Cisco Cisco Email Security Appliance C370D User Guide

Page of 652
Chapter 5      Configuring the Gateway to Receive Email
5-30
Cisco IronPort AsyncOS 7.5 for Email Configuration Guide
OL-25136-01
Step 1
Which IP addresses are controlled by this sender? 
The first piece of information that the Mail Flow Monitor feature uses to 
control the inbound email processing is the answer to this question. The 
answer is derived by querying the SenderBase Reputation Service. The 
SenderBase Reputation Service provides information about the relative size 
of the sender (either the SenderBase network owner or the SenderBase 
organization). Answering this question assumes the following:
Larger organizations tend to control more IP addresses, and send more 
legitimate email. 
Step 2
Depending on its size, how should the overall number of connections be 
allotted for this sender? 
Larger organizations tend to control more IP addresses, and send more 
legitimate email. Therefore, they should be allotted more connections to 
your appliance.
The sources of high-volume email are often ISPs, NSPs, companies that 
manage outsourced email delivery, or sources of unsolicited bulk email. 
ISPs, NSPS, and companies that manage outsourced email delivery are 
examples of organizations that control many IP addresses, and should be 
allotted more connections to your appliance. Senders of unsolicited bulk 
email usually do not control many IP addresses; rather, they send large 
volumes of mail through a few number of IP addresses. They should be 
allotted fewer connections to your appliance. 
The Mail Flow Monitor feature uses its differentiation between SenderBase 
network owners and SenderBase organizations to determine how to allot 
connections per sender, based on logic in SenderBase. See the “Using Email 
Security Monitor” chapter in Cisco IronPort AsyncOS for Email Daily 
Management Guide
 for more information on using the Mail Flow Monitor feature.