ESX or ESXi Server” on page 41.
The resources that are allocated to Symantec Messaging Gateway Virtual Edition
must meet the minimum requirements.
See “System requirements for virtual deployment” on page 38.
This documentation assumes the following:
■ Your environment has an existing VMware ESX or ESXi Server deployment.
■ You are familiar with administering virtual computers.
■ Your environment meets all pre-requisite system requirements.
For more information about VMware and to download trialware and prerequisite
applications, see the VMware Web site at www.vmware.com.
Note: Symantec Messaging Gateway does not support any version of BusLogic
Controller.
For requirements specific to VMware ESX Server and VMware ESXi Server, refer
to your VMware documentation.
Server 4.x. To deploy the OVF template, use a vSphere or vCenter client on a
different computer than the computer hosting your ESX or ESXi Server.
You may want to ensure that your guest computer is configured to restart when
the host computer restarts. Consult your VMware documentation for more
information.
Note: If you cannot successfully complete this procedure, you can instead use an
OS restore disk.
See “Installing from an ISO image or OS restore CD onto a virtual machine on
your ESX or ESXi Server” on page 41.
Note: By default, ESXi uses DHCP and does not use a root password. If you use
ESXi, Symantec recommends that you modify the ESXi settings to create a root
password and assign a static IP address before installation.
See “Specifying a static IP address for routing” on page 22.
To install from an ISO image or OS restore CD onto a virtual machine on your ESX
4.x or ESXi 5/4.x Server
1 Click on the ESX or ESXi Server on which you want to place your virtual
machine.
2 On the File menu, click New, then click Virtual Machine.
3 Select the Typical option and click Next.
4 Type a descriptive name for the virtual computer and click Next.
5 Select a data store option. This setting is where your virtual computer is
located on the physical disk. Make this selection based on your particular
storage configuration. Options can vary. Click Next.
6 Select the virtual machine version.
If you use ESX 4.x, select Virtual Machine version 7.
7 For the OS, click Linux as the guest operating system and Red Hat Enterprise
Linux 5 (32-bit) as the version, and then click Next.
42 Deploying Symantec Messaging Gateway as a Virtual Machine
Using an OS restore CD on your ESX or ESXi Server to boot your virtual computer
8 Reserve the necessary quantity of disk space, and then click Next.
See “System requirements for virtual deployment” on page 38.
More disk space may be required based on your deployment.
After you reserve disk space and complete deployment, any changes to disk
space require that you repeat the OS restore process.
9 Select the LSI SAS SCSI device.
10 On the Ready to Complete page, check Edit the virtual machine settings
before submitting and click Continue.
11 Click Memory at the left. Reserve the system memory based on your
deployment needs, and then click Next.
A minimum of 4 GB is necessary to run Symantec Messaging Gateway Virtual
Edition and the virtual computer. Symantec recommends that you use at least
8 GB.
12 Click CPU at the left. Select the number of virtual CPUs, and then click Next.
ESX 4.x and ESXi 4.x are limited to two virtual CPUs per virtual computer.
Symantec recommends allocating a minimum of two virtual processors.
13 If you want a second network interface, click the Add button at the top, choose
the Ethernet Adapter, click Next, click Next again, and click Finish.
14 Click Finish.
15 Continue the deployment to bootstrap your virtual appliance.
See “Using an OS restore CD on your ESX or ESXi Server to boot your virtual
computer” on page 42.
See “Using an ISO image on your datastore to boot your virtual computer”
on page 43.
See “Using an OS restore CD or ISO image on your local computer to boot
your virtual computer” on page 44.
To use an OS restore CD on your ESX or ESXi Server to boot your virtual computer
1 Insert the OS restore disk into your ESX or ESXi Server's CD drive.
2 Click Edit virtual machine settings.
3 On the Hardware tab, select CD/DVD Drive 1.
4 Choose Host Device and choose CD.
5 Check Connect at power on and click OK.
6 Click the power on virtual machine icon.
The virtual machine now reboots from the CD drive.
7 Click the Disconnect CD/DVD button and remove the disk from your drive
to prevent the system from performing another OS restore.
Symantec recommends that you disconnect your boot media immediately
after the initial boot process to avoid a future accidental OS restore.
8 Once the installation process is complete, turn off the computer through the
client and edit your computer settings.
9 On the Hardware tab, select CD/DVD Drive 1.
10 Uncheck Connect at power on and click OK.
11 Restart your computer to begin the Symantec Messaging Gateway boot
sequence.
4 Turn on your new computer and access your console. The boot process begins.
5 If the console prompts you to partition your SDA device, click your mouse
on the console window, and then press the Enter key for Yes.
6 Once the installation process is complete, turn off the computer through the
client and edit your computer settings.
7 On the Hardware tab, select CD/DVD Drive 1.
8 Uncheck Connect at power on and click OK.
9 Restart your computer to begin the Symantec Messaging Gateway boot
sequence.
8 If you are using in ISO image. click Connect CD/DVD > Use ISO image, and
browse to your ISO image. If you are using an OS restore CD, choose the letter
of your computer's CD/DVD drive.
The boot process begins.
9 Once the installation process is complete, the Symantec Messaging Gateway
boot sequence begins.
If the Symantec Messaging Gateway boot sequence does not begin, turn off
the computer through the client, click Disconnect CD/DVD device to
disconnect your ISO image, then restart your computer.
46 Deploying Symantec Messaging Gateway as a Virtual Machine
Using an OS restore CD or ISO image on your local computer to boot your virtual computer