Cisco Cisco Email Security Appliance C190 Guia Do Utilizador

Página de 1212
 
22-16
User Guide for AsyncOS 10.0 for Cisco Email Security Appliances
 
Chapter 22      Email Authentication
  How to Verify Incoming Messages Using DKIM
Step 3
Depending on your requirements, configure the following fields:
DKIM Signing of System Generated Messages
Use From header for DKIM Signing
Note
If you are not using From header for DKIM signing or if a valid From header is missing, 
Sender header will be used. For DMARC verification of DKIM signed messages, you must 
use the From header during DKIM signing.
Step 4
Submit and commit your changes.
Domain Keys and Logging
Lines such as the following are added to the mail logs upon DomainKeys signing:
Lines such as these are added to the mail logs upon DKIM signing:
How to Verify Incoming Messages Using DKIM
Tue Aug 28 15:29:30 2007 Info: MID 371 DomainKeys: signing with dk-profile - matches 
user123@example.com
Tue Aug 28 15:34:15 2007 Info: MID 373 DomainKeys: cannot sign - no profile matches 
user12@example.com
Tue Aug 28 15:29:54 2007 Info: MID 372 DKIM: signing with dkim-profile - matches 
user@example.com
Tue Aug 28 15:34:15 2007 Info: MID 373 DKIM: cannot sign - no profile matches 
user2@example.com
Table 22-1
How to Verify Incoming Messages Using DKIM
Do This
More Info
Step 1
Create a profile for verifying messages using 
DKIM.
.
Step 2
(Optional) Create a custom mail flow policy to 
use for verifying incoming messages using 
DKIM.
Step 3
Configure your mail flow policies to verify 
incoming messages using DKIM.
Step 4
Define the action that the Email Security 
appliance takes on verified messages.
Step 5
Associate the action with groups of specific 
senders or recipients.