Cisco Cisco Email Security Appliance X1070 Guía Del Usuario
7-32
User Guide for AsyncOS 9.7 for Cisco Email Security Appliances
Chapter 7 Defining Which Hosts Are Allowed to Connect Using the Host Access Table (HAT)
Verifying Senders
Defining Messages to Send to Unverified Senders Using the ACCEPTED Mail Flow Policy
Procedure
Step 1
Select Mail Policies > Mail Flow Policies.
Step 2
On the Mail Flow Policies page, click on the ACCEPTED mail flow policy.
Step 3
Scroll to the bottom of the mail flow policy:
Figure 7-9
ACCEPTED Mail Flow Policy Envelope Sender DNS Verification Settings
Step 4
Select On to enable envelope sender DNS verification for this mail flow policy.
Step 5
You may also define custom SMTP code and responses.
Step 6
Enable the domain exception table by selecting On for “Use Domain Exception Table.”
Step 7
Submit and commit your changes.
Excluding Unverified Senders from Sender Verification Rules Based on Sender’s Email Address
Procedure
Step 1
Select Mail Policies > Exception Table.
Note
The exception table applies globally to all mail flow policies with “Use Exception Table”
enabled.
enabled.
Step 2
Click Add Domain Exception on the Mail Policies > Exception Table page.
Step 3
Enter an email address. You can enter a specific address (pres@whitehouse.gov), a name (user@), a
domain (@example.com or @.example.com), or an address with a bracketed IP address
(user@[192.168.23.1]).
domain (@example.com or @.example.com), or an address with a bracketed IP address
(user@[192.168.23.1]).
Step 4
Specify whether to allow or reject messages from the address. When rejecting mail, you can also specify
an SMTP code and custom response.
an SMTP code and custom response.