CVD EmailSecurityUsingCiscoESADesignGuide AUG14
CVD EmailSecurityUsingCiscoESADesignGuide AUG14
CVD EmailSecurityUsingCiscoESADesignGuide AUG14
Table of Contents
Preface.........................................................................................................................................1
CVD Navigator..............................................................................................................................2
Use Cases................................................................................................................................... 2
Scope.......................................................................................................................................... 2
Proficiency................................................................................................................................... 2
Introduction .................................................................................................................................3
Technology Use Case.................................................................................................................. 3
Use Case: Inbound Mail Filtering............................................................................................. 3
Design Overview ......................................................................................................................... 3
Filtering Spam......................................................................................................................... 5
Fighting Viruses and Malware.................................................................................................. 6
High Availability........................................................................................................................ 6
Monitoring .............................................................................................................................. 6
Troubleshooting ...................................................................................................................... 6
Deployment Details ......................................................................................................................7
Configuring Email DMZ............................................................................................................ 8
Configuring Cisco Email Security Appliance...........................................................................19
Enabling Mail Policies............................................................................................................ 27
Summary .............................................................................................................................. 30
Appendix A: Product List............................................................................................................31
Appendix B: Changes.................................................................................................................33
Table of Contents
Preface
Cisco Validated Designs (CVDs) present systems that are based on common use cases or engineering priorities.
CVDs incorporate a broad set of technologies, features, and applications that address customer needs. Cisco
engineers have comprehensively tested and documented each design in order to ensure faster, more reliable,
and fully predictable deployment.
CVDs include two guide types that provide tested design details:
Technology design guides provide deployment details, information about validated products and
software, and best practices for specific types of technology.
Solution design guides integrate existing CVDs but also include product features and functionality
across Cisco products and sometimes include information about third-party integration.
Both CVD types provide a tested starting point for Cisco partners or customers to begin designing and deploying
systems.
Preface
CVD Navigator
The CVD Navigator helps you determine the applicability of this guide by summarizing its key elements: the use cases, the
scope or breadth of the technology covered, the proficiency or experience recommended, and CVDs related to this guide.
This section is a quick reference only. For more details, see the Introduction.
Use Cases
This guide addresses the following technology use cases:
VALIDATED
DESIGN
Scope
This guide covers the following areas of technology and products:
Cisco Email Security Appliance
Internet edge firewalls and demilitarized zone (DMZ) switching
For more information, see the "Design Overview" section in this
guide.
Proficiency
This guide is for people with the following technical proficienciesor
equivalent experience:
CCNA Routing and Switching1 to 3 years installing,
configuring, and maintaining routed and switched networks
CCNA Security1 to 3 years installing, monitoring, and
troubleshooting network devices to maintain integrity,
confidentiality, and availability of data and devices
CVD Navigator
Introduction
Technology Use Case
Email is a critical business service in most organizations. Failing to protect that service can result in a loss of data
and employee productivity.
The two major threats to your organizations email system are:
A flood of unsolicited and unwanted email, called spam, that wastes employee time through sheer
volume and uses valuable resources like bandwidth and storage.
Malicious email, which comes in two basic forms: embedded attacks and targeted or directed attacks.
Embedded attacks include viruses and malware that perform actions on the end device when clicked.
Targeted or directed attacks, such as phishing attacks, try to mislead employees into releasing sensitive
information like credit card numbers, social security numbers, or intellectual property. Phishing attacks
might direct employees to inadvertently browse malicious websites that distribute additional malware to
computer endpoints.
Design Overview
An email solution becomes unusable if junk email is not filtered properly. The sheer volume of junk messages can
crowd out legitimate mail and cause employees to waste time manually filtering through messages. A side effect
of some junk email filtering solutions are false positives, or email that is incorrectly identified as spam, causing
legitimate messages to be discarded.
When this occurs, the organization must sift through the junk email looking for legitimate messages or lower
the level of filtering, allowing more potential junk messages to go to users and making the user responsible for
determining whether email is spam. Unsolicited email is also more likely to be malicious and include embedded
attacks. Criminal organizations are using attacks in email as an effective and cheap way to attack user machines.
An example of an attack contained within email is malware that attempts to infect the host machine or that offers
users counterfeit URLs (phishing) to trick them into going to a website where criminals can steal bank login
credentials or infect the host machine.
