27.11.2012 Views

IronPort - advanced configuration guide

IronPort - advanced configuration guide

IronPort - advanced configuration guide

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 5 Email Authentication<br />

Testing Your SPF Records<br />

OL-25137-01<br />

SIDF does not verify the HELO identity, so in this case, you do not need to publish SPF v2.0 records for<br />

each sending MTA.<br />

Note If you choose not to support SIDF, publish an “spf2.0/pra ~all” record.<br />

In addition to reviewing the RFCs, it is a good idea to test your SPF records before you implement SPF<br />

verification on a Cisco <strong>IronPort</strong> appliance. There are several testing tools available on the openspf.org<br />

website:<br />

http://www.openspf.org/Tools<br />

You can use the following tool to determine why an email failed an SPF record check:<br />

http://www.openspf.org/Why<br />

In addition, you can enable SPF on a test listener and use Cisco’s trace CLI command (or perform trace<br />

from the GUI) to view the SPF results. Using trace, you can easily test different sending IPs.<br />

Working with SPF on a Cisco <strong>IronPort</strong> Email Security Appliance<br />

To use SPF/SIDF on a Cisco <strong>IronPort</strong> appliance, complete the following steps:<br />

Step 1 Enable SPF/SIDF. You enable SPF/SIDF on an incoming listener from the default mail flow policy, or<br />

you can enable it for different incoming mail flow policies. For more information, see Enabling SPF and<br />

SIDF, page 5-24.<br />

Step 2 Configure actions to take on SPF/SIDF-verified mail. You can use message or content filters to<br />

determine actions to take for SPF-verified mail. For more information, see Determining the Action to<br />

Take for SPF/SIDF Verified Mail, page 5-31.<br />

Step 3 Test the SPF/SIDF results. Because organizations use different email authorization methods, and each<br />

organization may use SPF/SIDF differently (for example, the SPF or SIDF policy may conform to<br />

different standards), you need to test the SPF/SIDF results to ensure that you do not bounce or drop<br />

emails from authorized senders. You can test the SPF/SIDF results by using a combination of content<br />

filters, message filters, and the Content Filters report. For more information about testing the SPF/SIDF<br />

results, see Testing the SPF/SIDF Results, page 5-34.<br />

Warning Although Cisco strongly endorses email authentication globally, at this point in the industry's<br />

adoption, Cisco suggests a cautious disposition for SPF/SIDF authentication failures. Until more<br />

organizations gain greater control of their authorized mail sending infrastructure, Cisco urges<br />

customers to avoid bouncing emails and instead quarantine emails that fail SPF/SIDF verification.<br />

The AysncOS command line interface (CLI) provides more control settings for SPF level than the web<br />

interface. Based on the SPF verdict, the appliance can accept or reject a message, in SMTP conversation,<br />

on a per listener basis. You can modify the SPF settings when editing the default settings for a listener’s<br />

Host Access Table using the listenerconfig command. See the Enabling SPF and SIDF via the CLI,<br />

page 5-25 for more information on the settings.<br />

Cisco <strong>IronPort</strong> AsyncOS 7.6 for Email Advanced Configuration Guide<br />

5-23

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!