Cisco Cisco Email Security Appliance C650 Guía Del Usuario
7-31
User Guide for AsyncOS 9.8 for Cisco Email Security Appliances
Chapter 7 Defining Which Hosts Are Allowed to Connect Using the Host Access Table (HAT)
Verifying Senders
Note
The exception table applies globally to all mail flow policies with “Use Exception Table”
enabled.
enabled.
Step 2
Click Add Domain Exception on the Mail Policies > Exception Table page.
Step 3
Enter an email address. You can enter a specific address (pres@whitehouse.gov), a name (user@), a
domain (@example.com or @.example.com), or an address with a bracketed IP address
(user@[192.168.23.1]).
domain (@example.com or @.example.com), or an address with a bracketed IP address
(user@[192.168.23.1]).
Step 4
Specify whether to allow or reject messages from the address. When rejecting mail, you can also specify
an SMTP code and custom response.
an SMTP code and custom response.
Step 5
Submit and commit your changes.
Searching for Addresses within the Sender Verification Exception Table
Procedure
Step 1
Enter the email address in the Find Domain Exception section of the Exception Table page.
Step 2
Click Find.
If the address matches any of the entries in the table, the first matching entry is displayed.
Testing Your Settings for Messages from Unverified Senders
Now that you have configured sender verification settings, you can verify the behavior of your appliance.
Note that testing DNS-related settings is beyond the scope of this document.
Related Topics
•
•
Sending a Test Message with a Malformed MAIL FROM Sender Address
While it may be difficult to test the various DNS-related settings for your THROTTLED policy, you can
test the malformed MAIL FROM setting.
test the malformed MAIL FROM setting.
Procedure
Step 1
Open a Telnet session to your appliance.
Step 2
Use SMTP commands to send a test message with a malformed MAIL FROM (something like “admin”
without a domain).
without a domain).