Cisco Cisco Email Security Appliance C170 Guia Do Utilizador

Página de 1197
 
7-30
User Guide for AsyncOS 9.7 for Cisco Email Security Appliances
 
Chapter 7      Defining Which Hosts Are Allowed to Connect Using the Host Access Table (HAT)
  Verifying Senders
Figure 7-5
HAT Overview Page
Step 3
Click Edit Settings. 
Figure 7-6
Sender Group: SUSPECTLIST: Edit Settings
Step 4
Select the THROTTLED policy from the list.
Step 5
Check the “Connecting host reverse DNS lookup (PTR) does not match the forward DNS lookup (A)” 
checkbox under Connecting Host DNS Verification.
Step 6
Submit and commit your changes.
Now, senders for which reverse DNS lookups fail will match the SUSPECTLIST sender group and will 
receive the default action from the THROTTLED mail flow policy.
Implementing More Stringent Throttling Settings for Unverified Senders
Procedure 
Step 1
Create a new mail flow policy (for this example, it is named THROTTLEMORE) and configure it with 
more stringent throttling settings.
a.
On the Mail Flow Policies page, click Add Policy
b.
Enter a name for the mail flow policy, and select Accept as the Connection Behavior.