Cisco Cisco Email Security Appliance C170 Betriebsanweisung

Seite von 630
Chapter 8      Anti-Spam
8-290
Cisco IronPort AsyncOS 7.1 for Email Configuration Guide
OL-22158-02
The solution is to configure an incoming relay. When configuring an incoming 
relay, you specify the names and IP addresses of all of the internal MX/MTAs 
connecting to the IronPort appliance, as well as the header used to store the 
originating IP address. You have two options for specifying the header: a custom 
header or an existing received header.
Incoming Relays and Email Security Monitor
When using the Incoming Relay feature, data provided by the Email Security 
Monitor will contain data for both the external IP and the MX/MTA. For example, 
if an external machine (IP 7.8.9.1) sent 5 emails through the internal MX/MTA 
(IP 10.2.3.4), Mail Flow Summary will show 5 messages coming from IP 7.8.9.1 
and 5 more coming from the internal relay MX/MTA (IP 10.2.3.5).
Incoming Relays and Filters
The Incoming Relays feature provides the various SenderBase Reputation Service 
related filter rules (
reputation, no-reputation
) with the correct SenderBase 
Reputation score.
Incoming Relays, HAT, SBRS, and Sender Groups
Please note that HAT policy groups do not currently use information from 
Incoming Relays. However, because the Incoming Relays feature does supply the 
SenderBase Reputation score, you can simulate HAT policy group functionality 
via message filters and the 
$reputation
 variable.
Incoming Relays and Reporting
When using Incoming Relays, the SenderBase Reputation score is not reported 
correctly in the Email Security Monitor reports. Also, sender groups may not be 
resolved correctly.