Email Security with Cisco IronPort, Rough Cuts
- By Chris Porter
- Published Feb 10, 2012 by Cisco Press.
Rough Cuts
- Available to Safari Subscribers
- About Rough Cuts
Rough Cuts are manuscripts that are developed but not yet published, available through Safari. Rough Cuts provide you access to the very latest information on a given topic and offer you the opportunity to interact with the author to influence the final publication.
- Copyright 2012
- Dimensions: 7-3/8" x 9-1/8"
- Pages: 576
- Edition: 1st
- Rough Cuts
- ISBN-10: 0-13-273073-1
- ISBN-13: 978-0-13-273073-0
This is the Rough Cut version of the printed book.
Email Security with Cisco IronPort thoroughly illuminates the security and performance challenges associated with today’s messaging environments and shows you how to systematically anticipate and respond to them using Cisco’s IronPort Email Security Appliance (ESA). Going far beyond any IronPort user guide, leading Cisco expert Chris Porter shows you how to use IronPort to construct a robust, secure, high-performance email architecture that can resist future attacks.
Email Security with Cisco IronPortpresents specific, proven architecture recommendations for deploying IronPort ESAs in diverse environments to optimize reliability and automatically handle failure. The author offers specific recipes for solving a wide range of messaging security problems, and he demonstrates how to use both basic and advanced features-–including several hidden and undocumented commands.
The author addresses issues ranging from directory integration to performance monitoring and optimization, and he offers powerful insights into often-ignored email security issues, such as preventing “bounce blowback.” Throughout, he illustrates his solutions with detailed examples demonstrating how to control ESA configuration through each available interface.
Chris Porter,Technical Solutions Architect at Cisco, focuses on the technical aspects of Cisco IronPort customer engagements. He has more than 12 years of experience in applications, computing, and security in finance, government, Fortune® 1000, entertainment, and higher education markets.
·Understand how the Cisco IronPort ESA addresses the key challenges of email security
·Select the best network deployment model for your environment, and walk through successful installation and configuration
·Configure and optimize Cisco IronPort ESA’s powerful security, message, and content filtering
·Understand the email pipeline so you can take full advantage of it–and troubleshoot problems if they occur
·Efficiently control Cisco IronPort ESA through its Web User Interface (WUI) and command-line interface (CLI)
·Implement reporting, monitoring, logging, and file management
·Integrate Cisco IronPort ESA and your mail policies with LDAP directories such as Microsoft Active Directory
·Automate and simplify email security administration
·Deploy multiple Cisco IronPort ESAs and advanced network configurations
·Prepare for emerging shifts in enterprise email usage and new security challenges
This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.
Table of Contents
Introduction xxiii
Chapter 1 Introduction to Email Security 1
Overview of Cisco IronPort Email Security Appliance (ESA) 1
AsyncOS 3
Security Management Appliances (SMA) 3
History of AsyncOS Versions 4
Software Features 5
Email Security Landscape 6
Email Spam 6
Viruses and Malware 7
Protecting Intellectual Property and Preventing Data Loss 8
Other Email Security Threats 9
Simple Mail Transfer Protocol (SMTP) 9
SMTP Commands 14
ESMTP Service Extensions 15
SMTP Message Headers and Body 16
Envelope Sender and Recipients 17
Transmitting Binary Data 18
MIME Types 20
Character Sets 21
Domain Name Service (DNS) and DNS MX Records in IPv4 and IPv6 22
Message Transfer Agents (MTA) 23
Abuse of SMTP 24
Relaying Mail and Open Relays 24
Bounces, Bounce Storms, and Misdirected Bounces 25
Directory Harvest Attacks 26
Summary 27
Chapter 2 ESA Product Basics 29
Hardware Overview 29
2U Enterprise Models 30
1U Enterprise Models 31
Selecting a Model 31
Basic Setup via the WUI System Setup Wizard 31
Connecting to the ESA for the First Time 31
Running the System Setup Wizard 32
Reconnecting to the WUI 38
LDAP Wizard and Next Steps 39
Examining the Basic Configuration 41
Next Steps 41
Setup Summary 42
Networking Deployment Models 43
Interfaces, Routing, and Virtual Gateways 43