Cisco Cisco Email Security Appliance C160 用户指南
21-29
User Guide for AsyncOS 9.8 for Cisco Email Security Appliances
Chapter 21 Email Authentication
Determining the Action to Take for SPF/SIDF Verified Mail
Verification Results
If you use the
spf-status
filter rule, you can check against the SPF/SIDF verification results using the
following syntax:
If you want a single condition to check against multiple status verdicts, you can use the following syntax:
You can also check the verification results against the HELO, MAIL FROM, and PRA identities using
the following syntax:
the following syntax:
Note
You can only use the
spf-status
message filter rule to check results against HELO, MAIL FROM, and
PRA identities. You cannot use the
spf-status
content filter rule to check against identities. The
spf-status
content filter checks only the PRA identity.
You can receive any of the following verification results:
•
None - no verification can be performed due to the lack of information.
•
Pass - the client is authorized to send mail with the given identity.
•
Neutral - the domain owner does not assert whether the client is authorized to use the given identity.
•
SoftFail - the domain owner believes the host is not authorized to use the given identity but is not
willing to make a definitive statement.
willing to make a definitive statement.
•
Fail - the client is not authorized to send mail with the given identity.
•
TempError - a transient error occurred during verification.
•
PermError - a permanent error occurred during verification.
Using the spf-status Filter Rule in the CLI
The following example shows the
spf-status
message filter in use:
if (spf-status == "Pass")
if (spf-status == "PermError, TempError")
if (spf-status("pra") == "Fail")
skip-spam-check-for-verified-senders:
if (sendergroup == "TRUSTED" and spf-status == "Pass"){
skip-spamcheck();
}
quarantine-spf-failed-mail: