Cisco Cisco Email Security Appliance C170 Guia Do Utilizador

Página de 630
6-193
Cisco IronPort AsyncOS 7.1 for Email Configuration Guide
OL-22158-02
Chapter 6      Email Security Manager
Examples of Policy Matching
The following examples help show how the policy tables are matched in a 
top-down fashion.
Given the following Incoming Mail Email Security Policy table shown in 
, incoming messages will match different policies. 
Example 1
A message from sender 
bill@lawfirm.com
 sent to recipient 
jim@example.com
 
will match policy #2, because the user description that matches the sender 
(
@lawfirm.com
) appears sooner in the table than the user description that matches 
the recipient (
jim@
). 
Example 2
Sender 
joe@yahoo.com
 sends an incoming message with three recipients: 
john@example.com
jane@newdomain.com
, and 
bill@example.com
. The message 
for recipient 
jane@newdomain.com
 will receive the anti-spam, anti-virus, virus 
outbreak filters, and content filters defined in policy #3, while the message for 
recipient 
john@example.com
 will receive the settings defined in policy #5. 
Because the recipient 
bill@example.com
 does not match the engineering LDAP 
Table 6-1
Policy Matching Example 
Order
Policy Name
Users
1
special_people
Recipient: 
joe@example.com
Recipient: 
ann@example.com
2
from_lawyers
Sender: 
@lawfirm.com
3
acquired_domains
Recipient: 
@newdomain.com
Recipient: 
@anotherexample.com
4
engineering
Recipient: 
PublicLDAP.ldapgroup: engineers
5
sales_team
Recipient: 
jim@
Recipient: 
john@
Recipient: 
larry@
Default Policy
(all users)