Cisco Cisco Email Security Appliance C170 Guia Do Utilizador

Página de 1140
 
7-19
Cisco AsyncOS 8.5.5 for Email Security User Guide
 
Chapter 7      Defining Which Hosts Are Allowed to Connect Using the Host Access Table (HAT)
  Working with the Host Access Table Configuration
Note
If anti-spam or anti-virus scanning is enabled globally in the HAT, messages are flagged for 
anti-spam or anti-virus scanning as they are accepted by the appliance. If anti-spam or anti-virus 
scanning is disabled after the message is accepted, the message will still be subject to scanning 
when it leaves the work queue.
Step 4
Submit and commit your changes.
Defining Default Values for Mail Flow Policies
Procedure 
Step 1
Click Mail Policies > Mail Flow Policies
Step 2
Choose the listener to edit in the Listener field.
Step 3
Click the Default Policy Parameters link below the configured mail flow policies. 
Step 4
Define the default values that all mail flow policies for this listener use.
For more information on the properties, see 
Step 5
Submit and commit your changes. 
Working with the Host Access Table Configuration
You can export all information stored in a Host Access Table to a file, and you can import Host Access 
Table information stored in a file into the appliance for a listener, overwriting all existing Host Access 
Table information. 
Exporting the Host Access Table Configuration to an External File
Procedure 
Step 1
Navigate to the Mail Policies > HAT Overview page.
Step 2
Choose the listener to edit in the Listener menu.
Exception Table
Use Exception Table
Use the sender verification domain exception table. You can only have 
one exception table, but you can enable it per mail flow policy. See 
 for more information.
Table 7-8
Mail Flow Policy Parameters (continued)
Parameter
Description