Cisco Cisco Email Security Appliance C680 User Guide

Page of 400
 
5-20
Cisco IronPort AsyncOS 7.6 for Email Advanced Configuration Guide
OL-25137-01
Chapter 5      Email Authentication
Step 2
Confirm the deletion.
Searching DKIM Verification Profiles
To search all DKIM verification profiles for a specific term in the profile name:
Step 1
Specify the search term in the Search DKIM Verification Profiles for field on the DKIM Verification 
Profiles page.
Step 2
Click Find Profiles.
The search scans the profile name for each DKIM verification profile.
If you do not enter search terms, the search engine returns all DKIM verification profiles.
Configuring DKIM Verification on the Mail Flow Policy
DKIM verification is enabled on mail flow policies for incoming email. 
To enable verification on an incoming mail flow policy:
Step 1
On the Mail Flow Policies page (from the Mail Policies menu), click on the incoming mail policy for the 
listener where you want to perform verification.
Step 2
In the Security Features section of the mail flow policy, enable DKIM Verification by selecting On.
Figure 5-15
Enabling DKIM Verification
Step 3
Select the DKIM verification profile that you want to use for the policy.
Step 4
Commit your changes.
DKIM Verification and Logging
Lines such as the following are added to the mail logs upon DKIM verification:
mail.current:Mon Aug  6 13:35:38 2007 Info: MID 17 DKIM: no signature
mail.current:Mon Aug  6 15:00:37 2007 Info: MID 18 DKIM: verified pass