27.11.2012 Views

IronPort - Configuration Guide - AsyncOS 7.6.1

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Network Planning<br />

17-2<br />

Cisco <strong>IronPort</strong> <strong>AsyncOS</strong> 7.6 for Email <strong>Configuration</strong> <strong>Guide</strong><br />

Chapter 17 The Cisco <strong>IronPort</strong> M-Series Security Management Appliance<br />

The Cisco <strong>IronPort</strong> M-Series appliance lets you separate the end user interfaces (mail applications, etc.)<br />

from the more secure gateway systems residing in your various DMZs. Using a two-layer firewall can<br />

provide you with flexibility in network planning so that end users will not connect directly to the outer<br />

DMZ (see Figure 17-1).<br />

Figure 17-1 Typical Network <strong>Configuration</strong> Incorporating the Cisco <strong>IronPort</strong> M-Series Appliance<br />

Outer DMZ Inner DMZ<br />

Corporate<br />

Network<br />

C-Series Appliance<br />

C-Series Appliance<br />

C-Series Appliance Groupware<br />

Internal Users<br />

Large corporate data centers can share one Cisco <strong>IronPort</strong> M-Series appliance acting as an external Cisco<br />

<strong>IronPort</strong> Spam quarantine for one or more Cisco <strong>IronPort</strong> C- or X-Series appliances. Further, remote<br />

offices can be set up to maintain their own local Cisco <strong>IronPort</strong> appliance quarantines for local use (using<br />

the local Cisco <strong>IronPort</strong> Spam quarantine on C- or X-Series appliances).<br />

Figure 17-1 shows a typical network configuration incorporating the Cisco <strong>IronPort</strong> M-Series appliance<br />

and multiple DMZs. Incoming mail from the Internet is received by the Cisco <strong>IronPort</strong> appliances in the<br />

outer DMZ. Clean mail is sent along to the MTA (groupware) in the inner DMZ and eventually to the<br />

end users within the corporate network.<br />

Spam and suspected spam (depending on your mail flow policy settings) is sent to the Cisco <strong>IronPort</strong><br />

M-Series appliance’s Spam quarantine. End users may then access the quarantine and elect to delete<br />

spam and release messages they would like to have delivered to themselves. Messages remaining in the<br />

Cisco <strong>IronPort</strong> Spam quarantine are automatically deleted after a configurable amount of time (see the<br />

“Quarantines” chapter in the Cisco <strong>IronPort</strong> <strong>AsyncOS</strong> for Email Daily Management <strong>Guide</strong>).<br />

Mail Flow and the Cisco <strong>IronPort</strong> M-Series Appliance<br />

M-Series Appliance<br />

Mail is sent to the Cisco <strong>IronPort</strong> M-Series appliance from other Cisco <strong>IronPort</strong> (C- and X-Series)<br />

appliances. A Cisco <strong>IronPort</strong> appliance that is configured to send mail to a Cisco <strong>IronPort</strong> M-Series<br />

appliance will automatically expect to receive mail released from the M-Series appliance and will not<br />

re-process those messages when they are received back — messages will bypass the HAT and other<br />

policy or scanning settings and be delivered. For this to work, the IP address of the Cisco <strong>IronPort</strong><br />

M-Series appliance must not change. If the IP address of the Cisco <strong>IronPort</strong> M-Series appliance changes,<br />

the receiving C- or X-Series appliance will process the message as it would any other incoming message.<br />

You should always use the same IP address for receiving and delivery on the Cisco <strong>IronPort</strong> M-Series<br />

appliance.<br />

OL-25136-01

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!