Cisco Cisco Email Security Appliance C160 Guía Del Usuario
Chapter 4 Understanding the Email Pipeline
4-92
Cisco IronPort AsyncOS 7.1 for Email Configuration Guide
OL-22158-02
Shaded areas in
represent processing that occurs in the Work Queue (see
). You can test most of the configurations of
features in this pipeline using the
trace
command. For more information,
see
Debugging Mail Flow Using Test Messages: Trace, page -446
.
Note
For outgoing mail, RSA Email Data Loss Prevention scanning takes place after
the Virus Outbreak Filters stage.
the Virus Outbreak Filters stage.
Table 4-1
Email Pipeline for the IronPort Appliance: Receiving Email Features
Feature
Description
Host Access Table (HAT)
Host DNS Sender Verification
Sender Groups
Envelope Sender Verification
Sender Verification Exception Table
Mail Flow Policies
ACCEPT, REJECT, RELAY, or TCPREFUSE connections
Maximum outbound connections
Maximum concurrent inbound connections per IP address
Maximum message size and messages per connection
Maximum recipients per message and per hour
TCP listen queue size
TLS: no/preferred/required
SMTP AUTH: no/preferred/required
Drop email with malformed FROM headers
Always accept or reject mail from entries in the Sender
Verification Exception Table.
Verification Exception Table.
SenderBase on/off (IP profiling/flow control)
Received Header
Adds a received header to accepted email: on/off.
Default Domain
Adds default domain for “bare” user addresses.
Bounce Verification
Used to verify incoming bounce messages as legitimate.
Domain Map
Rewrites the Envelope Recipient for each recipient in a message
that matches a domain in the domain map table.
that matches a domain in the domain map table.
Recipient Access Table (RAT)
(Public listeners only) ACCEPT or REJECT recipients in RCPT
TO
TO
plus Custom SMTP Response. Allow special recipients to
bypass throttling.