27.11.2012 Views

IronPort - advanced configuration guide

IronPort - advanced configuration guide

IronPort - advanced configuration guide

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 6 Using Message Filters to Enforce Email Policies<br />

SPF-Status Rule<br />

OL-25137-01<br />

When you receive SPF/SIDF verified mail, you may want to take different actions depending on the<br />

results of the SPF/SIDF verification. The spf-status rule checks against different SPF verification results.<br />

For more information, see Verification Results, page 5-31.<br />

You can check against the SPF/SIDF verification results using the following syntax:<br />

if (spf-status == "Pass")<br />

If you want a single condition to check against multiple status verdicts, you can use the following syntax:<br />

if (spf-status == "PermError, TempError")<br />

You can also check the verification results against the HELO, MAIL FROM, and PRA identities using<br />

the following syntax:<br />

if (spf-status("pra") == "Fail")<br />

The following example shows the spf-status filter in use:<br />

skip-spam-check-for-verified-senders:<br />

if (sendergroup == "TRUSTED" and spf-status == "Pass"){<br />

}<br />

skip-spamcheck();<br />

quarantine-spf-failed-mail:<br />

if (spf-status("pra") == "Fail") {<br />

if (spf-status("mailfrom") == "Fail"){<br />

} else {<br />

}<br />

# completely malicious mail<br />

quarantine("Policy");<br />

if(spf-status("mailfrom") == "SoftFail") {<br />

}<br />

# malicious mail, but tempting<br />

quarantine("Policy");<br />

Cisco <strong>IronPort</strong> AsyncOS 7.6 for Email Advanced Configuration Guide<br />

6-35

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!