Cisco Cisco Email Security Appliance C170 Guia Do Utilizador

Página de 1138
 
8-5
Cisco AsyncOS 8.5 for Email User Guide
 
Chapter 8      Accepting or Rejecting Connections Based on Domain Name or Recipient Address
  Domains and Users
Bypassing Throttling for Special Recipients
For recipient entries, you can specify that the recipient bypasses throttling control mechanisms enabled 
on the listener. 
This feature is useful if there are certain recipients for whom you do not want to limit messages. For 
example, many users will want to receive email for the address “
postmaster@domain
” on a listener, even 
if the sending domain is being throttled based on the receiving control defined in mail flow policies. 
Specifying this recipient to bypass receiving control in a listener’s RAT allows the listener to receive 
unlimited messages for the recipient “
postmaster@domain
” while retaining mail flow policies for other 
recipients in the same domain. Recipients will avoid being counted against the recipients-per-hour 
counter maintained by the system if the sending domain is being limited.
To specify certain recipients to bypass receiving control via the GUI, select Yes for the “Bypass 
Receiving Control” setting when adding or editing a RAT entry:
To specify certain recipients to bypass receiving control via the CLI, answer yes to the following 
question when you enter recipients using the 
listenerconfig > edit > rcptaccess
 command: 
Rearranging the Order of Domains and Users in the Recipient Access Table
Procedure 
Step 1
Navigate to the Mail Policies > Recipient Access Table (RAT) page.
Step 2
Choose the listener to edit in the Overview for Listener field.
Step 3
Click Edit Order. 
Step 4
Change the order by arranging the values in the Order column.
Step 5
Submit and commit your changes.
Exporting the Recipient Access Table to an External File
Procedure 
Step 1
Navigate to the Mail Policies > Recipient Access Table (RAT) page.
Step 2
Choose the listener to edit in the Overview for Listener field.
Step 3
Click Export RAT. 
Step 4
Enter a file name for the exported entries. 
This is the name of the file that will be created in the configuration directory on the appliance.
Step 5
Submit and commit your changes.
Would you like to bypass receiving control for this entry?  [N]> y