Cisco Cisco Email Security Appliance C160 Mode D'Emploi

Page de 1197
 
25-16
User Guide for AsyncOS 9.7 for Cisco Email Security Appliances
 
Chapter 25      Configuring Routing and Delivery Features
  Configuring Masquerading
Figure 25-2
Alias Tables Defined for the Appliance
Configuring Masquerading
Masquerading is a feature that rewrites the Envelope Sender (also known as the sender, or 
MAIL FROM
and the To:, From:, and/or CC: headers on email processed by a listener according to a table that you 
construct. A typical example implementation of this feature is “Virtual Domains,” which allows you to 
host multiple domains from a single site. Another typical implementation is “hiding” your network 
infrastructure by “stripping” the subdomains from strings in email headers. The Masquerading feature 
is available for both private and public listeners. 
Ethernet interface: Data 2
IP interface: PublicNet (e.g. 192.168.2.1)
Public Listener: InboundMail 
SMTP
IronPort Email
Security appliance
Private Listener: OutboundMail 
The Alias Table feature was 
configured to create the following 
aliases: 
admin: 
administrator@example.com
[ example.com ]
customercare: bob@example.com, 
frank@example.com,
sally@example.com
Note that alias tables apply to all 
email traveling through (received by) 
the appliance, from both private and 
public listeners. 
Ethernet interface: Data 1
IP interface: PrivateNet (e.g. 192.168.1.1)
Host Access Table (HAT):
WHITELIST:      $TRUSTED 
BLACKLIST:      $BLOCKED
SUSPECTLIST:    $THROTTLED
UNKNOWNLIST:    $ACCEPTED
spamdomain.com  REJECT
.spamdomain.com REJECT
251.192.1.      TCPREFUSE
169.254.10.10   RELAY
ALL:            $ACCEPTED
Recipient Access Table (RAT):
Host Access Table (HAT):
RELAYLIST:    $RELAYED
ALL:          $BLOCKED
Default sender domain:  example.com
Received: header:           DISABLED