Cisco Cisco Email Security Appliance C170 Guia Do Utilizador

Página de 1212
 
26-72
User Guide for AsyncOS 10.0 for Cisco Email Security Appliances
 
Chapter 26      Configuring Routing and Delivery Features
  Review: Email Pipeline
Review: Email Pipeline
 and 
 provide an overview of how email is routed through the system, from 
reception to routing to deliver. Each feature is processed in order (from top to bottom) and is briefly 
summarized. Shaded areas in 
 represent processing that occurs in the Work Queue. 
You can test most of the configurations of features in this pipeline using the 
trace
 command. For more 
information, see “Debugging Mail Flow Using Test Messages: Trace” in the Troubleshooting chapter.
Note
For outgoing mail, RSA Email Data Loss Prevention scanning takes place after the Outbreak Filters 
stage.
Table 26-11
Email Pipeline for the Email Security Appliance: Receiving Email Features
Feature
Description
Host Access Table (HAT)
Host DNS Sender Verification
Sender Groups
Envelope Sender Verification
Sender Verification Exception Table
Mail Flow Policies
ACCEPT, REJECT, RELAY, or TCPREFUSE connections
Maximum outbound connections
Maximum concurrent inbound connections per IP address
Maximum message size and messages per connection
Maximum recipients per message and per hour
TCP listen queue size
TLS: no/preferred/required
SMTP AUTH: no/preferred/required
Drop email with malformed FROM headers
Always accept or reject mail from entries in the Sender Verification Exception Table.
SenderBase on/off (IP profiling/flow control) 
Received Header
Adds a received header to accepted email: on/off.
Default Domain
Adds default domain for “bare” user addresses.
Bounce Verification
Used to verify incoming bounce messages as legitimate.
Domain Map
Rewrites the Envelope Recipient for each recipient in a message that matches a domain 
in the domain map table. 
Recipient Access Table (RAT) 
(Public listeners only) ACCEPT or REJECT recipients in 
RCPT TO 
plus Custom SMTP 
Response. Allow special recipients to bypass throttling. 
Alias tables
Rewrites the Envelope Recipient. (Configured system-wide. 
aliasconfig
 is not a 
subcommand of 
listenerconfig
.)
LDAP Recipient Acceptance
LDAP validation for recipient acceptance occurs within the SMTP conversation. If the 
recipient is not found in the LDAP directory, the message is dropped or bounced. LDAP 
validation can be configured to occur within the work queue instead.