Cisco Cisco Email Security Appliance C160 Mode D'Emploi

Page de 1185
C H A P T E R
 
7-1
Cisco AsyncOS 8.5.6 for Email User Guide
 
7
Defining Which Hosts Are Allowed to Connect 
Using the Host Access Table (HAT)
 
Overview of Defining Which Hosts Are Allowed to Connect
For every configured listener, you must define a set of rules that control incoming connections from 
remote hosts. For example, you can define remote hosts and whether or not they can connect to the 
listener. AsyncOS allows you to define which hosts are allowed to connect to the listener using the Host 
Access Table (HAT).
The HAT maintains a set of rules that control incoming connections from remote hosts for a listener. 
Every configured listener has its own HAT. You configure HATs for both public and private listeners. 
To control incoming connections from remote hosts, you define the following information:
Remote hosts. Define the way in which a remote host attempts to connect to the listener. You group 
remote host definitions into sender groups. For example, you can define multiple remote hosts in a 
sender group by IP address and partial hostname. You can also define remote hosts by their 
SenderBase reputation score. For more information, see 
.
Access rules. You can define whether the defined remote hosts in the sender group are allowed to 
connect to the listener and under what conditions. You define access rules using mail flow policies
For example, you can define that a particular sender group is allowed to connect to the listener, but 
only allow a maximum number of messages per connection. For more information, see