Barracuda Networks 4 Instalační příručka Strana 78

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 142
  • Tabulka s obsahem
  • ŘEŠENÍ PROBLÉMŮ
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 77
78 Barracuda Spam Firewall Administrator’s Guide
Table 6.5:
LDAP Server The name of your LDAP server to use for authenticating message
recipients.
To specify two LDAP servers for failover purposes, enter the IP
address of each LDAP server separated by a space. The username,
password, filers, search base, and port need to be the same for both
LDAP servers.
Exchange Acclerator Enabled Controls whether LDAP lookups are performed for recipient
verification. If set to Yes, the LDAP settings will be used. If set to No,
the Barracuda Spam Firewall defaults to SMTP verification through
RCPT TO commands.
For more information about the Exchange Accelerator feature, read
the text located above this field in the administration interface.
Unify Email Aliases Whether the Barracuda Spam Firewall unifies all e-mail aliases for a
single user. Selecting Yes makes all messages sent to any of the
user’s aliases use the same preferences and same quarantine inbox.
You must have an LDAP server specified on this page for the Unify
Email Aliases feature to work.
This feature is not available in the Barracuda Spam Firewall 200.
The Unify Alias feature links individual aliases together. For example,
[email protected] were all associated with one account, then the
Barracuda Spam Firewall would link all the aliases to the primary
account.
SSL/TLS Mode LDAP supports two modes for secure communications.
LDAPS—The original mode typically used with version 2 of the
LDAP protocol. LDAPS is a traditional out-of-band SSL/TLS
connection where SSL/TLS is first negotiated and then the LDAP
protocol is spoken over this channel. The port for LDAPS is usually
636.
StartTLS—Introduced with version 3 of the LDAP protocol. In this
mode, an unsecured LDAP connection is initially made. The client
then tells the server it wishes to upgrade to SSL/TLS. If the server
supports it and its policy allows StartTLS, then SSL/TLS is
negotiated and all further communication occurs securely. The
StartTLS capability can be offered on the same port as plain-text
LDAP and therefore is typically the default port 389.
If SSL/TLS is off, then LDAP communications will occur in plain-text.
This is often desirable if the network between your Barracuda Spam
Firewall and your LDAP server(s) is private and/or anonymous
authentication is used (meaning no username/DN and password is
sent). Plain-text LDAP is significantly more efficient than LDAP over
SSL/TLS because SSL/TLS can introduce significant processing
delays, especially when connecting to the LDAP server.
Zobrazit stránku 77
1 2 ... 73 74 75 76 77 78 79 80 81 82 83 ... 141 142

Komentáře k této Příručce

Žádné komentáře