Document Version 10.04.4.0028 - 08/10/2013: Cyberoam Anti Spam Implementation Guide
Document Version 10.04.4.0028 - 08/10/2013: Cyberoam Anti Spam Implementation Guide
Document Version 10.04.4.0028 - 08/10/2013: Cyberoam Anti Spam Implementation Guide
Implementation Guide
Version 10
Version 7
Version 7
Important Notice
Cyberoam Technologies Pvt. Ltd. has supplied this Information believing it to be accurate and reliable at the time of printing, but
is presented without warranty of any kind, expressed or implied. Users must take full responsibility for their application of any
products. Cyberoam Technologies Pvt. Ltd. assumes no responsibility for any errors that may appear in this document.
Cyberoam Technologies Pvt. Ltd. reserves the right, without notice to make changes in product design or specifications.
Information is subject to change without notice.
USERS LICENSE
Use of this product and document is subject to acceptance of the terms and conditions of Cyberoam End User License
Agreement (EULA) and Warranty Policy for Cyberoam UTM Appliances.
You will find the copy of the EULA at http://www.cyberoam.com/documents/EULA.html and the Warranty Policy for Cyberoam
UTM Appliances at http://kb.cyberoam.com.
RESTRICTED RIGHTS
Copyright 1999 - 2013 Cyberoam Technologies Pvt. Ltd. All rights reserved. Cyberoam, Cyberoam logo are trademark of
Cyberoam Technologies Pvt. Ltd.
Corporate Headquarters
Cyberoam Technologies Pvt. Ltd.
901, Silicon Tower, Off. C.G. Road,
Ahmedabad 380006, INDIA
Phone: +91-79-66065606
Fax: +91-79-26407640
Web site: www.cyberoam.com
Contents
Preface ................................................................................................................................. 3
About this Guide ................................................................................................................. 4
Overview .............................................................................................................................. 6
Spam .................................................................................................................................... 7
Cyberoam Gateway Anti Spam .......................................................................................... 8
Configuration ..................................................................................................................................... 9
Configuration .................................................................................................................................... 9
Address Group ............................................................................................................................... 11
Email Archiver ................................................................................................................................ 14
Spam Rules ...................................................................................................................................... 16
Spam Rules ................................................................................................................................... 17
Quarantine ........................................................................................................................................ 23
Quarantine Digest Settings ............................................................................................................ 23
Quarantine Area ............................................................................................................................. 27
Trusted Domain ............................................................................................................................... 28
Preface
Cyberoam Unified Threat Management appliances offer identity-based comprehensive security to
organizations against blended threats - worms, viruses, malware, data loss, identity theft; threats
over applications viz. Instant Messengers; threats over secure protocols viz. HTTPS; and more.
They also offer wireless security (WLAN) and 3G wireless broadband and analog modem support
can be used as either Active or Backup WAN connection for business continuity.
Cyberoam integrates features like stateful inspection firewall, VPN, Gateway Anti-Virus and AntiSpyware, Gateway Anti-Spam, Intrusion Prevention System, Content & Application Filtering, Data
Leakage Prevention, IM Management and Control, Layer 7 visibility, Bandwidth Management,
Multiple Link Management, Comprehensive Reporting over a single platform.
Cyberoam has enhanced security by adding an 8th layer (User Identity) to the protocol stack.
Advanced inspection provides L8 user-identity and L7 application detail in classifying traffic,
enabling Administrators to apply access and bandwidth policies far beyond the controls that
traditional UTMs support. It thus offers security to organizations across layer 2 - layer 8, without
compromising productivity and connectivity.
Cyberoam UTM appliances accelerate unified security by enabling single-point control of all its
security features through a Web 2.0-based GUI. An extensible architecture and an IPv6 Ready
Gold logo provide Cyberoam the readiness to deliver on future security requirements.
Cyberoam provides increased LAN security by providing separate port for connecting to the
publicly accessible servers like Web server, Mail server, FTP server etc. hosted in DMZ which are
visible the external world and still have firewall protection.
Note
Typographic Conventions
Material in this manual is presented in text, screen displays, or command-line notation.
