Cisco Cisco Email Security Appliance C160 Guía Del Usuario
Chapter 5 Configuring the Gateway to Receive Email
5-136
Cisco IronPort AsyncOS 7.1 for Email Configuration Guide
OL-22158-02
Step 1
Which IP addresses are controlled by this sender?
The first piece of information that the Mail Flow Monitor feature uses to
control the inbound email processing is the answer to this question. The
answer is derived by querying the SenderBase Reputation Service. The
SenderBase Reputation Service provides information about the relative size
of the sender (either the SenderBase network owner or the SenderBase
organization). Answering this question assumes the following:
control the inbound email processing is the answer to this question. The
answer is derived by querying the SenderBase Reputation Service. The
SenderBase Reputation Service provides information about the relative size
of the sender (either the SenderBase network owner or the SenderBase
organization). Answering this question assumes the following:
–
Larger organizations tend to control more IP addresses, and send more
legitimate email.
legitimate email.
Step 2
Depending on its size, how should the overall number of connections be
allotted for this sender?
allotted for this sender?
–
Larger organizations tend to control more IP addresses, and send more
legitimate email. Therefore, they should be allotted more connections to
your appliance.
legitimate email. Therefore, they should be allotted more connections to
your appliance.
–
The sources of high-volume email are often ISPs, NSPs, companies that
manage outsourced email delivery, or sources of unsolicited bulk email.
ISPs, NSPS, and companies that manage outsourced email delivery are
examples of organizations that control many IP addresses, and should be
allotted more connections to your appliance. Senders of unsolicited bulk
email usually do not control many IP addresses; rather, they send large
volumes of mail through a few number of IP addresses. They should be
allotted fewer connections to your appliance.
manage outsourced email delivery, or sources of unsolicited bulk email.
ISPs, NSPS, and companies that manage outsourced email delivery are
examples of organizations that control many IP addresses, and should be
allotted more connections to your appliance. Senders of unsolicited bulk
email usually do not control many IP addresses; rather, they send large
volumes of mail through a few number of IP addresses. They should be
allotted fewer connections to your appliance.
The Mail Flow Monitor feature uses its differentiation between SenderBase
network owners and SenderBase organizations to determine how to allot
connections per sender, based on logic in SenderBase. See the “Using Email
Security Monitor” chapter in Cisco IronPort AsyncOS for Email Daily
Management Guide for more information on using the Mail Flow Monitor feature.
network owners and SenderBase organizations to determine how to allot
connections per sender, based on logic in SenderBase. See the “Using Email
Security Monitor” chapter in Cisco IronPort AsyncOS for Email Daily
Management Guide for more information on using the Mail Flow Monitor feature.