Bypass FileThis file contains bypass conditions each per line which serve as a bypass criteria for the functionality. Generally bypass files should be used for trusted remote addresses. Formal Syntax: |
|||
filters | = | *(filteritem) | |
filteritem | = | [prefix] (domainitem / ipaddressitem / emailaddressitem / serveritem) CRLF | |
prefix | = | ("s:" / "r:" / "a:" / "i:" / "w:" / "f:" / "l:" / "t:") ; sender, recipient, A record, IP address, DNSWL, File, Local sender, Trusted IP | |
domainitem | = | domain / domainmaskstring | |
ipaddressitem | = | ipaddress / ipmaskstring / ipbitmask | |
emailaddressitem | = | emailaddress / emailmaskstring | |
serveritem | = | server | For DNSWL filter you should specify the DNSWL server to check |
Example: |
|||
s:john@deer.com a:mail.icewarp.com f:c:\data\bypass\allbypass.dat icewarp.com bill@microsoft.com 192.168.*.* 172.16.10.0/24 l: |