Cisco Cisco Email Security Appliance X1070 Guía Del Usuario
13-3
Cisco AsyncOS 9.1 for Email User Guide
Chapter 13 Anti-Spam
IronPort Anti-Spam Filtering
IronPort Anti-Spam Filtering
Related Topics
•
•
•
Evaluation Key
Your Cisco appliance ships with a 30-day evaluation key for the Cisco Anti-Spam software. This key is
not enabled until you accept the license agreement in the system setup wizard or Security Services >
IronPort Anti-Spam pages (in the GUI) or the
not enabled until you accept the license agreement in the system setup wizard or Security Services >
IronPort Anti-Spam pages (in the GUI) or the
systemsetup
or
antispamconfig
commands (in the CLI).
Once you have accepted the agreement, Cisco Anti-Spam will be enabled, by default, for the default
incoming Mail Policy. An alert is also sent to the administrator address you configured (see the System
Setup Wizard,
incoming Mail Policy. An alert is also sent to the administrator address you configured (see the System
Setup Wizard,
) noting that the Cisco Anti-Spam license will expire in 30 days.
Alerts are sent 30, 15, 5, and 0 days prior to expiration. For information on enabling the feature beyond
the 30-day evaluation period, contact your Cisco sales representative. You can see how much time
remains on the evaluation via the System Administration > Feature Keys page or by issuing the
the 30-day evaluation period, contact your Cisco sales representative. You can see how much time
remains on the evaluation via the System Administration > Feature Keys page or by issuing the
featurekey
command. (For more information, see
.)
Step 6
(Recommended) Enable SenderBase Reputation Service
scoring for each inbound mail flow policy, even if you
are not rejecting connections based on SenderBase
Reputation Scores.
scoring for each inbound mail flow policy, even if you
are not rejecting connections based on SenderBase
Reputation Scores.
For each inbound mail flow policy, ensure that “Use
SenderBase for Flow Control” is On.
SenderBase for Flow Control” is On.
See
Step 7
If your Email Security appliance does not connect
directly to external senders to receive incoming mail, but
instead receives messages relayed through a mail
exchange, mail transfer agent, or other machine on your
network, ensure that relayed incoming messages include
the original sender IP address.
directly to external senders to receive incoming mail, but
instead receives messages relayed through a mail
exchange, mail transfer agent, or other machine on your
network, ensure that relayed incoming messages include
the original sender IP address.
Step 8
Prevent alert and other messages generated by your
appliance from being incorrectly identified as spam.
appliance from being incorrectly identified as spam.
Step 9
(Optional) Enable URL filtering to strengthen protection
against malicious URLs in messages.
against malicious URLs in messages.
Step 10
Test your configuration.
Step 11
(Optional) Configure settings for service updates
(including anti-spam rules.)
(including anti-spam rules.)
Scanning rules for both anti-spam solutions are retrieved
by default from the Cisco update servers.
by default from the Cisco update servers.
•
•
•
Do This
More Info