Cisco Cisco Email Security Appliance C170 Guía Del Usuario
C H A P T E R
7-1
User Guide for AsyncOS 9.7 for Cisco Email Security Appliances
7
Defining Which Hosts Are Allowed to Connect
Using the Host Access Table (HAT)
Using the Host Access Table (HAT)
•
•
•
•
•
•
•
•
•
Overview of Defining Which Hosts Are Allowed to Connect
For every configured listener, you must define a set of rules that control incoming connections from
remote hosts. For example, you can define remote hosts and whether or not they can connect to the
listener. AsyncOS allows you to define which hosts are allowed to connect to the listener using the Host
Access Table (HAT).
remote hosts. For example, you can define remote hosts and whether or not they can connect to the
listener. AsyncOS allows you to define which hosts are allowed to connect to the listener using the Host
Access Table (HAT).
The HAT maintains a set of rules that control incoming connections from remote hosts for a listener.
Every configured listener has its own HAT. You configure HATs for both public and private listeners.
Every configured listener has its own HAT. You configure HATs for both public and private listeners.
To control incoming connections from remote hosts, you define the following information:
•
Remote hosts. Define the way in which a remote host attempts to connect to the listener. You group
remote host definitions into sender groups. For example, you can define multiple remote hosts in a
sender group by IP address and partial hostname. You can also define remote hosts by their
SenderBase reputation score. For more information, see
remote host definitions into sender groups. For example, you can define multiple remote hosts in a
sender group by IP address and partial hostname. You can also define remote hosts by their
SenderBase reputation score. For more information, see
.
•
Access rules. You can define whether the defined remote hosts in the sender group are allowed to
connect to the listener and under what conditions. You define access rules using mail flow policies.
For example, you can define that a particular sender group is allowed to connect to the listener, but
only allow a maximum number of messages per connection. For more information, see
connect to the listener and under what conditions. You define access rules using mail flow policies.
For example, you can define that a particular sender group is allowed to connect to the listener, but
only allow a maximum number of messages per connection. For more information, see