Cisco Cisco Email Security Appliance C170 技术参考

下载
页码 312
B A T C H   C O M M A N D   E X A M P L E
C H A P T E R   2 :   C O M M A N D   L I N E   I N T E R F A C E :   T H E   B A S I C S
 17
- NEW - Create a new listener.
- EDIT - Modify a listener.
- DELETE - Remove a listener.
- SETUP - Change global settings.
[]> edit
Enter the name or number of the listener you wish to edit.
[]> IncomingMail
Choose the operation you want to perform:
- NAME - Change the name of the listener.
- INTERFACE - Change the interface.
- LIMITS - Change the injection limits.
- SETUP - Configure general options.
- HOSTACCESS - Modify the Host Access Table.
- RCPTACCESS - Modify the Recipient Access Table.
- BOUNCECONFIG - Choose the bounce profile to use for messages 
injected on this listener.
- MASQUERADE - Configure the Domain Masquerading Table.
- DOMAINMAP - Configure domain mappings.
[]> HOSTACCESS
There are currently 4 policies defined.
There are currently 5 sender groups.
Choose the operation you want to perform:
- NEW - Create a new entry.
- EDIT - Modify an entry.
- DELETE - Remove an entry.
- MOVE - Move an entry.
- DEFAULT - Set the defaults.
- PRINT - Display the table.
- IMPORT - Import a table from a file.
- EXPORT - Export the table to a file.
- CLEAR - Remove all entries.
[]> NEW
1. New Sender Group
2. New Policy
[1]> 1
Enter a name for this sender group. (optional)
[]> REDLIST
Enter the hosts to add. CIDR addresses such as 10.1.1.0/24 are 
allowed. 
IP address ranges such as 10.1.1.10-20 are allowed. IP subnets such as 
10.2.3. are allowed. 
Table 2-1 Example 
listenerconfig
 command Using the CLI  (Continued)