Cisco Email Security Appliance (ESA) protects the email infrastructure, and employees who use email at work, by
filtering unsolicited and malicious email before it reaches the user. Cisco ESA easily integrates into existing email
infrastructures with a high degree of flexibility. It does this by acting as a Mail Transfer Agent (MTA) within the
email-delivery chain. Another name for an MTA is a mail relay.
Introduction
A normal email exchange, in which an organization is using an MTA, might look like the message flow shown
below.
Figure 1 - Inbound email message flow
1 Sender sends email to
[email protected]
2 What is IP for CompanyX mail server
(MX and A record DNS lookup)?
3 IP address for CompanyX email is
a.b.c.d (Cisco ESA at CompanyX)
4 Email is sent
Internet DNS
Server
Cisco Email
Security Appliance
5 After inspection,
the email is sent to the
central email server
1071
Email
Server
6 Employee retrieves cleaned email
In addition to all of the email security capabilities provided by Cisco ESA for inbound email, Cisco ESA also
provides anti-virus protection for outbound email.
Figure 2 - Outbound email message flow
6 Recipient retrieves email
Cisco Email
Security Appliance
2 Central email server forwards
all non-local messages to
Cisco ESA smart host
Introduction
1078
Email
Server
Cisco ESA can be deployed with a single physical interface in order to filter email to and from an organizations
mail server. The second deployment option is a two-interface configuration, one interface for email transfers to
and from the Internet and the other for email transfers to and from the internal servers. This design guide uses
the single-interface model for simplicity.
Cisco ESA uses a variety of mechanisms to filter spam and fight malicious attacks. The goal of the solution is
to filter out positively identified spam, and quarantine or discard email sent from untrusted or potentially hostile
locations. Antivirus scanning is applied to emails and attachments from all servers to remove known malware.
Filtering Spam
There are two ways to filter spam and combat phishing attacks: reputation-based filtering and context-based
filtering.
Reputation-Based Filtering
This type of filtering relies on the likelihood that if a server is a known spam sender, it is more likely that email
coming from that server is spam compared to a host that does not have a reputation for distributing spam.
Similar filters can be applied to emails carrying viruses and other threats.
Reputation filters provide the first layer of defense by looking at the source IP address of the email server and
comparing it to the reputation data downloaded from Cisco SenderBase. Cisco SenderBase is the worlds largest
repository for security data, including sources of spam, botnets, and other malicious hosts. When hosts on the
Internet engage in malicious activity, SenderBase lowers the reputation of that host. The composite score for
reputation from Cisco SenderBase can range from -10 to +10. Devices that use reputation filtering, like Cisco
ESA, receive updates from SenderBase several times a day. When the appliance receives an email, it compares
the source IP to the SenderBase database and performs the following checks (as illustrated in Figure 3):
If the senders reputation is between -1 and +10, the email is accepted.
If the senders reputation is between -1 and -3, the email is accepted and additional emails from the
sender are throttled.
If the senders reputation is between -10 and -3, the email is blocked.
Context-Based Filtering
These anti-spam filters in the appliance inspect the entire mail message, including attachments, analyzing details
such as sender identity, message contents, embedded URLs, and email formatting. Using these algorithms, the
appliance can identify spam messages without blocking legitimate email.
Figure 3 - Email filtering overview
Known good is delivered
Anti-Spam
Engine
Incoming Mail
Good, Bad, and
Gray or Unknown Email
Introduction
Suspicious is
throttled and
spam filtered
Known bad is
deleted/tagged
1007
Email
Security
Appliance
High Availability
Cisco ESA functions as part of the mail transfer chain, and there is a reasonable amount of resiliency built into the
system because a mail server in the chain stores a message for some period of time if the destination server is
unresponsive.
This design configures Cisco ESA to use resilient Internet connections. You can achieve additional resiliency by
adding a second Cisco ESA. You should configure the second Cisco ESA the same as the first Cisco ESA, and
then add additional records to the Domain Name System (DNS).
For any additional devices, you need to add access lists and static Network Address Translation (NAT) rules to
the firewall appliance.
Monitoring
You can monitor the behavior of Cisco ESA by viewing a variety of reports available under the Monitor tab.
