Cisco Cisco Email Security Appliance C680 User Guide

Page of 400
 
2-35
Cisco IronPort AsyncOS 7.6 for Email Advanced Configuration Guide
OL-25137-01
Chapter 2      Configuring Routing and Delivery Features
Figure 2-6
Domain Map Defined for a Public Listener
Directing Bounced Email
Bounced email is an inevitable part of any email delivery. Your Cisco IronPort appliance is able to 
process bounced email in a number of highly configurable ways.
Please note, this section describes how to control how your Cisco IronPort appliance generates outgoing 
bounces (based on incoming mail). To control how your Cisco IronPort appliance controls incoming 
bounces (based on outgoing mail) use Cisco IronPort Bounce Verification (see 
Ethernet interface: Data 2
IP interface: PublicNet (e.g. 192.168.2.1)
Public Listener: InboundMail 
IronPort Email 
Security appliance
Private Listener: OutboundMail 
A domain map for the public listener 
“InboundMail” was created. Mail for 
the domain and any subdomain of 
oldcompanyname.com
 is mapped to 
the domain 
example.com
.
Ethernet interface: Data 1
IP interface: PrivateNet (e.g. 192.168.1.1)
Host Access Table (HAT):
WHITELIST:      $TRUSTED
BLACKLIST:      $BLOCKED
SUSPECTLIST:    $THROTTLED
UNKNOWNLIST:    $ACCEPTED
spamdomain.com  REJECT
.spamdomain.com REJECT
251.192.1.      TCPREFUSE
169.254.10.10   RELAY
ALL:            $ACCEPTED
Recipient Access Table (RAT):
example.com         ACCEPT
newcompanyname.com  ACCEPT
ALL                 REJECT
Domain Map: enabled
@.oldcompanyname.com 
Host Access Table (HAT):
RELAYLIST:    $RELAYED
ALL:          $BLOCKED
Default sender domain:  example.com
Received: header:           DISABLED
Masquerading: 
@.example.com   @example.com