Cisco Cisco Email Security Appliance C170 Guia Do Utilizador

Página de 460
 
1-8
Cisco IronPort AsyncOS 7.6 for Email Configuration Guide
OL-26342-01
Chapter 1      Getting Started with the Cisco IronPort Email Security Appliance
Chapter 4, “Email Authentication” details the process of configuring and enabling email authentication 
on an Cisco IronPort appliance. Cisco IronPort AsyncOS supports several types of email authentication, 
including Sender Policy Framework (SPF), Sender ID Framework (SIDF), and DomainKeys Identified 
Mail (DKIM) verification of incoming mail, as well as DomainKeys and DKIM signing of outgoing 
mail.
Chapter 5, “Using Message Filters to Enforce Email Policies” describes how to use Message Filters to 
define rules for handling email, including the ability to modify the content of messages through the 
attachment filtering, image analysis, and content dictionary features. 
Chapter 7, “Advanced Network Configuration” includes information about NIC pairing, virtual LANs 
and more.
Chapter 8, “Centralized Management” describes the centralized management feature, which allows you 
to manage and configure multiple appliances. The centralized management feature provides increased 
reliability, flexibility, and scalability within your network, allowing you to manage globally while 
complying with local policies.
Appendix A, “AsyncOS Quick Reference Guide” provides a quick reference for most commands in the 
CLI. 
Appendix B, “Accessing the Appliance” describes how to access the Cisco IronPort appliance to send 
and retrieve files from Cisco IronPort appliance. 
The following topics are discussed in the Cisco IronPort AsyncOS for Email 
Daily Management Guide
Chapter 1, “Managing the Cisco IronPort Email Appliance,” provides an introduction to the Cisco 
IronPort appliance and defines its key features and role in the enterprise network. 
Chapter 2, “Using Email Security Monitor,” describes the Mail Flow Monitor feature: a powerful, 
web-based console that provides complete visibility into all inbound email traffic for your enterprise.
Chapter 3, “Tracking Email Messages,” describes local message tracking. You can use message tracking 
to determine if a particular message was delivered, found to contain a virus, or placed in a spam 
quarantine.
Chapter 4, “Quarantines,” describes the special queues or repositories used to hold and process 
messages. Messages in quarantines can be delivered or deleted, based on how you configured the 
quarantine. This includes the Cisco IronPort Spam quarantine.
Chapter 5, “Logging,” describes the logging and log subscription functionality of the Cisco IronPort 
appliance. 
Chapter 6, “Managing and Monitoring via the CLI,” describes the commands available in the CLI 
available to you as you monitor the mail flow through the gateway. 
Chapter 7, “Other Tasks in the GUI,” describes typical administration tasks for managing and monitoring 
the Cisco IronPort appliance through the GUI. 
Chapter 8, “Common Administrative Tasks,” describes typical administration commands for managing 
and monitoring the Cisco IronPort appliance, such adding users, managing the configuration file, and 
managing SSH keys. This chapter also describes how to request technical support, allow Cisco IronPort 
customer support remote access to your appliance, and use feature keys.
Chapter 9, “Testing and Troubleshooting” describes the process of creating so-called black hole listeners 
for testing the system performance and troubleshooting configuration problems.