Previous | Next | Contents | Index |
This chapter discusses how to configure PMDF to act as an e-mail firewall, and various e-mail security issues to consider when doing so. Judicious implementation of the broad spectrum of techniques described below provides an effective e-mail firewall. Many of the techniques and configuration strategies described below can also be of interest even in a regular, non-e-mail-firewall configuration.
Previous | Next | Contents | Index |