Cisco Cisco Email Security Appliance X1050 ユーザーガイド
2-35
Cisco IronPort AsyncOS 7.6 for Email Advanced Configuration Guide
OL-25137-01
Chapter 2 Configuring Routing and Delivery Features
Figure 2-6
Domain Map Defined for a Public Listener
Directing Bounced Email
Bounced email is an inevitable part of any email delivery. Your Cisco IronPort appliance is able to
process bounced email in a number of highly configurable ways.
process bounced email in a number of highly configurable ways.
Please note, this section describes how to control how your Cisco IronPort appliance generates outgoing
bounces (based on incoming mail). To control how your Cisco IronPort appliance controls incoming
bounces (based on outgoing mail) use Cisco IronPort Bounce Verification (see
bounces (based on incoming mail). To control how your Cisco IronPort appliance controls incoming
bounces (based on outgoing mail) use Cisco IronPort Bounce Verification (see
Ethernet interface: Data 2
IP interface: PublicNet (e.g. 192.168.2.1)
Public Listener: InboundMail
IronPort Email
Security appliance
Private Listener: OutboundMail
A domain map for the public listener
“InboundMail” was created. Mail for
the domain and any subdomain of
“InboundMail” was created. Mail for
the domain and any subdomain of
oldcompanyname.com
is mapped to
the domain
example.com
.
Ethernet interface: Data 1
IP interface: PrivateNet (e.g. 192.168.1.1)
Host Access Table (HAT):
WHITELIST: $TRUSTED
BLACKLIST: $BLOCKED
SUSPECTLIST: $THROTTLED
UNKNOWNLIST: $ACCEPTED
spamdomain.com REJECT
.spamdomain.com REJECT
251.192.1. TCPREFUSE
169.254.10.10 RELAY
ALL: $ACCEPTED
Recipient Access Table (RAT):
example.com ACCEPT
newcompanyname.com ACCEPT
ALL REJECT
Domain Map: enabled
@.oldcompanyname.com
Host Access Table (HAT):
RELAYLIST: $RELAYED
ALL: $BLOCKED
Default sender domain: example.com
Received: header: DISABLED
Masquerading:
@.example.com @example.com