Cisco Cisco Email Security Appliance C160 Références techniques

Page de 324
 
3-257
CLI Reference Guide for AsyncOS 9.6 for Cisco Email Security Appliances
 
Chapter 3      The Commands: Reference Examples
  SMTP Services Configuration
- DELETE - Remove a listener.
- SETUP - Change global settings.
[]>
Example - Customizing the Host Acess Table (HAT ) for a listener via Export and Import
Many of the subcommands within the 
listenerconfig
 command allow you to import and export data in 
order to make large configuration changes without having to enter data piecemeal in the CLI. 
These steps use the CLI to modify the Host Access Table (HAT) of a listener by exporting, modifying, 
and importing a file. You can also use the HAT CLI editor or the GUI to customize the HAT for a listener. 
For more information, see the “Configuring the Gateway to Receive Mail” and “Using Mail Flow 
Monitor” chapters in the User Guide for AsyncOS for Cisco Email Security Appliances
To customize a HAT for a listener you have defined via export and import: 
Step 1
Use the 
hostaccess -> export
 subcommands of 
listenerconfig
 to export the default HAT to a file. 
In the following example, the HAT for the public listener InboundMail is printed, and then exported to 
a file named 
inbound.HAT.txt
mail3.example.com> listenerconfig
Currently configured listeners:
1. InboundMail (on PublicNet, 192.168.2.1) SMTP TCP Port 25 Public
2. OutboundMail (on PrivateNet, 192.168.1.1) SMTP TCP Port 25 Private
Choose the operation you want to perform:
- NEW - Create a new listener.
- EDIT - Modify a listener.
- DELETE - Remove a listener.
- SETUP - Change global settings.
[]> edit
Enter the name or number of the listener you wish to edit.
[]> 1
Name: InboundMail
Type: Public
Interface: PublicNet (192.168.2.1/24) TCP Port 25
Protocol: SMTP
Default Domain:
Max Concurrency: 1000 (TCP Queue: 50)
Domain map: disabled
TLS: No
SMTP Authentication: Disabled
Bounce Profile: Default
Use SenderBase For Reputation Filters and IP Profiling: Yes
Footer: None
LDAP: off
Choose the operation you want to perform:
- NAME - Change the name of the listener.
- INTERFACE - Change the interface.
- LIMITS - Change the injection limits.
- SETUP - Configure general options.
- HOSTACCESS - Modify the Host Access Table.
- RCPTACCESS - Modify the Recipient Access Table.
- BOUNCECONFIG - Choose the bounce profile to use for messages injected on this listener.
- MASQUERADE - Configure the Domain Masquerading Table.