Andrew, > I think you should start by turning off the "Disable insertion of InterScan > "Received:" header when processing messages". This is on the Advanced > Options of the GUI, or in the intscan.ini in the [EMail-Scan] section by > setting DisabledReceivedHeader=no.
That is not available in the Unix version of VirusWall that we are using. InterScan v3.8 for UNIX Version Information : Scan Engine: 5.600-1011 Pattern Number: 600 SMTP version: 3.8-Build_1080 FTP version: 3.8-Build_1080 HTTP version: 3.8-Build_1080 > Then put in an IPBYPASS for that IP, which you say is 10.0.0.14 That is already configured as such. > And FWIW, the Trend Micro InterScan VirusWall SMTP module does not "gateway > the TCP connection". It is a normal mail relay. It behaves as a normal MTA, > receiving the entire message and committing it to disk before it scans the > message for a virus. The confusing bit is that it happens to have a feature > that it can happily forward mail to any port you specify (instead of just > tcp/25), which is a convenience for many who want to run the VirusWall on > the same box as their usual MTA. That is true of VirusWall NT (which we used to implement), but is not true of VirusWall Linux. When you telnet to VirusWall Linux, you recieve the SMTP greeting from IMail. If IMail is not running, you cannot establish a connection to VirusWall Unix. -- Thomas Kishel, Department Head - Systems Larson Texts, Inc. --- [This E-mail was scanned for viruses by Declude Virus (http://www.declude.com)] --- This E-mail came from the Declude.JunkMail mailing list. To unsubscribe, just send an E-mail to [EMAIL PROTECTED], and type "unsubscribe Declude.JunkMail". The archives can be found at http://www.mail-archive.com.