Cisco Cisco Email Security Appliance C670 사용자 가이드
12-393
Cisco IronPort AsyncOS 7.1 for Email Configuration Guide
OL-22158-02
Chapter 12 IronPort Email Encryption
Figure 12-2
Configuring Global Settings
Adding an Encryption Profile
You can create one or more encryption profiles if you use a local key service. You
might want to create different encryption profiles if you want to use different
levels of security for different groups of email. For example, you might want
messages containing sensitive material to be sent with high security, but other
messages to be sent with medium security. In this case, you might create a high
security encryption profile to associate with the messages containing certain key
words (such as ‘confidential’), and create another encryption profile for other
outgoing messages.
might want to create different encryption profiles if you want to use different
levels of security for different groups of email. For example, you might want
messages containing sensitive material to be sent with high security, but other
messages to be sent with medium security. In this case, you might create a high
security encryption profile to associate with the messages containing certain key
words (such as ‘confidential’), and create another encryption profile for other
outgoing messages.
Note
You can configure multiple encryption profiles for a hosted key service. If your
organization has multiple brands, this allows you to reference different logos
stored on the key server for the PXE envelopes.
organization has multiple brands, this allows you to reference different logos
stored on the key server for the PXE envelopes.
You create and save an encryption profile to store the following encryption
settings:
settings:
•
Key server settings. Specify a key server and information for connecting to
that key server.
that key server.
•
Envelope settings. Specify details about the message envelope, such as the
level of security, whether to return read receipts, the length of time a message
is queued for encryption before it times out, the type of encryption algorithm
to use, and whether to enable a decryption applet to run on the browser.
level of security, whether to return read receipts, the length of time a message
is queued for encryption before it times out, the type of encryption algorithm
to use, and whether to enable a decryption applet to run on the browser.