Cisco Cisco Email Security Appliance X1070 Guía Del Usuario
7-10
User Guide for AsyncOS 9.8 for Cisco Email Security Appliances
Chapter 7 Defining Which Hosts Are Allowed to Connect Using the Host Access Table (HAT)
Defining Access Rules for Email Senders Using Mail Flow Policies
Figure 7-2
Using HAT Variables
Or like this, in the CLI:
Testing HAT Variables
To test these variables, add the IP address of a known, trusted machine to the $WHITELIST sender group
of a listener on the appliance. Then, connect from that machine via telnet. You can see the variable
substitution in the SMTP response. For example:
of a listener on the appliance. Then, connect from that machine via telnet. You can see the variable
substitution in the SMTP response. For example:
Would you like to specify a custom SMTP response? [Y]> y
Enter the SMTP code to use in the response. 220 is the standard code.
[220]> 200
Enter your custom SMTP response. Press Enter on a blank line to finish.
You've connected from the hostname: $Hostname, IP address of: $RemoteIP, matched the
group: $Group, $HATEntry and the SenderBase Organization: $OrgID.
# telnet IP_address_of_Email_Security_Appliance port
220 hostname ESMTP
200 You've connected from the hostname: hostname, IP address of:
IP-address_of_connecting_machine
, matched the group: WHITELIST, 10.1.1.1 the SenderBase
Organization: OrgID.