Cisco Cisco Email Security Appliance C170 Guia Do Utilizador

Página de 1197
 
7-10
User Guide for AsyncOS 9.7 for Cisco Email Security Appliances
 
Chapter 7      Defining Which Hosts Are Allowed to Connect Using the Host Access Table (HAT)
  Defining Access Rules for Email Senders Using Mail Flow Policies
Figure 7-2
Using HAT Variables
Or like this, in the CLI: 
Testing HAT Variables
To test these variables, add the IP address of a known, trusted machine to the $WHITELIST sender group 
of a listener on the appliance. Then, connect from that machine via telnet. You can see the variable 
substitution in the SMTP response. For example: 
Would you like to specify a custom SMTP response?  [Y]> y
Enter the SMTP code to use in the response. 220 is the standard code.
[220]> 200
Enter your custom SMTP response.  Press Enter on a blank line to finish.
You've connected from the hostname: $Hostname, IP address of: $RemoteIP, matched the 
group: $Group, $HATEntry and the SenderBase Organization: $OrgID.
telnet IP_address_of_Email_Security_Appliance port
220 hostname ESMTP
200 You've connected from the hostname: hostname, IP address of: 
IP-address_of_connecting_machine
, matched the group: WHITELIST, 10.1.1.1 the SenderBase 
Organization: OrgID.