F-SECURE ANTI-VIRUS - FOR MICROSOFT EXCHANGE Administrator's Manual - page 98
98
2.4.7
Proxy Configuration
Specify proxy server parameters that Content Scanner Server uses when
it connects to the threat detection center.
Heuristic Scanning - F-Secure Content Scanner
Server checks the message using spam
heuristics.
Trusted Networks
Specify networks and hosts in the mail relay
network which can be trusted not to be operated
by spammers and do not have open relays or
open proxies.
Define the network as a network/netmask pair
(10.1.0.0/255.255.0.0), with the network/nnn
CIDR specification (10.1.0.0/16), or use ‘*’
wildcard to match any number and ‘-’ to define a
range of numbers (172.16.*.1, 172.16.4.10-110).
Use Proxy Server
Specify whether F-Secure Content Scanner
Server uses a proxy server when it connects to
the threat detection center.
Proxy Server Address Specify the address of the proxy server.
Proxy Server Port
Specify the port number of the proxy server.