Cisco Cisco Email Security Appliance C170 Guia Do Utilizador

Página de 460
 
12-2
Cisco IronPort AsyncOS 7.6 for Email Configuration Guide
OL-25136-01
Chapter 12      Cisco IronPortEmail Encryption
Step 4
Configure an outgoing content filter. You need to configure a content filter to tag the outbound emails 
that should be encrypted. For instructions on creating the content filter, see 
The following web browsers are supported:
  •
Microsoft® Internet Explorer 7 (Windows XP and Vista)
  •
Microsoft® Internet Explorer 8 (Windows XP and Vista)
  •
Firefox 3.0 and 3.5
  •
Safari 4.0 (Mac OS X)
Encryption Workflow
When using email encryption, the Cisco IronPort Email Security appliance encrypts a message and 
stores the message key on a local key server or a hosted key service. When the recipient opens an 
encrypted message, the recipient is authenticated by the key service, and the decrypted message is 
displayed. 
Figure 12-1
Encryption Workflow
The basic workflow for opening encrypted messages is:
Step 1
When you configure an encryption profile, you specify the parameters for message encryption. For an 
encrypted message, the Email Security appliance creates and stores a message key on a local key server 
or on the hosted key service (Cisco Registered Envelope Service). 
Step 2
The recipient opens the secure envelope in a browser.
Step 3
When a recipient opens an encrypted message in a browser, a password may be required to authenticate 
the recipient’s identity. The key server returns the encryption key associated with the message. 
1) Email Security appliance encrypts and 
stores message key in key server
Key Server or Hosted Key Service
Password
Key
2) User opens secure 
envelope in browser
4) Decrypted message is 
displayed.
3) User authenticates 
and gets message key.