08.11.2012 Views

Trend Micro Interscan Gateway Security Appliance M-Series ...

Trend Micro Interscan Gateway Security Appliance M-Series ...

Trend Micro Interscan Gateway Security Appliance M-Series ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

How InterScan <strong>Gateway</strong> <strong>Security</strong> <strong>Appliance</strong> Works<br />

identify spam sources. NRS blocks spam at its source by validating the IP address of<br />

the SMTP server sending the inbound mail to a list of IP addresses in the RBL and<br />

QIL databases.<br />

TABLE 2-3. RBL and QIL databases<br />

NRS Resource Description<br />

Real-Time Blackhole<br />

List (RBL)<br />

RBL is a database that contains the IP addresses of SMTP<br />

servers that originate spam or are considered to be spam<br />

open-relay hosts. InterScan <strong>Gateway</strong> <strong>Security</strong> <strong>Appliance</strong> categorizes<br />

the IP addresses listed in the RBL as permanent<br />

sources of spam.<br />

QIL QIL is a database that contains the IP addresses of SMTP<br />

servers that either originate spam or are considered to be<br />

spam open-relay hosts. InterScan <strong>Gateway</strong> <strong>Security</strong> <strong>Appliance</strong><br />

categorizes the IP addresses listed in the QIL as impermanent<br />

sources of spam. The IP addresses in this list change<br />

frequently.<br />

How Network Reputation Services Works<br />

Network Reputation Services (NRS) blocks spam by comparing the IP address of an<br />

SMTP server to lists containing the IP addresses of known spam distributors.<br />

For example, user A, in Seattle, sends email to user B in Los Angeles. User B's<br />

SMTP server is behind an InterScan <strong>Gateway</strong> <strong>Security</strong> <strong>Appliance</strong> and the NRS<br />

service is enabled with the Low setting selected.When InterScan <strong>Gateway</strong> <strong>Security</strong><br />

<strong>Appliance</strong> receives the email sending from user A's SMTP server to user B's SMTP<br />

server, it first checks Server A's IP address against the RBL database. If user A's<br />

SMTP server IP address is not on the list, InterScan <strong>Gateway</strong> <strong>Security</strong> <strong>Appliance</strong><br />

sends the email to user B's SMTP server. However, if user A's SMTP server IP<br />

address is on the list, InterScan <strong>Gateway</strong> <strong>Security</strong> <strong>Appliance</strong> takes the action that the<br />

administrator defined in the Action settings screen.<br />

If the administrator chose High setting in the Network Reputation Services screen,<br />

InterScan <strong>Gateway</strong> <strong>Security</strong> <strong>Appliance</strong> first checks the IP address of user A's SMTP<br />

server against the RBL database. If the SMTP server IP address is not in the RBL<br />

database, InterScan <strong>Gateway</strong> <strong>Security</strong> <strong>Appliance</strong> then queries the QIL database. If<br />

the SMTP server IP address is not in the QIL database, InterScan <strong>Gateway</strong> <strong>Security</strong><br />

<strong>Appliance</strong> forwards the email to user B's SMTP server. If the QIL database does have<br />

2-11

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!