Руководство Пользователя для Cisco Cisco Email Security Appliance C190

Скачать
Страница из 630
Chapter 4      Understanding the Email Pipeline
4-92
Cisco IronPort AsyncOS 7.1 for Email Configuration Guide
OL-22158-02
Shaded areas in 
 represent processing that occurs in the Work Queue (see 
). You can test most of the configurations of 
features in this pipeline using the 
trace
 command. For more information, 
see
Debugging Mail Flow Using Test Messages: Trace, page -446
.
Note
For outgoing mail, RSA Email Data Loss Prevention scanning takes place after 
the Virus Outbreak Filters stage.
Table 4-1
Email Pipeline for the IronPort Appliance: Receiving Email Features
Feature
Description
Host Access Table (HAT)
Host DNS Sender Verification
Sender Groups
Envelope Sender Verification
Sender Verification Exception Table
Mail Flow Policies
ACCEPT, REJECT, RELAY, or TCPREFUSE connections
Maximum outbound connections
Maximum concurrent inbound connections per IP address
Maximum message size and messages per connection
Maximum recipients per message and per hour
TCP listen queue size
TLS: no/preferred/required
SMTP AUTH: no/preferred/required
Drop email with malformed FROM headers
Always accept or reject mail from entries in the Sender 
Verification Exception Table.
SenderBase on/off (IP profiling/flow control) 
Received Header
Adds a received header to accepted email: on/off.
Default Domain
Adds default domain for “bare” user addresses.
Bounce Verification
Used to verify incoming bounce messages as legitimate.
Domain Map
Rewrites the Envelope Recipient for each recipient in a message 
that matches a domain in the domain map table. 
Recipient Access Table (RAT) 
(Public listeners only) ACCEPT or REJECT recipients in RCPT 
TO 
plus Custom SMTP Response. Allow special recipients to 
bypass throttling.