Cisco Cisco Email Security Appliance X1070 Betriebsanweisung
4-8
Cisco AsyncOS 9.1 for Email User Guide
Chapter 4 Understanding the Email Pipeline
Work Queue / Routing
combat directory harvest attacks (DHAP) in a unique way: the system accepts the message and performs
the LDAP acceptance validation within the SMTP conversation or the work queue. If the recipient is not
found in the LDAP directory, you can configure the system to perform a delayed bounce or drop the
message entirely.
the LDAP acceptance validation within the SMTP conversation or the work queue. If the recipient is not
found in the LDAP directory, you can configure the system to perform a delayed bounce or drop the
message entirely.
For more information, see the “LDAP Queries” chapter.
Masquerading or LDAP Masquerading
Masquerading is a feature that rewrites the envelope sender (also known as the sender, or
MAIL FROM
)
and the To:, From:, and/or CC: headers on email processed by a private or public listener according to a
table you construct. You can specify different masquerading parameters for each listener you create in
one of two ways: via a static mapping table, or via an LDAP query.
table you construct. You can specify different masquerading parameters for each listener you create in
one of two ways: via a static mapping table, or via an LDAP query.
For more information about masquerading via a static mapping table, see “Configuring Masquerading”
in the “Configuring Routing and Delivery Features” chapter.
in the “Configuring Routing and Delivery Features” chapter.
For more information about masquerading via an LDAP query, see the “LDAP Queries” chapter.
LDAP Routing
You can configure your appliance to route messages to the appropriate address and/or mail host based
upon the information available in LDAP directories on your network.
upon the information available in LDAP directories on your network.
For more information, see the “LDAP Queries” chapter.
Message Filters
Message filters allow you to create special rules describing how to handle messages and attachments as
they are received. Filter rules identify messages based on message or attachment content, information
about the network, message envelope, message headers, or message body. Filter actions allow messages
to be dropped, bounced, archived, quarantined, blind carbon copied, or altered.
they are received. Filter rules identify messages based on message or attachment content, information
about the network, message envelope, message headers, or message body. Filter actions allow messages
to be dropped, bounced, archived, quarantined, blind carbon copied, or altered.
For more information, see the “Using Message Filters to Enforce Email Policies” chapter.
Multi-recipient messages are “splintered” after this phase, prior to Email Security Manager. Splintering
messages refers to creating splinter copies of emails with single recipients, for processing via Email
Security Manager.
messages refers to creating splinter copies of emails with single recipients, for processing via Email
Security Manager.
Email Security Manager (Per-Recipient Scanning)
•
•
•
•
•
•