Cisco Cisco Email Security Appliance C170 Guia Do Utilizador

Página de 1138
 
7-29
Cisco AsyncOS 8.5 for Email User Guide
 
Chapter 7      Defining Which Hosts Are Allowed to Connect Using the Host Access Table (HAT)
  Verifying Senders
to be automatically rejected. You can also list domains that you want to automatically allow, such as 
internal or test domains. This is similar to envelope recipient (SMTP RCPT TO command) processing 
which occurs in the Recipient Access Table (RAT).
The sender verification exception table is defined in the GUI via the Mail Policies > Exception Table 
page (or the CLI, via the 
exceptionconfig
 command) and then is enabled on a per-policy basis via the 
GUI (see 
) or the CLI (see the Cisco AsyncOS CLI Reference Guide.
Entries in the sender verification exception table have the following syntax:
Figure 7-4
Exception Table Listing
See 
 for more information about modifying the exception table.
Implementing Sender Verification — Example Settings
This section provides an example of a typical conservative implementation of host and envelope sender 
verification.
For this example, when implementing host sender verification, mail from connecting hosts for which 
reverse DNS lookup does not match is throttled via the existing SUSPECTLIST sender group and 
THROTTLED mail flow policy.
A new sender group (UNVERIFIED) and a new mail flow policy (THROTTLEMORE) are created. Mail 
from connecting hosts which are not verified will be throttled (using the UNVERIFIED sender group 
and the more aggressive THROTTLEMORE mail flow policy) prior to the SMTP conversation.
Envelope sender verification is enabled for the ACCEPTED mail flow policy.