Cisco Cisco Email Security Appliance C170 Betriebsanweisung

Seite von 1140
 
23-51
Cisco AsyncOS 8.5.5 for Email Security User Guide
 
Chapter 23      Configuring Routing and Delivery Features
  Bounce Verification
Figure 23-6
The Consider Untagged Bounces to be Valid HAT Parameter
Preventing a Bounced Message Storm Using Bounce Verification
Procedure 
Step 1
Enter a tagging key. For more information, see 
Step 2
Edit the bounce verification settings. For more information, see 
Step 3
Enable bounce verification via Destination Controls. For more information, see 
Figure 23-7
IronPort Bounce Verification Page
Configuring Bounce Verification Address Tagging Keys
The Bounce Verification Address Tagging Keys listing shows your current key and any unpurged keys 
you have used in the past. To add a new key: