Cisco Cisco Email Security Appliance C170 Guia Do Utilizador

Página de 1140
 
23-15
Cisco AsyncOS 8.5.5 for Email Security User Guide
 
Chapter 23      Configuring Routing and Delivery Features
  Configuring Masquerading
Figure 23-2
Alias Tables Defined for the Appliance
Configuring Masquerading
Masquerading is a feature that rewrites the Envelope Sender (also known as the sender, or 
MAIL FROM
and the To:, From:, and/or CC: headers on email processed by a listener according to a table that you 
construct. A typical example implementation of this feature is “Virtual Domains,” which allows you to 
host multiple domains from a single site. Another typical implementation is “hiding” your network 
infrastructure by “stripping” the subdomains from strings in email headers. The Masquerading feature 
is available for both private and public listeners. 
Ethernet interface: Data 2
IP interface: PublicNet (e.g. 192.168.2.1)
Public Listener: InboundMail 
SMTP
IronPort Email
Security appliance
Private Listener: OutboundMail 
The Alias Table feature was 
configured to create the following 
aliases: 
admin: 
administrator@example.com
[ example.com ]
customercare: bob@example.com, 
frank@example.com,
sally@example.com
Note that alias tables apply to all 
email traveling through (received by) 
the appliance, from both private and 
public listeners. 
Ethernet interface: Data 1
IP interface: PrivateNet (e.g. 192.168.1.1)
Host Access Table (HAT):
WHITELIST:      $TRUSTED 
BLACKLIST:      $BLOCKED
SUSPECTLIST:    $THROTTLED
UNKNOWNLIST:    $ACCEPTED
spamdomain.com  REJECT
.spamdomain.com REJECT
251.192.1.      TCPREFUSE
169.254.10.10   RELAY
ALL:            $ACCEPTED
Recipient Access Table (RAT):
Host Access Table (HAT):
RELAYLIST:    $RELAYED
ALL:          $BLOCKED
Default sender domain:  example.com
Received: header:           DISABLED