These reports allow an administrator to track activity and statistics for spam, virus types, incoming mail domains,
outbound destinations, system capacity, and system status.
Troubleshooting
If you need to determine why Cisco ESA applied specific actions for a given email, you can run the Trace tool
under System Administration.
By defining a search using details of a given email in question, it is possible to test a specific email to determine
how and why Cisco ESA handled the message. This search capability is especially useful if some of the more
advanced features of ESA are used, such as data loss prevention (DLP).
Reader Tip
For more information about Cisco ESA products, see the customer support page:
http://www.cisco.com/web/services/acquisitions/ironport.html
Introduction
Deployment Details
How to Read Commands
This guide uses the following conventions for
commands that you enter at the command-line
interface (CLI).
Cisco ESA deployment is designed to be as easy as possible. It is deployed into the existing mail delivery chain
as a Mail Transfer Agent (MTA). The appliance will be the destination of email for the organization; as such,
the public MX records (the DNS record that defines where to send mail) must eventually point to the public IP
address of Cisco ESA.
In this design guide, the appliance is physically deployed on the demilitarized zone (DMZ) of the Internet Edge,
and uses a single interface for simplicity. This interface handles all incoming and outgoing email and carries
management traffic. The port is the management interface, labeled M1 on the appliance.
Figure 4 - Deployment overview
Internet
Inside
Network
Deployment Details
Email
Server
1079
DMZ
Switches
It is important that Cisco ESA be accessible through the public Internet and that it is the first hop in the email
infrastructure. Several of the Cisco ESA processes use the sender IP address, which is one of the primary
identifiers Cisco SenderBase uses to determine the reputation of the sender. If another device receives mail
before forwarding it to the appliance, the appliance is not able to determine the sender IP address and filtering
cannot be applied properly.
The internal email server needs to configure Cisco ESA as a smart host or mail relay. The configuration of the
internal email server is not included in this guide.
PROCESS
Reader Tip
This procedure assumes that the Internet-edge firewall and DMZ switch have already
been configured following the guidance in the Firewall and IPS Design Guide and the
Campus Wired LAN Technology Design Guide
In this process, you configure a DMZ for Cisco ESA so it can serve as the organizations MTA for email sent and
received using the Internet.
Procedure 1
Step 1: Configure the mail DMZ VLAN and set the DMZ switch to be the spanning tree root for the VLAN that
contains the email security appliance.
vlan 1117
name dmz-email
Step 2: Add the mail DMZ VLAN to the trunks that connect to the Internet-edge firewall.
interface range GigabitEthernet1/0/24, GigabitEthernet2/0/24
switchport trunk allowed vlan add 1117
Deployment Details
Procedure 2
Deployment Details
interface GigabitEthernet1/0/22
description Cisco ESA M1 management interface
switchport access vlan 1117
switchport host
macro apply EgressQoS
logging event link-status
no shutdown
Procedure 3
The DMZ network is connected to the appliances on the appliances Gigabit Ethernet interface via a VLAN
trunk in order to allow the greatest flexibility if new VLANs must be added to connect additional DMZs. The
trunk connects the appliances to a 3750X access-switch stack in order to provide resiliency. The DMZ VLAN
interfaces on Cisco Adaptive Security Appliance (ASA) are each assigned an IP address that is the default
gateway for each of the VLAN subnets. The DMZ switch only offers Layer 2 switching capability; the DMZ
switchs VLAN interfaces do not have an IP address assigned, except for one VLAN interface with an IP address
for management of the switch.
Figure 5 - DMZ VLAN topology and services
Internet
Cisco ASA
DMZ VLAN
Trunk
DMZ
Switches
Cisco Email
Security
Appliance
1080
Distribution
Switches
Tech Tip
Setting the DMZ connectivity as a VLAN trunk offers the greatest flexibility.
Deployment Details
10
Step 3: In the Edit Interface dialog box, if the interface has not already been enabled, select Enable Interface,
and then click OK. Otherwise, click Cancel.
Deployment Details
11
Step 11: In the Subnet Mask box, enter the interface subnet mask (Example: 255.255.255.0), and then click OK.
