Cisco Cisco Email Security Appliance C160 Guía Del Usuario
6-5
Cisco IronPort AsyncOS 7.5 for Email Configuration Guide
OL-25136-01
Chapter 6 Email Security Manager
If a match is made based on a sender address (or on the special “Listener” rule
created by an upgrade — see below), all remaining recipients of a message will
match that policy. (This is because there can be only one sender or one listener per
message.)
created by an upgrade — see below), all remaining recipients of a message will
match that policy. (This is because there can be only one sender or one listener per
message.)
Examples of Policy Matching
The following examples help show how the policy tables are matched in a
top-down fashion.
top-down fashion.
Given the following Incoming Mail Email Security Policy table shown in
, incoming messages will match different policies.
Example 1
A message from sender
bill@lawfirm.com
sent to recipient
jim@example.com
will match policy #2, because the user description that matches the sender
(
(
@lawfirm.com
) appears sooner in the table than the user description that matches
the recipient (
jim@
).
Table 6-1
Policy Matching Example
Order
Policy Name
Users
1
special_people
Recipient:
joe@example.com
Recipient:
ann@example.com
2
from_lawyers
Sender:
@lawfirm.com
3
acquired_domains
Recipient:
@newdomain.com
Recipient:
@anotherexample.com
4
engineering
Recipient:
PublicLDAP.ldapgroup: engineers
5
sales_team
Recipient:
jim@
Recipient:
john@
Recipient:
larry@
Default Policy
(all users)