Cisco Cisco Email Security Appliance C170 Guia Do Utilizador

Página de 1211
 
7-35
AsyncOS 9.1.2 for Cisco Email Security Appliances User Guide
 
Chapter 7      Defining Which Hosts Are Allowed to Connect Using the Host Access Table (HAT)
  Verifying Senders
Step 7
Submit and commit your changes.
Excluding Unverified Senders from Sender Verification Rules Based on Sender’s Email Address
Procedure 
Step 1
Select Mail Policies > Exception Table.
Note
The exception table applies globally to all mail flow policies with “Use Exception Table” 
enabled.
Step 2
Click Add Domain Exception on the Mail Policies > Exception Table page. 
Step 3
Enter an email address. You can enter a specific address (pres@whitehouse.gov), a name (user@), a 
domain (@example.com or @.example.com), or an address with a bracketed IP address 
(user@[192.168.23.1]).
Step 4
Specify whether to allow or reject messages from the address. When rejecting mail, you can also specify 
an SMTP code and custom response.
Step 5
Submit and commit your changes.
Searching for Addresses within the Sender Verification Exception Table
Procedure 
Step 1
Enter the email address in the Find Domain Exception section of the Exception Table page.
Step 2
Click Find.
Figure 7-10
Searching for Matching Entries in the Exception Table
If the address matches any of the entries in the table, the first matching entry is displayed: