Cisco Cisco Email Security Appliance C380 Referencia técnica

Descargar
Página de 462
 
3-325
Cisco AsyncOS 8.5.6 CLI Reference Guide
 
Chapter 3      The Commands: Reference Examples
  Policy Enforcement
[]> setup
1. Scan only attachments with MIME types or fingerprints in the list.
2. Skip attachments with MIME types or fingerprints in the list.
Choose one:
[2]> 2
Enter the maximum depth of attachment recursion to scan:
[5]> 10
Enter the maximum size of attachment to scan:
[5242880]> 10m
Do you want to scan attachment metadata? [Y]> y
Enter the attachment scanning timeout (in seconds):
[30]> 180
If a message has attachments that were not scanned for any reason (e.g. 
because of size, depth limits, or scanning timeout), assume the 
attachment matches the search pattern? [N]> n
If a message could not be deconstructed into its component parts in order 
to remove specified attachments, the system should:
1. Deliver
2. Bounce
3. Drop
[1]> 
Table 3-143
Scan Config
 - Configuring Scan Behavior