Cisco Cisco Email Security Appliance C160 Guía Del Usuario
20-32
AsyncOS 9.1.2 for Cisco Email Security Appliances User Guide
Chapter 20 Email Authentication
Determining the Action to Take for SPF/SIDF Verified Mail
•
Pass - the client is authorized to send mail with the given identity.
•
Neutral - the domain owner does not assert whether the client is authorized to use the given identity.
•
SoftFail - the domain owner believes the host is not authorized to use the given identity but is not
willing to make a definitive statement.
willing to make a definitive statement.
•
Fail - the client is not authorized to send mail with the given identity.
•
TempError - a transient error occurred during verification.
•
PermError - a permanent error occurred during verification.
Using the spf-status Filter Rule in the CLI
The following example shows the
spf-status
message filter in use:
skip-spam-check-for-verified-senders:
if (sendergroup == "TRUSTED" and spf-status == "Pass"){
skip-spamcheck();
}
quarantine-spf-failed-mail:
if (spf-status("pra") == "Fail") {
if (spf-status("mailfrom") == "Fail"){
# completely malicious mail
quarantine("Policy");
} else {
if(spf-status("mailfrom") == "SoftFail") {
# malicious mail, but tempting
quarantine("Policy");
}
}
} else {
if(spf-status("pra") == "SoftFail"){
if (spf-status("mailfrom") == "Fail"
or spf-status("mailfrom") == "SoftFail"){
# malicious mail, but tempting