Cisco Cisco Email Security Appliance C190 Guía Del Usuario
GL-1
Cisco AsyncOS 8.5.6 for Email User Guide
G L O S S A R Y
A
Advanced Malware
Protection
Protection
File reputation and file analysis services.
Allowed Hosts
Computers that are allowed to relay email through the Cisco appliance via a
private listener. Allowed hosts are defined by their hostnames or IP addresses.
private listener. Allowed hosts are defined by their hostnames or IP addresses.
Anti-Virus
Sophos and McAfee Anti-Virus scanning engines provide cross-platform
anti-virus protection, detection and disinfection. through virus detection engines
which scans files for viruses, Trojan horses and worms. These programs come
under the generic term of malware, meaning “malicious software.” The
similarities between all types of malware allow anti-virus scanners to detect and
remove not only viruses, but also all types of malicious software.
anti-virus protection, detection and disinfection. through virus detection engines
which scans files for viruses, Trojan horses and worms. These programs come
under the generic term of malware, meaning “malicious software.” The
similarities between all types of malware allow anti-virus scanners to detect and
remove not only viruses, but also all types of malicious software.
B
Blacklist
A list of known bad senders. By default, senders in the Blacklist sender group of
a public listener are rejected by the parameters set in the $BLOCKED mail flow
policy.
a public listener are rejected by the parameters set in the $BLOCKED mail flow
policy.
C
Character Set
(Double-byte)
(Double-byte)
Double Byte Character Sets are foreign-language character sets requiring more
than one byte of information to express each character.
than one byte of information to express each character.
CIDR Notation
Classless Inter-Domain Routing. A convenient shorthand for describing a range
of IP addresses within their network contexts using an arbitrary number of bits.
Using this notation, you note the network prefix part of an address by adding a
forward slash (/) followed by the number of bits used for the network part. Thus
a Class C network can be described in prefix notation as 192.168.0.1/24. A
CIDR specification of 206.13.1.48/25 would include any address in which the
first 25 bits of the address matched the first 25 bits of 206.13.1.48.
of IP addresses within their network contexts using an arbitrary number of bits.
Using this notation, you note the network prefix part of an address by adding a
forward slash (/) followed by the number of bits used for the network part. Thus
a Class C network can be described in prefix notation as 192.168.0.1/24. A
CIDR specification of 206.13.1.48/25 would include any address in which the
first 25 bits of the address matched the first 25 bits of 206.13.1.48.
Content Filters
Content-based filters used to process messages during the Per-Recipient
Scanning phase of the work queue in the email pipeline. Content filters are
evoked after Message filters, and act on individual splintered messages.
Scanning phase of the work queue in the email pipeline. Content filters are
evoked after Message filters, and act on individual splintered messages.