Cisco Cisco Email Security Appliance X1050 Guía Del Usuario
7-19
Cisco AsyncOS 8.5.5 for Email Security User Guide
Chapter 7 Defining Which Hosts Are Allowed to Connect Using the Host Access Table (HAT)
Working with the Host Access Table Configuration
Note
If anti-spam or anti-virus scanning is enabled globally in the HAT, messages are flagged for
anti-spam or anti-virus scanning as they are accepted by the appliance. If anti-spam or anti-virus
scanning is disabled after the message is accepted, the message will still be subject to scanning
when it leaves the work queue.
anti-spam or anti-virus scanning as they are accepted by the appliance. If anti-spam or anti-virus
scanning is disabled after the message is accepted, the message will still be subject to scanning
when it leaves the work queue.
Step 4
Submit and commit your changes.
Defining Default Values for Mail Flow Policies
Procedure
Step 1
Click Mail Policies > Mail Flow Policies.
Step 2
Choose the listener to edit in the Listener field.
Step 3
Click the Default Policy Parameters link below the configured mail flow policies.
Step 4
Define the default values that all mail flow policies for this listener use.
For more information on the properties, see
Step 5
Submit and commit your changes.
Working with the Host Access Table Configuration
You can export all information stored in a Host Access Table to a file, and you can import Host Access
Table information stored in a file into the appliance for a listener, overwriting all existing Host Access
Table information.
Table information stored in a file into the appliance for a listener, overwriting all existing Host Access
Table information.
Exporting the Host Access Table Configuration to an External File
Procedure
Step 1
Navigate to the Mail Policies > HAT Overview page.
Step 2
Choose the listener to edit in the Listener menu.
Exception Table
Use Exception Table
Use the sender verification domain exception table. You can only have
one exception table, but you can enable it per mail flow policy. See
one exception table, but you can enable it per mail flow policy. See
for more information.
Table 7-8
Mail Flow Policy Parameters (continued)
Parameter
Description