Item
Convention
Server
Client
User
Username
Part titles
Topic titles
Example
Bold and
shaded font
typefaces
Shaded font
typefaces
Report
Introduction
Subtitles
Navigation link
Bold typeface
Name of a
particular
parameter /
field / command
button text
Cross
references
Notes & points
to remember
Lowercase
italic type
Prerequisites
Bold typefaces
between the
black borders
Hyperlink in
different color
Bold typeface
between the
black borders
Notation conventions
Note
Prerequisite
Prerequisite
Technical Support
You may direct all questions, comments, or requests concerning the software you purchased, your
registration status, or similar issues to Customer care/service department at the following address:
Corporate Office
Cyberoam Technologies Pvt. Ltd.
901, Silicon Tower
Off C.G. Road
Ahmedabad 380006
Gujarat, India.
Phone: +91-79-66065606
Fax: +91-79-26407640
Web site: www.cyberoam.com
Cyberoam contact:
Technical support (Corporate Office): +91-79-26400707
Email: support@cyberoam.com
Web site: www.cyberoam.com
Overview
Welcome to Cyberoams Anti Spam User guide.
Cyberoam is an Identity-based UTM Appliance. Cyberoams solution is purpose-built to meet the
security needs of corporate, government organizations, and educational institutions.
Cyberoams perfect blend of best-of-breed solutions includes User based Firewall, Content
filtering, Anti Virus, Anti Spam, Intrusion Prevention System (IPS), and VPN(IPSec and SSL).
Cyberoam provides increased LAN security by providing separate port for connecting to the
publicly accessible servers like Web server, Mail server, FTP server etc. hosted in DMZ which are
visible to the external world and still have firewall protection.
Cyberoam Anti Spam as a part of unified solution along with Anti Virus and IPS (Intrusion
Prevention System) provides real time virus and spam scanning.
Anti Spam module is an add-on module which needs to be subscribed before use.
Note
All the screen shots in the Cyberoam User Guides have been taken from NG series of appliances. The
feature and functionalities however remains unchanged across all Cyberoam appliances.
Spam
Spam refers to electronic junk mail or junk newsgroup postings. Some people define spam even
more generally as any unsolicited Email.
Spamming is to indiscriminately send unsolicited, unwanted, irrelevant, or inappropriate messages,
especially commercial advertising in mass quantities. In other words, it is an inappropriate attempt
to use a mailing list, or other networked communications facility as a broadcast medium by
sending the same message to a large number of people who did not ask for it.
In addition to being a nuisance, it also eats up a lot of network bandwidth. Because the Internet is
a public network, little can be done to prevent spam, just as it is impossible to prevent junk mail.
However, the use of software filters in Email programs can be used to remove most spam sent
through Email to certain extent.
With the number of computer users growing and the exchange of information via the Internet and
Email increases in volume, spamming has become an almost everyday occurrence. Apart from
network bandwidth, it also affects the employees productive as deletion of such mails is a huge
task. Anti spam protection is therefore a priority for anyone who uses a computer.
Note
Outbound Anti Spam is a subscription based module.
Configuration
Spam Rules
Quarantine
Trusted Domain
Configuration
Anti Spam Configuration allows configuring scanning rules for traffic SMTP, POP, and IMAP
defined on Address Groups or individual Emails Address or IP Address or RBLs. Administrator is
notified for critical events via system warnings and Email notifications. The administrator can
archive almost all the Emails coming into the organization and thereby keep a close watch over
data leakage.
Configuration
Address Group
Email Archiver
Configuration
Configure restrictions on mails from Anti Spam Configuration Configuration.
Screen Elements
Description
Verify
Senders
IP
By default, it is disabled.
Enable IP Reputation, if you want to verify the reputation of
Reputation
Note
For Cyberoam CR15i models:
Specify 0 for default size restriction of 1024 KB i.e. files
exceeding 1024 KB will not be scanned if 0 is configured.
SMTP Oversize Mail
Action
Note
For Cyberoam CR15i models:
Specify 0 for default size restriction of 1024 KB i.e. files
exceeding 1024 KB will not be scanned if 0 is configured.