Deployment Details
12
Procedure 4
The DMZ network uses private network (RFC 1918) addressing that is not Internet routable, so the firewall must
translate the DMZ address of Cisco ESA to an outside public address. If there is a resilient Internet connection,
the appliance can have an address translation for each ISP. This resilient configuration, shown here for
completeness, relies on the modification of DNS records to point incoming requests to the resilient Cisco ESA
when the primary Internet connection is unavailable.
The example DMZ address to public IP address mapping is shown in the following table.
Table 1 - Cisco ESA address mapping
Cisco ESA DMZ address
192.168.17.25
172.16.130.25 (ISP-A)
172.17.130.25 (ISP-B)
13
Next, you add a network object for the private DMZ address of Cisco ESA.
Step 7: Click Add> Network Object.
Step 8: On the Add Network Object dialog box, in the Name box, enter a description for the Cisco ESAs private
DMZ IP address. (Example: dmz-esa-c100v-ISPa)
Step 9: In the Type list, choose Host.
Step 10: In the IP Address box, enter the Cisco ESAs private DMZ IP address. (Example: 192.168.17.25)
Step 11: Click the two down arrows. The NAT pane expands.
Step 12: Select Add Automatic Address Translation Rules.
Deployment Details
14
Step 13: In the Translated Addr list, choose the network object created in Step 2.
Step 16: In the Add Network Object dialog box, click OK.
Step 17: On the Network Objects/Groups pane, click Apply.
Step 18: If you are using a design which has a resilient Internet connection (a connection to each of two different
ISPs), repeat this entire procedure for the second Internet connection (ISP B).
Deployment Details
15
Procedure 5
The Email DMZ provides an additional layer of protection to lower the likelihood of certain types of
misconfiguration or a compromise of a host in the DMZ, exposing other devices or networks to an attacker on
the Internet. The security policy allows only mail traffic to Cisco ESA. The appliance is allowed to send SMTP
traffic as well as make HTTP and HTTPS connections (needed for reputation updates) to any host on the Internet.
Cisco ESA is allowed to make inbound SMTP connections to the corporate exchange server as well as DNS
requests to the organizations DNS server.
First, to simplify the configuration of the security policy, you create the network objects that are used in the
firewall policies.
Table 2 - Firewall network objects
Network object name
Object type
IP address
Description
internal-dns
Host
10.4.48.10
DNS server
internal-exchange
Host
10.4.48.25
Exchange server
internal-ntp
Host
10.4.48.17
NTP server
internal-network
Network
10.4.0.0/15
Internal network
Step 8: After adding all of the objects listed in Table 2, on the Network Objects/Groups pane, click Apply.
Deployment Details
16
Interface
Action
Source
Destination
Service
Description
Any
Permit
internal-exchange
dmz-email-network
tcp/smtp
Exchange to ESA
outbound SMTP
Selected / Default
Any
Deny
internal-network
any4
tcp/smtp
Selected / Default
Any
Permit
any4
dmz-email-network
tcp/smtp
Internet to ESA
inbound SMTP
Selected / Default
Any
Permit
dmz-email-network
internal-exchange
tcp/smtp
ESA to Exchange
inbound SMTP
Selected / Default
Any
Permit
dmz-email-network
internal-dns
udp/domain
DNS
Selected / Default
Any
Permit
dmz-email-network
internal-ntp
udp/ntp
NTP
Selected / Default
Any
Deny
dmz-email-network
internal-network
Ip
Selected / Default
Any
Permit
dmz-email-network
any4
tcp/smtp
ESA to Internet
outbound SMTP
Selected / Default
Any
Permit
dmz-email-network
any4
tcp/http
HTTP to Internet
Selected / Default
Any
Permit
dmz-email-network
any4
tcp/https
HTTPS to Internet
Selected / Default
Step 10: Repeat Step 11 through Step 20 for all rules listed in Table 3.
Step 11: Click the rule that denies traffic from the DMZ toward the internal network.
Tech Tip
Be sure to perform this step for every rule listed in Table 3. Inserting the rules above
the DMZ-to-any rule keeps the added rules in the same order as listed, which is
essential for the proper execution of the security policy.
