27.11.2012 Views

IronPort - Configuration Guide - AsyncOS 7.6.1

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Incoming Relays and Directory Harvest Attack Prevention<br />

IP Addresses<br />

9-22<br />

Cisco <strong>IronPort</strong> <strong>AsyncOS</strong> 7.6 for Email <strong>Configuration</strong> <strong>Guide</strong><br />

Chapter 9 Anti-Spam<br />

If a remote host attempts a directory harvest attack by sending messages to the MX or MTA serving as<br />

an incoming realy on your network, the appliance drops the connection from the incoming relay if the<br />

relay is assigned to a sender group with a mail flow policy with Directory Harvest Attack Prevention<br />

(DHAP) enabled. This prevents all messages from the relay, including legitimate messages, from<br />

reaching the Email Security applianc. The appliance does not have the opportunity to recognize the<br />

remote host as the attacker and the MX or MTA that’s acting as the incoming relay continues to receive<br />

mail from the attacking host. To work around this issue and continue receiving messages from the<br />

incoming relay, add the relay to a sender group with a mail flow policy that has unlimited messages for<br />

DHAP.<br />

As a general rule, when specifying an IP address (of the machine connecting to the Cisco <strong>IronPort</strong><br />

appliance — the incoming relay), be as specific as possible. That said, IP addresses can also be entered<br />

using standard CIDR format or an IP address range. For example, if you have several MTAs at the edge<br />

of your network receiving email, you might want to enter a range of IP addresses to include all of your<br />

MTAs, such as 10.2.3.1/8 or 10.2.3.1-10. You can use IPv4 or IPv6 addresses for the MTAs.<br />

For IPv6 addresses, <strong>AsyncOS</strong> supports the following formats:<br />

2620:101:2004:4202::0-2620:101:2004:4202::ff<br />

2620:101:2004:4202::<br />

2620:101:2004:4202::23<br />

2620:101:2004:4202::/64<br />

Message Headers and Incoming Relays<br />

Custom Header<br />

Use this method to specify a custom header. This is the recommended method. The machine connecting<br />

to the original sender needs to add this custom header. The value of the header is expected to be the IP<br />

address of the external sending machine. For example:<br />

SenderIP: 7.8.9.1<br />

X-CustomHeader: 7.8.9.1<br />

When entering a header, you do not need to enter the trailing colon.<br />

If your local MX/MTA can receive mail from a variable number of hops, inserting a custom header is<br />

the only way to enable the Incoming Relays feature. For example, in Figure 9-14 both path C and D lead<br />

to IP address 10.2.3.5; however, path C has two hops and path D has one. Because the number of hops<br />

can vary in this situation, you must use a custom header in order to have Incoming Relays configured<br />

correctly.<br />

OL-25136-01

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!