User Guide
24-54
AsyncOS 9.1.2 for Cisco Email Security Appliances User Guide
Chapter 24 Configuring Routing and Delivery Features
Bounce Verification
Figure 24-6 The Consider Untagged Bounces to be Valid HAT Parameter
Preventing a Bounced Message Storm Using Bounce Verification
Procedure
Step 1 Enter a tagging key. For more information, see Configuring Bounce Verification Address Tagging Keys,
page 24-55.
Step 2 Edit the bounce verification settings. For more information, see Configuring Bounce Verification
Settings, page 24-55.
Step 3 Enable bounce verification via Destination Controls. For more information, see Working with
Destination Controls, page 24-44.
Figure 24-7 IronPort Bounce Verification Page
Related Topics
• Configuring Bounce Verification Address Tagging Keys, page 24-55
• Configuring Bounce Verification Settings, page 24-55
• Configuring Bounce Verification Using the CLI, page 24-55
• Bounce Verification and Cluster Configuration, page 24-55