Cisco Cisco Email Security Appliance C190 Guía Del Usuario
20-33
AsyncOS 9.1.2 for Cisco Email Security Appliances User Guide
Chapter 20 Email Authentication
Determining the Action to Take for SPF/SIDF Verified Mail
spf-status Content Filter Rule in the GUI
You can also enable the
spf-status
rule from the content filters in the GUI. However, you cannot check
results against HELO, MAIL FROM, and PRA identities when using the
spf-status
content filter rule.
To add the
spf-status
content filter rule from the GUI, click Mail Policies > Incoming Content
Filters. Then add the SPF Verification filter rule from the Add Condition dialog box. Specify one or
more verification results for the condition.
more verification results for the condition.
After you add the SPF Verification condition, specify an action to perform based on the SPF status. For
example, if the SPF status is SoftFail, you might quarantine the message.
example, if the SPF status is SoftFail, you might quarantine the message.
Using the spf-passed Filter Rule
The
spf-passed
rule shows the results of SPF verification as a Boolean value. The following example
shows an
spf-passed
rule used to quarantine emails that are not marked as spf-passed:
quarantine("Policy");
}
}
}
stamp-mail-with-spf-verification-error:
if (spf-status("pra") == "PermError, TempError"
or spf-status("mailfrom") == "PermError, TempError"
or spf-status("helo") == "PermError, TempError"){
# permanent error - stamp message subject
strip-header("Subject");
insert-header("Subject", "[POTENTIAL PHISHING] $Subject"); }
.
quarantine-spf-unauthorized-mail:
if (not spf-passed) {
quarantine("Policy");
}