Cisco Cisco Email Security Appliance C390 사용자 가이드
4-133
Cisco IronPort AsyncOS 7.3 for Email Daily Management Guide
OL-23080-01
Chapter 4 Quarantines
Configuring the IronPort Spam Quarantines Feature
Disk Space
IronPort Spam Quarantine.
Table 4-3
Disk Space Available for IronPort Spam Quarantine by IronPort
Appliance
Appliance
Model
Disk Space (in GBytes)
C150/160
5
C350/360/370
15
C650/660/670,
X1050/1060/1070
X1050/1060/1070
30
M650/660/670
100
M1050/1060/1070
200
End Users Accessing the IronPort Spam Quarantine
End users can access the IronPort Spam quarantine via a link in the notification
they receive. When accessing the quarantine via this method, LDAP or
IMAP/POP authentication is not required (end users do not have to authenticate
themselves). Note that the links present in the notification messages do not expire,
so end users can use these links to view their quarantined messages without
having to authenticate.
they receive. When accessing the quarantine via this method, LDAP or
IMAP/POP authentication is not required (end users do not have to authenticate
themselves). Note that the links present in the notification messages do not expire,
so end users can use these links to view their quarantined messages without
having to authenticate.
Users can also access the quarantine by entering a link in their web browser
directly. When accessing the quarantine via a URL typed into a web browser,
users will have to authenticate. The authentication method — LDAP or “mailbox”
(IMAP/POP) — is defined in the End User Quarantine Access section of the
quarantine settings (see
directly. When accessing the quarantine via a URL typed into a web browser,
users will have to authenticate. The authentication method — LDAP or “mailbox”
(IMAP/POP) — is defined in the End User Quarantine Access section of the
quarantine settings (see
).
LDAP Authentication
The authentication process for LDAP works like this:
Step 1
A user enters their username and password into the web UI login page.