Cisco Cisco Email Security Appliance C190 Guía Del Usuario
![Cisco](https://files.manualsbrain.com/attachments/7380d0050044647c30f5c24bbbf5d0c0b6d9bb84/common/fit/150/50/faa183d287233c52228cfea3dbc2a127fe780f60564fcb0955d9c3d1cd23/brand_logo.png)
Chapter 3 Configuring Routing and Delivery Features
3-114
Cisco IronPort AsyncOS 7.3 for Email Advanced Configuration Guide
OL-23081-01
Figure 3-5
Masquerading Defined for a Private Listener
Ethernet interface: Data 2
IP interface: PublicNet (e.g. 192.168.2.1)
Public Listener: InboundMail
SMTP
IronPort Email
Security appliance
Private Listener: OutboundMail
Two entries were added to the
masquerading table for this
private listener. The first entry
masks all subdomains of a
network (e.g.
masquerading table for this
private listener. The first entry
masks all subdomains of a
network (e.g.
exchange.example.com
is
rewritten as
example.com
). The
second entry rewrites the bare
address
address
joe
as
joe@example.com
.
Ethernet interface: Data 1
IP interface: PrivateNet (e.g. 192.168.1.1)
Host Access Table (HAT):
WHITELIST: $TRUSTED
BLACKLIST: $BLOCKED
SUSPECTLIST: $THROTTLED
UNKNOWNLIST: $ACCEPTED
spamdomain.com REJECT
.spamdomain.com REJECT
251.192.1. TCPREFUSE
.spamdomain.com REJECT
251.192.1. TCPREFUSE
169.254.10.10 RELAY
ALL: $ACCEPTED
ALL: $ACCEPTED
Recipient Access Table (RAT):
example.com ACCEPT
newcompanyname.com ACCEPT
ALL REJECT
newcompanyname.com ACCEPT
ALL REJECT
Host Access Table (HAT):
RELAYLIST: $RELAYED
ALL: $BLOCKED
Default sender domain: example.com
Received: header: DISABLED
Masquerading:
@.example.com @example.com
joe joe@example.com