Cisco Cisco Content Security Management Appliance M1070 Guía Del Usuario
7-2
AsyncOS 8.2 for Cisco Content Security Management User Guide
Chapter 7 Managing the Spam Quarantine
delivered to the Email Inbox or delete them. Users can also search through their quarantined messages.
Users can access the quarantine through the notification message, or they can access the quarantine
directly by using a web browser. (Direct end user access to the quarantine requires authentication. For
more information, see the
Users can access the quarantine through the notification message, or they can access the quarantine
directly by using a web browser. (Direct end user access to the quarantine requires authentication. For
more information, see the
).
By default, the Spam Quarantine is self-maintaining. AsyncOS periodically deletes mail from the Spam
Quarantine to prevent old messages from consuming all of the quarantine space.
Quarantine to prevent old messages from consuming all of the quarantine space.
All administrator-level users (such as the default admin user) can access and modify the Spam
Quarantine. AsyncOS operator users and users to whom you assign Spam Quarantine access via a
custom role can view and manage the quarantine content, but they cannot change the quarantine settings.
Mail end users can access their own messages in the quarantine if you enable end user access to the Spam
Quarantine.
Quarantine. AsyncOS operator users and users to whom you assign Spam Quarantine access via a
custom role can view and manage the quarantine content, but they cannot change the quarantine settings.
Mail end users can access their own messages in the quarantine if you enable end user access to the Spam
Quarantine.
Setting Up the Centralized Spam Quarantine
Before you centralize the spam quarantine, the local spam quarantine should be configured, working,
and tested on your Email Security appliance.
and tested on your Email Security appliance.
To move the active spam quarantine from the Email Security appliance to the Security Management
appliance, complete the following procedures in order:
appliance, complete the following procedures in order:
•
•
•
•
•
Configuring the Spam Quarantine Service on the Security Management
Appliance
Appliance
Procedure
Step 1
On the Security Management appliance, choose Management Appliance > Centralized Services >
Spam Quarantine
Spam Quarantine
Step 2
If you are enabling the Spam Quarantine for the first time after running the System Setup Wizard:
a.
Click Enable.
b.
Review the end user license agreement, then click Accept.
Step 3
If you are editing an existing configuration, click Edit Settings in the Spam Quarantine Settings section.
Step 4
In the Quarantine IP Interface section, specify the appropriate IP interface and port for the quarantine
from the drop-down list.
from the drop-down list.
By default, the quarantine uses the Management interface and port 6025. The IP interface is the interface
on the Security Management appliance that is configured to listen for incoming mail. The quarantine port
is the port number that the sending appliances use in their external quarantine settings.
on the Security Management appliance that is configured to listen for incoming mail. The quarantine port
is the port number that the sending appliances use in their external quarantine settings.