Configuring LDAP to Work with the Spam Quarantine
When you configure your Cisco Content Security appliance to work with an LDAP directory, you must complete the following steps to set up for acceptance, routing, aliasing, and masquerading:
Procedure
Step 1 | Configure an LDAP server profile. The server profile contains information to enable AsyncOS to connect to the LDAP server, such as:
For more information about configuring a server profile, see Creating the LDAP Server Profile. When you create the LDAP server profile, you can configure AsyncOS to connect to multiple LDAP servers. For more information, see Configuring AsyncOS to Work With Multiple LDAP Servers. |
Step 2 | Configure the LDAP queries. You can either use the default spam quarantine queries generated for the LDAP server profile or create your own queries that are tailored to your particular LDAP implementation and schema. You then designate the active queries for spam notifications and end-user access to the quarantine. For information about queries, see Configuring LDAP Queries. |
Step 3 | Enable LDAP end-user access and spam notifications for the spam quarantine. Enable LDAP end-user access to the spam quarantine to allow end-users to view and manage messages in their quarantine. You can also enable alias consolidation for spam notifications to prevent the user from receiving multiple notifications. For more information, see Setting Up the Centralized Spam Quarantine. |