What can I do if my Security Appliance is being used to relay SPAM?
The first step to preventing SPAM is understanding that mailicious users are sending it by telneting to an open port on the device and are then utilizing the CONNECT method on port 25 to issue the request. Atypical SQUID format access log entry for such behavior is as follows:
Rate this Page
Please take a moment to complete this form to help us better serve you.