Cisco Cisco Email Security Appliance X1050 Guía Del Usuario
3-5
Cisco AsyncOS 9.0 for Email User Guide
Chapter 3 Setup and Installation
Physically Connecting the Email Security Appliance to the Network
–
Relays mail to the appropriate internal groupware server, as defined by SMTP Routes.
•
Private Listener (outgoing email) - The private listener receives connections from a limited
number of internal groupware servers and directs messages to many external mail hosts.
number of internal groupware servers and directs messages to many external mail hosts.
–
Internal groupware servers are configured to route outgoing mail to the Cisco C- or X-Series
appliance.
appliance.
–
The Email Security appliance accepts connections from internal groupware servers based on
settings in the HAT. By default, the HAT is configured to RELAY connections from all internal
mail hosts.
settings in the HAT. By default, the HAT is configured to RELAY connections from all internal
mail hosts.
Related Topics
•
Segregating Incoming and Outgoing Mail
You can segregate incoming and outgoing email traffic over separate listeners and on separate IP
addresses. You can use Internet Protocol version 4 (IPv4) and version 6 (IPv6) addresses. However, the
System Setup Wizard on the appliance supports initial configuration of the following configurations:
addresses. You can use Internet Protocol version 4 (IPv4) and version 6 (IPv6) addresses. However, the
System Setup Wizard on the appliance supports initial configuration of the following configurations:
•
2 separate listeners on 2 logical IPv4 and 2 IPv6 addresses configured on separate physical
interfaces
interfaces
–
segregates incoming and outgoing traffic
–
you can assign an IPv4 and an IPv6 address to each listener
•
1 listener on 1 logical IPv4 address configured on one physical interface
–
combines both incoming and outgoing traffic
–
you can assign both an IPv4 and an IPv6 address to the listener
Configuration worksheets for both one and two listener configurations are included below (see
). Most configuration scenarios are represented by one of the
following three figures.