Carrier web-based manager settings

MMS Bulk Email Filtering Detection

This section of the New MMS Profile page contains numerous sections where you can configure specific set- tings for flood threshold, duplicate threshold and recipient MSISDNs.

Message Flood

The message flood settings for each flood threshold. Expand each to configure settings for a threshold.

Flood Threshold 1                       Expand to reveal the flood threshold settings for Flood Threshold 1. The settings for Flood Threshold 1 are the same for Flood Threshold 2 and 3.

Enable                              Select to apply Flood Threshold 1 to the MSISDN exception.

Message Flood Win- dow

Enter the period of time during which a message flood will be detected if the Message Flood Limit is exceeded. The message flood window can be 1 to 2880 minutes (48 hours).

Message Flood Limit

Enter the number of messages which signifies a message flood if exceeded within the Message Flood Window.

Message Flood Block Time

Enter the amount of time during which the unit performs the Message

Flood Action after a message flood is detected.

Message Flood

ActioSelect one or more actions that the unit is to perform when a message flood is detected.

Flood Threshold 2

Flood Threshold 3

Expand to configure settings for Flood Threshold 2 or 3 respectively.

Duplicate Message

The duplicate message threshold settings. Expand each to configure settings for a threshold.

MM1 Retrieve Duplicate

Enable

Select to scan MM1 mm1-retr messages for duplicates. By default, mm1-retr messages are not scanned for duplicates as they may often be the same without necessarily being bulk or spam.

Enable                              Select to enable the selected duplicate message threshold and to make the rest of the options available for configuration.

Duplicate Message

Window

Enter the period of time during which excessive message duplicates will be detected if the Duplicate message Limit it exceeded. The duplicate message window can be 1 to 2880 minutes (48 hours).

Duplicate Message

Limit

Enter the number of messages which signifies excessive message duplic- ates if exceeded within the Duplicate Message Window.

Duplicate Message

Block Time

Enter the amount of time during which the unit will perform the Duplicate

Message Action after a message flood is detected.

Duplicate Message

Action

Select one or more actions that the unit is to perform when excessive message duplication is detected.

Duplicate Threshold 2

Duplicate Threshold 3

Expand to configure settings for Duplicate Threshold 2 or 3 respectively.

Recipient MSISDN

The recipient Mobile Subscriber Integrated Services Digital Network Number (MSISDN) settings for each recipient MSISDN. When you select Create New, you are automatically redirected to the New MSISDN page.

You need to save the profile before you can add MSISDNs.

Recipient MSISDN                        The recipient MSISDN.

Flood Threshold 1                       Check to enable Flood Threshold 1 settings for this MSISDN.

Flood Threshold 2                       ICheck to enable Flood Threshold 2 settings for this MSISDN..

Flood Threshold 3                       ICheck to enable Flood Threshold 3 settings for this MSISDN..

Duplicate Threshold 1                Check to enable Duplicate Threshold 1 settings for this MSISDN..

Duplicate Threshold 2                Check to enable Duplicate Threshold 2 settings for this MSISDN..

Duplicate Threshold 3                Check to enable Duplicate Threshold 3 settings for this MSISDN..

Edit

Modifies the settings of a Recipient MSISDN in the Recipient MSISDN list. When you select Edit, you are automatically redirected to the New MSISDN page.

Delete                                            Removes a Recipient MSISDN in the Recipient MSISDN list within the

Recipient MSISDN section of the page.

This entry was posted in FortiOS 5.4 Handbook on by .

About Mike

Michael Pruett, CISSP has a wide range of cyber-security and network engineering expertise. The plethora of vendors that resell hardware but have zero engineering knowledge resulting in the wrong hardware or configuration being deployed is a major pet peeve of Michael's. This site was started in an effort to spread information while providing the option of quality consulting services at a much lower price than Fortinet Professional Services. Owns PacketLlama.Com (Fortinet Hardware Sales) and Office Of The CISO, LLC (Cybersecurity consulting firm).

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.