27.11.2012 Views

IronPort - Configuration Guide - AsyncOS 7.6.1

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

1-8<br />

Cisco <strong>IronPort</strong> <strong>AsyncOS</strong> 7.6 for Email <strong>Configuration</strong> <strong>Guide</strong><br />

Chapter 1 Getting Started with the Cisco <strong>IronPort</strong> Email Security Appliance<br />

Chapter 4, “Email Authentication” details the process of configuring and enabling email authentication<br />

on an Cisco <strong>IronPort</strong> appliance. Cisco <strong>IronPort</strong> <strong>AsyncOS</strong> supports several types of email authentication,<br />

including Sender Policy Framework (SPF), Sender ID Framework (SIDF), and DomainKeys Identified<br />

Mail (DKIM) verification of incoming mail, as well as DomainKeys and DKIM signing of outgoing<br />

mail.<br />

Chapter 5, “Using Message Filters to Enforce Email Policies” describes how to use Message Filters to<br />

define rules for handling email, including the ability to modify the content of messages through the<br />

attachment filtering, image analysis, and content dictionary features.<br />

Chapter 7, “Advanced Network <strong>Configuration</strong>” includes information about NIC pairing, virtual LANs<br />

and more.<br />

Chapter 8, “Centralized Management” describes the centralized management feature, which allows you<br />

to manage and configure multiple appliances. The centralized management feature provides increased<br />

reliability, flexibility, and scalability within your network, allowing you to manage globally while<br />

complying with local policies.<br />

Appendix A, “<strong>AsyncOS</strong> Quick Reference <strong>Guide</strong>” provides a quick reference for most commands in the<br />

CLI.<br />

Appendix B, “Accessing the Appliance” describes how to access the Cisco <strong>IronPort</strong> appliance to send<br />

and retrieve files from Cisco <strong>IronPort</strong> appliance.<br />

The following topics are discussed in the Cisco <strong>IronPort</strong> <strong>AsyncOS</strong> for Email<br />

Daily Management <strong>Guide</strong><br />

Chapter 1, “Managing the Cisco <strong>IronPort</strong> Email Appliance,” provides an introduction to the Cisco<br />

<strong>IronPort</strong> appliance and defines its key features and role in the enterprise network.<br />

Chapter 2, “Using Email Security Monitor,” describes the Mail Flow Monitor feature: a powerful,<br />

web-based console that provides complete visibility into all inbound email traffic for your enterprise.<br />

Chapter 3, “Tracking Email Messages,” describes local message tracking. You can use message tracking<br />

to determine if a particular message was delivered, found to contain a virus, or placed in a spam<br />

quarantine.<br />

Chapter 4, “Quarantines,” describes the special queues or repositories used to hold and process<br />

messages. Messages in quarantines can be delivered or deleted, based on how you configured the<br />

quarantine. This includes the Cisco <strong>IronPort</strong> Spam quarantine.<br />

Chapter 5, “Logging,” describes the logging and log subscription functionality of the Cisco <strong>IronPort</strong><br />

appliance.<br />

Chapter 6, “Managing and Monitoring via the CLI,” describes the commands available in the CLI<br />

available to you as you monitor the mail flow through the gateway.<br />

Chapter 7, “Other Tasks in the GUI,” describes typical administration tasks for managing and monitoring<br />

the Cisco <strong>IronPort</strong> appliance through the GUI.<br />

Chapter 8, “Common Administrative Tasks,” describes typical administration commands for managing<br />

and monitoring the Cisco <strong>IronPort</strong> appliance, such adding users, managing the configuration file, and<br />

managing SSH keys. This chapter also describes how to request technical support, allow Cisco <strong>IronPort</strong><br />

customer support remote access to your appliance, and use feature keys.<br />

Chapter 9, “Testing and Troubleshooting” describes the process of creating so-called black hole listeners<br />

for testing the system performance and troubleshooting configuration problems.<br />

OL-26342-01

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!