Cisco Cisco Email Security Appliance C160 Guía Del Usuario
Chapter 5 Configuring the Gateway to Receive Email
5-180
Cisco IronPort AsyncOS 7.1 for Email Configuration Guide
OL-22158-02
throttled based on the receiving control defined in mail flow policies. Specifying
this recipient to bypass receiving control in a listener’s RAT allows the listener to
receive unlimited messages for the recipient “
this recipient to bypass receiving control in a listener’s RAT allows the listener to
receive unlimited messages for the recipient “
postmaster@domain
” while
retaining mail flow policies for other recipients in the same domain. Recipients
will avoid being counted against the recipients-per-hour counter maintained by
the system if the sending domain is being limited.
will avoid being counted against the recipients-per-hour counter maintained by
the system if the sending domain is being limited.
To specify certain recipients to bypass receiving control via the GUI, select “Yes”
for Bypass Receiving Control when adding or editing a RAT entry:
for Bypass Receiving Control when adding or editing a RAT entry:
Figure 5-37
Bypassing Receiving Control
To specify certain recipients to bypass receiving control via the CLI, answer yes
to the following question when you enter recipients using the
to the following question when you enter recipients using the
listenerconfig ->
edit -> rcptaccess
command:
Bypassing LDAP Accept for Special Recipients
If you configure LDAP acceptance queries, you may wish to bypass the
acceptance query for certain recipients. This feature can be useful if there are
recipients for whom you receive email which you do not want to be delayed or
queued during LDAP queries, such as
acceptance query for certain recipients. This feature can be useful if there are
recipients for whom you receive email which you do not want to be delayed or
queued during LDAP queries, such as
customercare@example.com
.
If you configure the recipient address to be rewritten in the work queue prior to
the LDAP acceptance query, (such as aliasing or using a domain map), the
rewritten address will not bypass LDAP acceptance queries. For example you use
an alias table to map
the LDAP acceptance query, (such as aliasing or using a domain map), the
rewritten address will not bypass LDAP acceptance queries. For example you use
an alias table to map
customercare@example.com
to
bob@example.com
and
sue@example.com
. If you configure bypassing LDAP acceptance for
customercare@example.com
, an LDAP acceptance query is still run for
bob@example.com
and
sue@example.com
after the aliasing takes place.
To configure bypassing LDAP acceptance via the GUI, select Bypass LDAP
Accept Queries for this Recipient when you add or edit the RAT entry.
Accept Queries for this Recipient when you add or edit the RAT entry.
Would you like to bypass receiving control for this entry? [N]> y