10
Header
To
Detect
Recipient or POP3 /
IMAP
Address Group
Address Group is the group of Email Addresses, IP Addresses, or RBLs. An address can be
member of multiple groups. To make configuration simpler you can group addresses when
applying policy. Policy applied on the address group is applicable on all the group members.
To make it easier to add Anti Spam rules, create groups of Email Addresses or IP Addresses, or
RBLs and then add one Spam Rule to take action for all Address in the group. An Address can be
member of multiple groups i.e. Address can be included in multiple Address Group.
Scanning rule can be defined for individual or group of
Email Address or Domain
IP Address
RBL (Real time black hole List) (applicable only for the spam mails)
RBL is a list of IP Addresses whose owners refuse to stop the proliferation of spam i.e. are
responsible for spam or are hijacked for spam relay. This IP Addresses might also be used for
spreading virus.
Cyberoam will check each RBL for the connecting IP Address. If the IP Address matches to the
one on the list then the specified action in policy is taken.
To manage Address Groups, go to Anti Spam Configuration Address Group.
Add
View
Edit Click the Edit icon
in the Manage column against the Address Group to be modified.
Edit Address Group pop-up window is displayed which has the same parameter as the Add
Address Group window. Alternately, Click on the Address Group Name to open the Edit
Address Group window.
Delete Click the Delete icon
in the Manage column against an Address Group to be
deleted. A dialog box is displayed asking you to confirm the deletion. Click OK to delete the
Address Group. To delete multiple Address Groups, select them
and click the Delete button.
11
Screen Elements
Description
Add Button
Name
Type
Description
Import Icon
Click
Edit Icon
Delete Button
12
Screen Elements
Description
Name
Group Type
13
Available Options:
Import Select to browse and import a CSV file or a text
file to add the Email Address/Domain to address group.
Manual Select to manually
Address/Domain to address group.
Description
add
the
to delete
Email Archiver
If you want Administrator or any other person in the organization to know about incoming mails into
the organization, you can specify Email Address to which you want to forward the copy of such
mails.
By using Email Archiver, the administrator can archive almost all the Emails coming into the
organization and thereby keep a close watch over data leakage. Emails of a specific recipient or a
group of recipients can be archived using Email Archiver. Create multiple archivers to send a copy
of Emails to more than one administrator.
Cyberoam can archive all Emails intended for a single or multiple recipients and can be forwarded
to the single administrator or multiple administrators from Anti Spam Configuration
Email Archiver. You can:
Add
View
Edit Click the Edit icon
in the Manage column against the Rule to be modified. Edit Email
Archiver window is displayed that has the same parameters as the Add Email Archiver window.
Delete Click the Delete icon
in the Manage column against Email Archiver to be deleted.
A dialog box is displayed asking you to confirm the deletion. Click OK to delete the Email
Archiver. To delete multiple Email Archivers, select them
and click the Delete button.
Search Click the Search icon
in the Recipient column to search for specific recipients.
Address can be searched on the following criteria: is, is not, contains, does not contain. A popup window is displayed that has filter conditions for search. Click OK to get the search results
and Clear button to clear the results.
Search Criteria
Search Results
is
14
contains
does
contain
not
Screen Elements
Description
Add Button
Name
Recipient
Send Copy To
Edit Icon
Delete Button
15
Screen Elements
Description
Name
Recipient
Spam Rules
As soon as you subscribe Cyberoam Gateway Anti Spam, Spam Rules can be configured for
particular sender and recipients.
Spam Rule defines what action is to be taken if the mail is identified as a spam and to which Email
16
Address the copy of mail is to be sent. These rules can be applied directly to Email Addresses now
and thus, traffic can be directly scanned for Spam mails.
To reduce the risk of losing the legitimate messages, spam quarantine repository - a storage
location, provides administrators a way to automatically quarantine and remediate messages that
are identified as spam.
This will help in managing spam and probable spam quarantined mails and you can take
appropriate actions on such mails.
Detection of Spam attributes
Cyberoam uses content filtering and three RBLs - Real time Blackhole Lists to check for the
spam attributes in SMTP as well as POP3 / IMAP mails:
Premium
Standard
RBL is a list of IP Addresses whose owners refuse to stop the proliferation of spam i.e. are
responsible for spam or are hijacked for Spam Relay.
