Cisco Cisco Email Security Appliance C170 Betriebsanweisung
1-6
Cisco IronPort AsyncOS 7.6 for Email Configuration Guide
OL-26342-01
Chapter 1 Getting Started with the Cisco IronPort Email Security Appliance
Before You Begin
Before you read this guide, review the Cisco IronPort Quickstart Guide and the latest product release
notes for your appliance. In this guide, it is assumed that you have unpacked the appliance, physically
installed it in a rack, and turned it on.
notes for your appliance. In this guide, it is assumed that you have unpacked the appliance, physically
installed it in a rack, and turned it on.
Note
If you have already cabled your appliance to your network, ensure that the default IP address for the
Cisco IronPort appliance does not conflict with other IP addresses on your network. The IP address that
is pre-configured on the Management port (on Cisco IronPort X1000/1000T/1050/1060/1070,
C60/600/650/660/670, and C30/300/300D/350/350D/360/370 appliances) or the Data 1 port (on Cisco
IronPort C10/100/150/160 appliances) is
Cisco IronPort appliance does not conflict with other IP addresses on your network. The IP address that
is pre-configured on the Management port (on Cisco IronPort X1000/1000T/1050/1060/1070,
C60/600/650/660/670, and C30/300/300D/350/350D/360/370 appliances) or the Data 1 port (on Cisco
IronPort C10/100/150/160 appliances) is
192.168.42.42
.
How This Book Is Organized
provides an introduction
to the Cisco IronPort appliance and defines its key features and role in the enterprise network. New
features of the current release are described.
features of the current release are described.
introduces Cisco IronPort AsyncOS for Email and discusses administration of
the Cisco IronPort appliance through its GUI and CLI. Conventions for using the CLI are described. This
chapter also contains an overview of general purpose CLI commands.
chapter also contains an overview of general purpose CLI commands.
describes the options for connecting to the Cisco IronPort appliance,
including network planning, and initial system setup and configuration of the appliance.
provides an overview of the email pipeline — the flow
that email follows as it is processed by the Cisco IronPort appliance — and brief descriptions of the
features that comprise the pipeline. The descriptions include cross-references to the sections containing
detailed explanations of the features.
features that comprise the pipeline. The descriptions include cross-references to the sections containing
detailed explanations of the features.
appliance as an email gateway. This chapter introduces the concepts of interfaces, listeners, and the Host
Access Table (HAT) — which support incoming email traffic and the Mail Flow Monitor.
Access Table (HAT) — which support incoming email traffic and the Mail Flow Monitor.
describes Email Security Manager, the single, comprehensive
dashboard to manage all email security services and applications on Cisco IronPort appliances. Email
Security Manager allows you to manage the Outbreak Filters feature, Anti-Spam, Anti-Virus, and email
content policies — on a per-recipient or per-sender basis, through distinct inbound and outbound
policies.
Security Manager allows you to manage the Outbreak Filters feature, Anti-Spam, Anti-Virus, and email
content policies — on a per-recipient or per-sender basis, through distinct inbound and outbound
policies.
provides an overview of how SenderBase Reputation Service scores
are used to control incoming mail based on the reputation of the message sender.
describes the unique approach to fighting spam with the SenderBase Reputation
Filters, Cisco IronPort Anti-Spam, and Cisco IronPort Intelligent Multi-Scan features integrated into the
Cisco IronPort appliance.
Cisco IronPort appliance.
explains the Sophos and McAfee Anti-Virus scanning features integrated into
the Cisco IronPort appliance.
explains how Outbreak Filters proactively provide a critical first layer of
defense against new virus, scam, and phishing outbreaks. By detecting new outbreaks in real-time and
dynamically responding to prevent suspicious traffic from entering the network, Outbreak Filters offer
protection until new signature updates are deployed.
dynamically responding to prevent suspicious traffic from entering the network, Outbreak Filters offer
protection until new signature updates are deployed.