Cisco Cisco Email Security Appliance C650 Guía Del Usuario
25-55
User Guide for AsyncOS 9.7 for Cisco Email Security Appliances
Chapter 25 Configuring Routing and Delivery Features
Bounce Verification
Configuring Bounce Verification Address Tagging Keys
The Bounce Verification Address Tagging Keys listing shows your current key and any unpurged keys
you have used in the past. To add a new key:
you have used in the past. To add a new key:
Procedure
Step 1
On the Mail Policies > Bounce Verification page, click New Key.
Step 2
Enter a text string and click Submit.
Step 3
Commit your changes.
Related Topics
•
Purging Keys
You can purge your old address tagging keys by selecting a rule for purging from the pull-down menu
and clicking Purge.
and clicking Purge.
Configuring Bounce Verification Settings
The bounce verification settings determine which action to take when an invalid bounce is received.
Procedure
Step 1
Choose Mail Policies > Bounce Verification.
Step 2
Click Edit Settings.
Step 3
Select whether to reject invalid bounces, or to add a custom header to the message. If you want to add a
header, enter the header name and value.
header, enter the header name and value.
Step 4
Optionally, enable smart exceptions. This setting allows incoming mail messages, and bounce messages
generated by internal mail servers, to be automatically exempted from bounce verification processing
(even when a single listener is used for both incoming and outgoing mail).
generated by internal mail servers, to be automatically exempted from bounce verification processing
(even when a single listener is used for both incoming and outgoing mail).
Step 5
Submit and commit your changes.
Configuring Bounce Verification Using the CLI
You can use the
bvconfig
and
destconfig
commands in the CLI to configure bounce verification. These
commands are discussed in the CLI Reference Guide for AsyncOS for Cisco Email Security Appliances.
Bounce Verification and Cluster Configuration
Bounce verification works in a cluster configuration as long as both appliances use the same "bounce
key." When you use the same key, either systems should be able to accept a legitimate bounce back. The
modified header tag/key is not specific to each appliance.
key." When you use the same key, either systems should be able to accept a legitimate bounce back. The
modified header tag/key is not specific to each appliance.