Cyberoam will check each RBL for the connecting IP Address. If the IP Address matches to the
one on the list then the specified action in policy is taken.
Spam Rules
Spam Rules
To manage Spam Rules, go to Anti Spam Spam Rules Spam Rules. You can:
Add
View
Edit Click the Edit icon
in the Manage column against the Spam Rule to be modified. Edit
Spam Rule window is displayed that has the same parameters as the Add Spam Rule window.
Search Click the Search icon
in the Sender and Recipient columns to search for specific
senders and recipients. Address can be searched on the following criteria: is, is not, contains,
does not contain. A pop-up window is displayed that has filter conditions for search. Click OK to
get the search results and Clear button to clear the results.
Search Results
is
17
contains
does
contain
not
Screen Elements
Description
Add button
Name
Sender
Recipient
18
Rules
Action
SMTP
POP3/IMAP
Edit Icon
Delete Button
in the
Note
On subscribing Outbound Spam, parameter Anti Spam Module Has Identified Mail As is renamed as
Inbound Anti Spam Module Has Identified Mail As is displayed.
Screen Elements
Description
19
Name
Recipient Email
Sender Email
IF Conditions
Anti Spam / Inbound
Anti Spam Module Has
Identified Mail As
(Parameter
Inbound
Anti Spam Module Has
Identified Mail As is
displayed on Outbound
Spam subscription)
20
Address
Sender
IP
Address
Blacklisted by RBL
Message Size Is
21
None
Then
SMTP Action
Reject
Drop
Change Recipient
Protocol
SMTP
Action
Reject
Meaning
Mail is rejected and rejection notification is sent to
the mail sender.
SMTP
Drop
SMTP, POP3
Accept
SMTP
Change
Recipient
22
SMTP, POP3
Prefix Subject
SMTP
Quarantine
Quarantine
Quarantine Digest is an Email and contains a list of quarantined messages filtered by Cyberoam
and held in the user Quarantine Area. If configured, Cyberoam mails the Quarantine Digest as per
the configured frequency to the user. Digest provides a link to User My Account from where user
can access his quarantined messages and take the required action.
Quarantine Digest Settings
Quarantine Area
Note
Entire Quarantine menu is not available for Cyberoam CR15i models.
23
Screen Elements
Description
Quarantine Digest Settings (Spam Digest Settings will be applicable only after you
subscribe for "Gateway Anti Spam" module.)
Enable
Digest
Quarantine
Email Frequency
Display Name
Specify mail sender name. Digest mail will be sent with the
configured name.
24
Reference My Account
IP
Allow Override
Change
Quarantine
Settings
Users
Digest
Description
User Name
Displays username.
Name
25
Group
Edit Icon
Search Criteria
Search Results
is
is not
contains
26
Quarantine Area
Under Quarantine Area, Quarantined Mails can be searched based on sender Email Address,
receiver Email Address, and subject.
Use Filter Result section to search for mails from the list of Quarantined Mails. To view and
release the Quarantined Mails go to, Anti Spam > Quarantine > Quarantine Area.
Cyberoam reserves 5GB for Quarantine Area. Once the quarantine repository is full, older Emails
are purged.
Description
Select the starting date from Calendar by clicking on
Calendar
icon
End Date
Sender
Receiver
Filter
27
Mails.
Clear
Subject
Specify a Subject.
Sender
Recipient
Subject
Time Stamp
Release Icon
Trusted Domain
Cyberoam also allows bypassing RBL scanning of mails from the certain domains. For this, you
have to define the domains as the trusted domains.
To manage local domains, go to Anti Spam > Trusted Domain > Trusted Domain. You
can:
Add Specify the Domain name and click the Add Button. Mails from the specified domains will
not be scanned.
Delete Click the Delete icon
in the Manage column against a Domain to be deleted. A
dialog box is displayed asking you to confirm the deletion. Click OK to delete the Domain. To
delete multiple domains, select them
and click the Delete button.
28
Description
Add Button
Domain Name
Delete Button
29