17
Step 18: In the Description box, enter a useful description. (Example: Exchange to ESA outbound SMTP)
Step 19: Select or clear Enable Logging. (Example: Selected)
Step 20: In the Logging Level list, choose the logging level value, and then click OK. (Example: Default)
Step 21: After adding all of the rules in Table 3, in the order listed, click Apply on the Access Rules pane.
Deployment Details
18
PROCESS
Procedure 1
Prepare for the following configuration procedures by creating the DNS records that are required for email
communication. The DNS address (A) record provides a Fully Qualified Domain Name (FQDN) to IP addressing
mapping and the DNS pointer record (PTR) provides an IP to FQDN mapping, also known as a reverse lookup.
Configure your internal DNS server to advertise the records listed in Table 4.
Table 4 - Example DNS A and PTR records (Internal DNS)
FQDN
Outside IP address
internal-exchange.cisco.local
10.4.48.25
mail.cisco.local
192.168.17.25
If you are using a resilient ISP design, then each outside IP address requires its FQDN as shown in Table 5.
The domain (Example: cisco.local) requires one or more mail exchange records (MX), which are used to
determine the MTA for an organization. In a resilient design, multiple MX records with differing mail server
priorities are used. The mail server with the lowest mail server priority is the primary MTA. Example values are
shown in Table 6.
Configure your external DNS server to advertise the records listed in Table 5 and Table 6.
Table 5 - Example DNS A and PTR records (External DNS)
ISP
FQDN
Outside IP address
Primary
mail-a.cisco.local
172.16.130.25
Secondary
mail-b.cisco.local
172.17.130.25
FQDN
Mail server
Primary
cisco.local
mail-a.cisco.local
10
Secondary
cisco.local
mail-b.cisco.local
20
Deployment Details
19
Procedure 2
Tech Tip
The default username is admin and the default password is ironport.
Procedure 3
Tech Tip
Depending on the code version installed, the CLI or GUI interfaces might display
slightly different options.
Step 1: Run interfaceconfig and setgateway, which change the basic network settings, and then issue the
commit command, which saves the changes to the running configuration.
ironport.example.com> interfaceconfig
Currently configured interfaces:
1. Management (192.168.42.42/24 on Management: ironport.example.com)
Choose the operation you want to perform:
[]> EDIT
Enter the number of the interface you wish to edit.
[]> 1
IP interface name (Ex: "InternalNet"):
[Management]> dmz-email
Would you like to configure an IPv4 address for this interface (y/n)? [Y]> y
IP Address (Ex: 192.168.1.2):
[192.168.42.42]> 192.168.17.25
Deployment Details
20
21
The interface you edited might be the one you are currently logged into. Are you
sure you want to change it? [Y]> Y
Updating SNMP agent interface referencing the old interface name "Management" to
the new interface name "dmz-email".
Currently configured interfaces:
1. dmz-email (192.168.17.25/24 on Management: DMZ-ESA-c100v.cisco.local)
Choose the operation you want to perform:
- NEW - Create a new interface.
- EDIT - Modify an interface.
- GROUPS - Define interface groups.
- DELETE - Remove an interface.
[]> <Return>
ironport.example.com> setgateway
Warning: setting an incorrect default gateway may cause the current
connection to be interrupted when the changes are committed.
Set gateway for:
1. IPv4
2. IPv6
[1]> 1
Enter new default gateway:[]> 192.168.17.1
ironport.example.com> commit
Please enter some comments describing your changes:
[]> initial setup
Changes committed
Cisco ESA is now configured. You can verify connectivity by pinging the default gateway.
ironport.example.com> ping 192.168.17.1
Press Ctrl-C to stop.
PING 192.168.17.1 (192.168.17.1): 56 data bytes
64 bytes from 192.168.17.1: icmp_seq=0 ttl=255 time=0.481 ms
64 bytes from 192.168.17.1: icmp_seq=1 ttl=255 time=0.271 ms
64 bytes from 192.168.17.1: icmp_seq=2 ttl=255 time=0.195 ms
^C
Deployment Details
22
Procedure 4
Step 1: From a client on the internal network, navigate and log in to the appliance. (Example:
https://192.168.17.25)
Tech Tip
The default username is admin and the default password is ironport.
Tech Tip
The last two checkboxes determine whether Cisco ESA participates in the Cisco
SenderBase network. This allows Cisco ESA to send anonymized reputation details
about email traffic to Cisco in order to improve SenderBase and the product in general.
