Cisco Cisco Email Security Appliance C650 Guía Del Usuario
23-51
Cisco AsyncOS 8.5.5 for Email Security User Guide
Chapter 23 Configuring Routing and Delivery Features
Bounce Verification
Figure 23-6
The Consider Untagged Bounces to be Valid HAT Parameter
Preventing a Bounced Message Storm Using Bounce Verification
Procedure
Step 1
Enter a tagging key. For more information, see
Step 2
Edit the bounce verification settings. For more information, see
Step 3
Enable bounce verification via Destination Controls. For more information, see
Figure 23-7
IronPort Bounce Verification Page
Configuring Bounce Verification Address Tagging Keys
The Bounce Verification Address Tagging Keys listing shows your current key and any unpurged keys
you have used in the past. To add a new key:
you have used in the past. To add a new key: