27.11.2012 Views

IronPort - Configuration Guide - AsyncOS 7.6.1

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Incoming / Receiving<br />

4-4<br />

* These features can send messages to special queues called Quarantines.<br />

** Can send messages to the Cisco <strong>IronPort</strong> Spam Quarantine.<br />

Cisco <strong>IronPort</strong> <strong>AsyncOS</strong> 7.6 for Email <strong>Configuration</strong> <strong>Guide</strong><br />

Chapter 4 Understanding the Email Pipeline<br />

Table 4-2 Email Pipeline for the Cisco <strong>IronPort</strong> Appliance: Routing and Delivery Features<br />

Delivery limits 1. Sets the default delivery interface.<br />

2. Sets the total maximum number of<br />

outbound connections.<br />

Domain-based Limits Defines, per-domain: maximum outbound<br />

connections for each virtual gateway and for<br />

the entire system; the bounce profile to use;<br />

the TLS preference for delivery:<br />

no/preferred/required<br />

Domain-based routing Routes mail based on domain without<br />

rewriting Envelope Recipient.<br />

Global unsubscribe Drops recipients according to specific list<br />

(configured system-wide).<br />

Bounce profiles Undeliverable message handling.<br />

Configurable per listener, per Destination<br />

Controls entry, and via message filters.<br />

The receiving phase of the Email Pipeline involves the initial connection from the sender’s host. Each<br />

message’s domains can be set, the recipient is checked, and the message is handed off to the work queue.<br />

Host Access Table (HAT), Sender Groups, and Mail Flow Policies<br />

The HAT allows you to specify hosts that are allowed to connect to a listener (that is, which hosts you<br />

will allow to send email).<br />

Sender Groups are used to associate one or more senders into groups, upon which you can apply message<br />

filters, and other Mail Flow Policies. Mail Flow Policies are a way of expressing a group of HAT<br />

parameters (access rule, followed by rate limit parameters and custom SMTP codes and responses).<br />

Together, sender groups and mail flow policies are defined in a listener’s HAT.<br />

Host DNS verification settings for sender groups allow you to classify unverified senders prior to the<br />

SMTP conversation and include different types of unverified senders in your various sender groups.<br />

While the connecting host was subject to Host DNS verification in sender groups — prior to the SMTP<br />

conversation — the domain portion of the envelope sender is DNS verified in mail flow policies, and the<br />

verification takes place during the SMTP conversation. Messages with malformed envelope senders can<br />

be ignored. You can add entries to the Sender Verification Exception Table — a list of domains and email<br />

addresses from which to accept or reject mail despite envelope sender DNS verification settings.<br />

Reputation Filtering allows you to classify email senders and restrict access to your email infrastructure<br />

based on sender’s trustworthiness as determined by the Cisco <strong>IronPort</strong> SenderBase Reputation Service.<br />

For more information, see The Host Access Table (HAT): Sender Groups and Mail Flow Policies,<br />

page 5-7.<br />

OL-25136-01

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!