Deployment Details
23
On the Network tab, verify the IPv4 gateway is correct and proceed to choose Use the specified DNS Servers
radio button.
Step 9: In the DNS Server IP Address box, enter the internal DNS. (Example: 10.4.48.10)
Step 10: Within the Enable Management Interface box select: Accept mail on this interface.
Step 11: In the Domain box, enter the organizations email domain. (Example: cisco.local)
Step 12: In the Destination box, enter the internal email server. (Example internal-exchange.cisco.local)
Step 13: Also on the Management Interface select Relay mail on this interface.
Deployment Details
24
Step 14: In the Mail Server box, enter the internal email server, and then click Next. (Example internal-exchange.
cisco.local)
Step 15: On the Security tab, ensure anti-spam and anti-virus filtering are enabled, and then click Next.
Step 16: On the Review tab, review the configuration, and then click Install this Configuration.
Step 17: On the Confirm Install window, accept the warning by clicking Install. Cisco ESA installs the
configuration.
Deployment Details
25
Step 18: When the Active Directory wizard appears, click Cancel. In this example, you do not configure an
Active Directory server.
Procedure 5
Step 1: In the web configuration tool, browse to System Administration> Feature Keys. This is where the
license keys for the different features on the box are displayed.
Step 2: Check whether your appliance has any licenses that are not currently enabled by clicking Check for
New Keys. This enables the appliance to connect to Cisco.com and determine if all purchased licenses are
installed and enabled.
Next, upgrade the system software on the appliance.
Tech Tip
It is not possible to downgrade software versions, so be certain that you want to
upgrade before proceeding. It is possible that an appliance can receive different
upgrade options if it is on an early release list.
Step 3: Select the System Administration >System Upgrade button. The current software version appears.
Step 4: Click Upgrade Options. This determines if updates are available.
Step 5: If newer versions are available, you may select and install them now.
Tech Tip
While it is not necessary to load all updates sequentially, it is possible that a more
recent update will require interim updates before it can be loaded. If interim updates
are required, the appliance will alert the operator.
If the latest version isnt available in the list of software upgrade versions, then upgrade
to the latest version listed and check the list again after rebooting as there may not
be an immediate upgrade path from the version the appliance is running to the latest
available version.
Deployment Details
26
PROCESS
Now that system setup is complete, you are ready to enable mail policies.
Procedure 1
Cisco ESA uses a Recipient Access Table (RAT) to control whether to accept or reject email messages to
a recipient address. The System Setup Wizard configures Cisco ESA to accept email to your organization
(Example: cisco.local), but rejects email to all other recipients.
You must configure Cisco ESA to accept email for other recipients so that your internal email server can use
Cisco ESA as an email relay (sometimes referred to as a smart host).
Tech Tip
Cisco ESA restricts the hosts that can use it as a relay through Host Access Table
(HAT). Only your internal mail server(s) should be listed in the HAT as a relay.
This was automatically configured through the System Setup Wizard.
Step 1: Navigate to Mail Policies> Recipient Access Table (RAT), and then click All Other Recipients.
Step 2: In the Action list, choose Accept, and then click Submit.
Deployment Details
27
Step 4: In the Uncommitted Changes pane, enter a comment to describe the change and click Commit
Changes.
Procedure 2
One of the last steps of setting up a standard configuration for Cisco ESA is setting up Bounce Verifications.
Bounce Verification is a process that allows Cisco ESA to tag outgoing messages so that when bounced email
comes back to the appliance, it can verify that the email was actually sent out originally by Cisco ESA. Spammers
and hackers use fake bounced messages for many malicious purposes.
Step 1: Navigate to Mail Policies> Bounce Verification, and then click New Key.
Step 2: In the Address Tagging Key box, enter an arbitrary text string that Cisco ESA will apply in the Bounce
Verification process, and then click Submit.
Step 3: Click Commit Changes.
Step 4: In the Uncommitted Changes pane, enter a comment to describe the change, and then click Commit
Changes.
Step 5: Navigate to Mail Policies> Destination Controls.
Step 6: Under Domain, in the first table, click Default.
