Руководство Пользователя для Cisco Cisco Email Security Appliance C170
Glossary
GL-4
User Guide for AsyncOS 10.0 for Cisco Email Security Appliances
I
IDE File
Virus Definition File. An IDE file contains signatures or definitions used by
anti-virus software to detect viruses.
anti-virus software to detect viruses.
L
LDAP
Lightweight Directory Access Protocol. A protocol used to access information
about people (including email addresses), organizations, and other resources in
an Internet directory or intranet directory.
about people (including email addresses), organizations, and other resources in
an Internet directory or intranet directory.
Listener
A listener describes an email processing service that will be configured on a
particular IP interface. Listeners only apply to email entering the Cisco
appliance — either from the internal systems within your network or from the
Internet. IronPort AsyncOS uses listeners to specify criteria that messages must
meet in order to be accepted and relayed to recipient hosts. You can think of a
listener as an “email injector” or even a “SMTP daemon” running for each IP
address you specify.
particular IP interface. Listeners only apply to email entering the Cisco
appliance — either from the internal systems within your network or from the
Internet. IronPort AsyncOS uses listeners to specify criteria that messages must
meet in order to be accepted and relayed to recipient hosts. You can think of a
listener as an “email injector” or even a “SMTP daemon” running for each IP
address you specify.
IronPort AsyncOS differentiates between public listeners — which by default
have the characteristics for receiving email from the Internet — and private
listeners that are intended to accept email only from internal (groupware,
POP/IMAP, and other message generation) systems.
have the characteristics for receiving email from the Internet — and private
listeners that are intended to accept email only from internal (groupware,
POP/IMAP, and other message generation) systems.
Log Subscription
Creation of log files that monitor the performance of the Cisco appliance. The
log files are stored in local disk(s) and can also be transferred and stored in a
remote system. Typical attributes of a log subscription include: name,
component to monitor (email operations, server), format, and transfer method.
log files are stored in local disk(s) and can also be transferred and stored in a
remote system. Typical attributes of a log subscription include: name,
component to monitor (email operations, server), format, and transfer method.
M
Mail Flow Policies
A mail flow policy is a way of expressing a group of Host Access Table (HAT)
parameters (an access rule, followed by rate limiting parameters and custom
SMTP codes and responses) for a listener. Together, sender groups and mail
flow policies are defined in a listener’s HAT. Your Cisco appliance ships with
the predefined mail flow policies and sender groups for listeners.
parameters (an access rule, followed by rate limiting parameters and custom
SMTP codes and responses) for a listener. Together, sender groups and mail
flow policies are defined in a listener’s HAT. Your Cisco appliance ships with
the predefined mail flow policies and sender groups for listeners.
MAIL FROM
See Envelope Sender.
Maximum Number
of Retries
of Retries
The maximum number of times that redelivery of a soft bounced message will
be attempted before being hard bounced.
be attempted before being hard bounced.
Maximum Time in
Queue
Queue
The maximum length of time that a soft bounced message will stay in the email
queue for delivery before being hard bounced.
queue for delivery before being hard bounced.