Cisco Cisco Email Security Appliance X1050 Mode D'Emploi
6-193
Cisco IronPort AsyncOS 7.1 for Email Configuration Guide
OL-22158-02
Chapter 6 Email Security Manager
Examples of Policy Matching
The following examples help show how the policy tables are matched in a
top-down fashion.
top-down fashion.
Given the following Incoming Mail Email Security Policy table shown in
, incoming messages will match different policies.
Example 1
A message from sender
bill@lawfirm.com
sent to recipient
jim@example.com
will match policy #2, because the user description that matches the sender
(
(
@lawfirm.com
) appears sooner in the table than the user description that matches
the recipient (
jim@
).
Example 2
Sender
joe@yahoo.com
sends an incoming message with three recipients:
john@example.com
,
jane@newdomain.com
, and
bill@example.com
. The message
for recipient
jane@newdomain.com
will receive the anti-spam, anti-virus, virus
outbreak filters, and content filters defined in policy #3, while the message for
recipient
recipient
john@example.com
will receive the settings defined in policy #5.
Because the recipient
bill@example.com
does not match the engineering LDAP
Table 6-1
Policy Matching Example
Order
Policy Name
Users
1
special_people
Recipient:
joe@example.com
Recipient:
ann@example.com
2
from_lawyers
Sender:
@lawfirm.com
3
acquired_domains
Recipient:
@newdomain.com
Recipient:
@anotherexample.com
4
engineering
Recipient:
PublicLDAP.ldapgroup: engineers
5
sales_team
Recipient:
jim@
Recipient:
john@
Recipient:
larry@
Default Policy
(all users)