Cisco Cisco Email Security Appliance C170 Guia Do Utilizador

Página de 1197
 
7-33
User Guide for AsyncOS 9.7 for Cisco Email Security Appliances
 
Chapter 7      Defining Which Hosts Are Allowed to Connect Using the Host Access Table (HAT)
  Verifying Senders
Step 5
Submit and commit your changes.
Searching for Addresses within the Sender Verification Exception Table
Procedure 
Step 1
Enter the email address in the Find Domain Exception section of the Exception Table page.
Step 2
Click Find.
Figure 7-10
Searching for Matching Entries in the Exception Table
If the address matches any of the entries in the table, the first matching entry is displayed:
Figure 7-11
Listing Matching Entries in the Exception Table
Testing Your Settings for Messages from Unverified Senders
Now that you have configured sender verification settings, you can verify the behavior of your appliance.
Note that testing DNS-related settings is beyond the scope of this document.
Related Topics