Cisco Cisco Email Security Appliance C170 Guia Do Utilizador

Página de 1224
 
21-33
Cisco AsyncOS 9.5 for Email User Guide
 
Chapter 21      Email Authentication
  Determining the Action to Take for SPF/SIDF Verified Mail
spf-status Content Filter Rule in the GUI
You can also enable the 
spf-status
 rule from the content filters in the GUI. However, you cannot check 
results against HELO, MAIL FROM, and PRA identities when using the 
spf-status 
content filter rule.
To add the 
spf-status
 content filter rule from the GUI, click Mail Policies > Incoming Content 
Filters. Then add the SPF Verification filter rule from the Add Condition dialog box. Specify one or 
more verification results for the condition.
After you add the SPF Verification condition, specify an action to perform based on the SPF status. For 
example, if the SPF status is SoftFail, you might quarantine the message.
Using the spf-passed Filter Rule
The 
spf-passed
 rule shows the results of SPF verification as a Boolean value. The following example 
shows an 
spf-passed
 rule used to quarantine emails that are not marked as spf-passed:
             quarantine("Policy");
         }
       }
     }
stamp-mail-with-spf-verification-error:
     if (spf-status("pra") == "PermError, TempError"
             or spf-status("mailfrom") == "PermError, TempError"
             or spf-status("helo") == "PermError, TempError"){
         # permanent error - stamp message subject
         strip-header("Subject");
         insert-header("Subject", "[POTENTIAL PHISHING] $Subject"); }
.
quarantine-spf-unauthorized-mail:
    if (not spf-passed) {
        quarantine("Policy");
    }