Cisco Cisco Email Security Appliance C160 Mode D'Emploi

Page de 630
Chapter 1      Getting Started with the IronPort Email Security Appliance
1-12
Cisco IronPort AsyncOS 7.1 for Email Configuration Guide
OL-22158-02
 describes the possible ports that may need to 
be opened for proper operation of the IronPort appliance behind a security 
firewall. 
includes the software license agreement for the IronPort Email Security 
appliance.
Topics Discussed in the Cisco IronPort AsyncOS for Email 
Advanced Configuration Guide
The following topics are discussed in the Cisco IronPort AsyncOS for Email 
Advanced Configuration Guide
Chapter 1, “Customizing Listeners” describes the process for tailoring the 
configuration of your Enterprise Email Gateway. This chapter discusses, in detail, 
advanced features available to you as you configure interfaces and listeners to 
handle email receiving through the gateway. 
Chapter 2, “Configuring Routing and Delivery Features” explains the features that 
affect email routing and delivery of email traveling through the IronPort 
appliance. 
Chapter 3, “LDAP Queries” describes how your IronPort appliance can connect 
to your corporate Lightweight Directory Access Protocol (LDAP) servers and 
perform queries for the purposes of verifying recipients to accept (including 
group membership), mail routing and address rewriting. masquerading headers, 
and supporting for SMTP authentication. 
Chapter 4, “Email Authentication” details the process of configuring and enabling 
email authentication on an IronPort appliance. IronPort AsyncOS supports several 
types of email authentication, including Sender Policy Framework (SPF), Sender 
ID Framework (SIDF), and DomainKeys Identified Mail (DKIM) verification of 
incoming mail, as well as DomainKeys and DKIM signing of outgoing mail.
Chapter 5, “Using Message Filters to Enforce Email Policies” describes how to 
use Message Filters to define rules for handling email, including the ability to 
modify the content of messages through the attachment filtering, image analysis, 
and content dictionary features. 
Chapter 7, “Advanced Network Configuration” includes information about NIC 
pairing, virtual LANs and more.