Руководство Пользователя для Cisco Cisco Email Security Appliance C170

Скачать
Страница из 400
 
6-35
Cisco IronPort AsyncOS 7.6 for Email Advanced Configuration Guide
OL-25137-01
Chapter 6      Using Message Filters to Enforce Email Policies
SPF-Status Rule
When you receive SPF/SIDF verified mail, you may want to take different actions depending on the 
results of the SPF/SIDF verification. The spf-status rule checks against different SPF verification results. 
For more information, see 
You can check against the SPF/SIDF verification results using the following syntax:
If you want a single condition to check against multiple status verdicts, you can use the following syntax:
You can also check the verification results against the HELO, MAIL FROM, and PRA identities using 
the following syntax:
The following example shows the 
spf-status
 filter in use:
if (spf-status == "Pass")
if (spf-status == "PermError, TempError")
if (spf-status("pra") == "Fail")
skip-spam-check-for-verified-senders:
     if (sendergroup == "TRUSTED" and spf-status == "Pass"){
         skip-spamcheck();
     }
quarantine-spf-failed-mail:
     if (spf-status("pra") == "Fail") {
         if (spf-status("mailfrom") == "Fail"){
             # completely malicious mail
             quarantine("Policy");
         } else {
           if(spf-status("mailfrom") == "SoftFail") {
             # malicious mail, but tempting
             quarantine("Policy");
           }
         }