Cisco Cisco Email Security Appliance C160 Guía Del Usuario
7-30
User Guide for AsyncOS 9.7 for Cisco Email Security Appliances
Chapter 7 Defining Which Hosts Are Allowed to Connect Using the Host Access Table (HAT)
Verifying Senders
Figure 7-5
HAT Overview Page
Step 3
Click Edit Settings.
Figure 7-6
Sender Group: SUSPECTLIST: Edit Settings
Step 4
Select the THROTTLED policy from the list.
Step 5
Check the “Connecting host reverse DNS lookup (PTR) does not match the forward DNS lookup (A)”
checkbox under Connecting Host DNS Verification.
checkbox under Connecting Host DNS Verification.
Step 6
Submit and commit your changes.
Now, senders for which reverse DNS lookups fail will match the SUSPECTLIST sender group and will
receive the default action from the THROTTLED mail flow policy.
receive the default action from the THROTTLED mail flow policy.
Implementing More Stringent Throttling Settings for Unverified Senders
Procedure
Step 1
Create a new mail flow policy (for this example, it is named THROTTLEMORE) and configure it with
more stringent throttling settings.
more stringent throttling settings.
a.
On the Mail Flow Policies page, click Add Policy
b.
Enter a name for the mail flow policy, and select Accept as the Connection Behavior.