Deployment Details
28
Procedure 3
The last stage in appliance setup is reviewing the incoming mail policies. Currently there is one default mail
policy. It marks a positive anti-spam result for quarantine. You change this to instead take a Drop action.
Step 1: Navigate to Mail Policies> Incoming Mail Policies.
Step 2: Under the Anti-Spam column header, select the policy definition.
Step 3: Change the Positively-Identified Spam Settings from Spam Quarantine to Drop, and then click Submit.
Step 4: Click Commit Changes.
Step 5: In the Uncommitted Changes pane, enter a comment to describe the change, and then click Commit
Changes.
Procedure 4
Troubleshooting inbound and outbound email on Cisco ESA requires that you enable the Message Tracking
Service. Once this service is enabled, you can search the message logs and view detailed tracking information
for all email messages.
Tech Tip
This is an optional procedure, and may impact the performance of your Cisco ESA if
left on permanently.
Step 1: Navigate to Security Services> Message Tracking , and then click Enable.
Step 2: Select Enable Message Tracking Service, and then click Submit.
Deployment Details
29
Summary
Cisco ESA has been configured for basic network access, and an anti-spam and anti-virus policy has been
built and applied. DNS has been modified to support Cisco ESA, the appliance software was updated, and the
feature keys for the appliance were installed. Some slight policy changes have been made, but a detailed policy
discussion, troubleshooting, and ongoing monitoring are topics that can be pursued with a trusted Cisco partner
or account team.
Deployment Details
30
Product Description
Part Numbers
Software
C370-BUN-R-NA
Async OS 8.5.5-280
ESA-ESP-[term]-[quantity]
Async OS 8.5.5-280
term = 1Y
term = 3Y
term = 5Y
quantity = S1
quantity = S2
quantity = S3
quantity = S4
quantity = S5
quantity = S6
quantity = S7
quantity = S8
quantity = S9
quantity = S10
quantity = S11
quantity = S12
quantity = S13
quantity = S14
quantity = S15
31
Internet Edge
Functional Area
Product Description
Part Numbers
Software
Firewall
ASA5545-IPS-K9
ASA5525-IPS-K9
ASA 9.1(5)
IPS 7.1(8p2)E4
ASA5515-IPS-K9
ASA5512-IPS-K9
ASA5512-SEC-PL
Firewall Management
ASDM
7.1(6)
Product Description
Part Numbers
Software
DMZ Switch
WS-C2960X-24PS
15.0(2)EX5
LAN Base feature set
C2960X-STACK
32
Appendix B: Changes
This appendix summarizes the changes Cisco made to this guide since its last edition.
We added the deployment of Cisco ESA as a virtual appliance within the DMZ.
We upgraded the Cisco ESA Code to 8.5.5-280
We improved usability of procedures for configuring firewall policy rules
Appendix B: Changes
33
Feedback
Please use the feedback form to send comments and
suggestions about this guide.
Americas Headquarters
Cisco Systems, Inc.
San Jose, CA
Europe Headquarters
Cisco Systems International BV Amsterdam,
The Netherlands
Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices.
ALL DESIGNS, SPECIFICATIONS, STATEMENTS, INFORMATION, AND RECOMMENDATIONS (COLLECTIVELY, DESIGNS) IN THIS MANUAL ARE PRESENTED AS IS,
WITH ALL FAULTS. CISCO AND ITS SUPPLIERS DISCLAIM ALL WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE WARRANTY OF MERCHANTABILITY, FITNESS FOR
A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS
SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR
DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THE DESIGNS, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES. THE DESIGNS ARE SUBJECT TO CHANGE WITHOUT NOTICE. USERS ARE SOLELY RESPONSIBLE FOR THEIR APPLICATION OF THE DESIGNS. THE DESIGNS
DO NOT CONSTITUTE THE TECHNICAL OR OTHER PROFESSIONAL ADVICE OF CISCO, ITS SUPPLIERS OR PARTNERS. USERS SHOULD CONSULT THEIR OWN TECHNICAL
ADVISORS BEFORE IMPLEMENTING THE DESIGNS. RESULTS MAY VARY DEPENDING ON FACTORS NOT TESTED BY CISCO.
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the
document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
2014 Cisco Systems, Inc. All rights reserved.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this
URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)
B-0000170-1 09/14