Cisco Cisco Email Security Appliance C170 Guía Del Usuario
4-31
Cisco IronPort AsyncOS 7.6 for Email Daily Management Guide
OL-25138-01
Chapter 4 Quarantines
Configuring the Cisco IronPort Spam Quarantines Feature
Disk Space
Quarantine.
End Users Accessing the Cisco IronPort Spam Quarantine
End users can access the Cisco IronPort Spam quarantine via a link in the notification they receive. When
accessing the quarantine via this method, LDAP or IMAP/POP authentication is not required (end users
do not have to authenticate themselves). Note that the links present in the notification messages do not
expire, so end users can use these links to view their quarantined messages without having to
authenticate.
accessing the quarantine via this method, LDAP or IMAP/POP authentication is not required (end users
do not have to authenticate themselves). Note that the links present in the notification messages do not
expire, so end users can use these links to view their quarantined messages without having to
authenticate.
Users can also access the quarantine by entering a link in their web browser directly. When accessing
the quarantine via a URL typed into a web browser, users will have to authenticate. The authentication
method — LDAP or “mailbox” (IMAP/POP) — is defined in the End User Quarantine Access section
of the quarantine settings (see
the quarantine via a URL typed into a web browser, users will have to authenticate. The authentication
method — LDAP or “mailbox” (IMAP/POP) — is defined in the End User Quarantine Access section
of the quarantine settings (see
LDAP Authentication
The authentication process for LDAP works like this:
Step 1
A user enters their username and password into the web UI login page.
Step 2
The Cisco IronPort Spam quarantine connects to the specified LDAP server either to perform an
anonymous search or as an authenticated user with the specified “Server Login” DN and password. For
Active Directory, you will usually need to have the server connect on the “Global Catalog port” (it is in
the 6000s) and you need to create a low privilege LDAP user that the Cisco IronPort Spam quarantine
can bind as in order to execute the search.
anonymous search or as an authenticated user with the specified “Server Login” DN and password. For
Active Directory, you will usually need to have the server connect on the “Global Catalog port” (it is in
the 6000s) and you need to create a low privilege LDAP user that the Cisco IronPort Spam quarantine
can bind as in order to execute the search.
Step 3
The Cisco IronPort Spam quarantine then searches for the user using the specified BaseDN and Query
String. When a user’s LDAP record is found, the Cisco IronPort Spam quarantine then extracts the DN
for that record and attempts bind to the directory using the user records’ DN and the password they
entered originally. If this password check succeeds then the user is properly authenticated, but the Cisco
IronPort Spam quarantine still needs to determine which mailboxes’ contents to show for that user.
String. When a user’s LDAP record is found, the Cisco IronPort Spam quarantine then extracts the DN
for that record and attempts bind to the directory using the user records’ DN and the password they
entered originally. If this password check succeeds then the user is properly authenticated, but the Cisco
IronPort Spam quarantine still needs to determine which mailboxes’ contents to show for that user.
Step 4
Messages are stored in the Cisco IronPort Spam quarantine using the recipient's envelope address. After
a user's password is validated against LDAP, the Cisco IronPort Spam quarantine then retrieves the
“Primary Email Attribute” from the LDAP record to determine which envelope address they should show
quarantined messages for. The “Primary Email Attribute” can contain multiple email addresses which
are then used to determine what envelope addresses should be displayed from the quarantine for the
authenticated user.
a user's password is validated against LDAP, the Cisco IronPort Spam quarantine then retrieves the
“Primary Email Attribute” from the LDAP record to determine which envelope address they should show
quarantined messages for. The “Primary Email Attribute” can contain multiple email addresses which
are then used to determine what envelope addresses should be displayed from the quarantine for the
authenticated user.
Table 4-3
Disk Space Available for Cisco IronPort Spam Quarantine by Cisco IronPort
Appliance
Model
Disk Space (in GBytes)
C150/160
5
C350/360/370
15
C650/660/670
30
X1050/1060/1070
30