F-SECURE ANTI-VIRUS FOR MICROSOFT EXCHANGE 6.62 - Administrator's Manual - page 289
CHAPTER 6
289
Administration with Web Console
6.3.4
Proxy Configuration
You can specify proxy server parameters that Content Scanner Server
uses when it connects to the threat detection center on the Proxy
Configuration page.
Pass through - The message is passed through
without scanning it for spam.
Heuristic Scanning - F-Secure Content Scanner
Server checks the message using spam
heuristics.
Trusted networks
Specify networks and hosts in the mail relay
network which can be trusted not to be operated
by spammers and do not have open relays or
open proxies.
Define the network as a network/netmask pair
(10.1.0.0/255.255.0.0), with the network/nnn
CIDR specification (10.1.0.0/16), or use ‘*’
wildcard to match any number and ‘-’ to define a
range of numbers (172.16.*.1, 172.16.4.10-110).