- Introduction to ESA and Email Server Functions
- Understanding the Role of POP3 vs IMAP
- DNS, SMTP, and the Email Sending Process
- Where Does Cisco ESA Fit?
- Understanding Cisco Email Security Appliance (ESA) and Its Role in Modern Email Security
- SMTP Commands Recognized by Cisco ESA
- RFC Headers and MIME Formatting in ESA
- SMTP and DNS: Behind the Scenes
- Core Responsibilities of an MTA (like Cisco ESA)
- Security Enhancements: Recipient Validation and DHAP
- ESA as an MTA: Acting as an Email Proxy
- Typical Deployment: ESA in the DMZ
- Why This Architecture Matters
- Understanding ESA Model Differences
- Initial Setup: Default Configuration and System Setup Wizard (SSW)
- Enabling Anti-Spam and Centralized Quarantine
- ESA Network Topologies
- DNS, Routing, and Security Filtering on Cisco ESA
- Inside the Cisco ESA Email Pipeline: Message Flow and Listeners
- Host Access Table (HAT), Sender Reputation, and Connection Actions
- Additional Envelope Checks and Authentication
- Understanding Cisco ESA: RAT Tables, Recipient Rewrites, LDAP Queries, and the Work Queue
- Content Filtering Policies
- Virus Outbreak Filters (VOF)
- Data Loss Prevention (DLP) and Encryption
- Message Delivery Stages
- ESA Packet Flow Overview
Note: Cisco Secure Email Appliance used to be named “Email Security Appliance” (ESA). I will be referring to it as its legacy name throughout this series only because I have hundreds of pages of notes that would be a pain to convert to the new naming. I know I’ll miss some if I try. Instead of adding to the confusion by calling it two different names throughout, I’ll add this disclaimer at the top and use the legacy name consistently throughout my notes.
Introduction to ESA and Email Server Functions
An email server typically performs two essential jobs:
- Send and receive emails over the network.
- Store emails and allow clients (like Outlook or webmail apps) to retrieve and manage them using protocols such as POP3, IMAP, or HTTP.
While clients use POP3 and IMAP to access and organize messages stored on a mail server, SMTP (Simple Mail Transfer Protocol) is used to send emails. SMTP operates over TCP port 25 and is designed primarily for transferring messages between servers or from a client to a server.
Understanding the Role of POP3 vs IMAP
The major distinction between POP3 (TCP 110) and IMAP (TCP 143) lies in where the messages are stored:
- POP3 downloads emails to the client’s local machine and typically deletes them from the server. If the local device is lost or damaged, the emails will be lost unless they are backed up.
- IMAP, however, keeps messages on the server, enabling multiple-device access, synchronization, and server-side management of folders. This makes IMAP the preferred choice in most environments today.
DNS, SMTP, and the Email Sending Process
To illustrate email transmission, imagine Katherine with the address katherine@sendthepayload.com wants to send an email to dustin@cisco.com
Here’s how the process unfolds:
- Katherine composes the email in an email client, such as Outlook, which connects to the Exchange server using IMAP or POP3.
- The Exchange server (SMTP client role) prepares to forward the email to Dustin’s mail server.
- Before sending, it queries DNS for company.com’s MX (Mail Exchange) record. This MX record contains a domain like mail.company.com.
- DNS resolves mail.company.com to an IP address, say 100.1.1.1, via an A record.
The sending Exchange server then opens a TCP connection on port 25 to the destination SMTP server. It sends a “Hello” (HELO/EHLO) with its hostname (e.g., mail.sendthempayload.com) to verify domain identity. This message exchange includes the:
- MAIL FROM: sender address
- RCPT TO: recipient address
Together, these details form the SMTP envelope. After successful negotiation and validation, the remote server accepts the message and queues it for delivery to Dustin’s inbox.
IMAP on the Receiving Side
Dustin’s local email client will use IMAP to connect to his organization’s mail server to view or download the message. IMAP enables continuous sync between the server and Dustin’s client, preserving folders, read status, and message hierarchy.
Where Does Cisco ESA Fit?
The Cisco Email Security Appliance (ESA) is not a full email server in the traditional sense. Rather, it acts as a Mail Transfer Agent (MTA) focused on securing and managing mail flow before messages reach the mailstore or mailbox.
ESA’s role is to:
- Accept inbound email traffic via SMTP
- Inspect it for spam, viruses, phishing, policy violations, and more
- Filter or quarantine suspicious messages
- Then relay clean mail to the actual destination mail server
While ESA participates in the SMTP transaction, it adds inspection layers to the envelope and content before forwarding messages onward. ESA does not store email or provide mailbox access like IMAP/POP3 servers do.
Understanding Cisco Email Security Appliance (ESA) and Its Role in Modern Email Security
The Cisco Email Security Appliance (ESA), originally developed by IronPort Systems in 2003, is a robust solution designed to accept, filter, and deliver internet email messages. Unlike traditional email systems, the ESA does not act as a message store and does not support end-user access protocols such as POP or IMAP. Instead, its core function is to serve as a Message Transfer Agent (MTA) , often also referred to as a Messaging Gateway Appliance (MGA).
ESA and Its Role as an MTA
An MTA is responsible for accepting and delivering email messages. This is distinct from a Mail Delivery Agent (MDA), which stores messages, and a Mail User Agent (MUA), which allows users to retrieve and interact with email. Some MTAs include MDA capabilities, but the ESA is strictly an MTA.
ESA runs on AsyncOS, a software stack that includes the underlying operating system (based on FreeBSD), device drivers, memory and process management, and all application-layer email scanning and processing functions.
Complementing ESA: The Security Management Appliance (SMA)
To provide centralized control and reporting capabilities, Cisco offers the Security Management Appliance (SMA), also known as the M-series. The SMA does not handle message delivery or filtering but instead supports logging, message tracking, and spam quarantine (IronPort Spam Quarantine or ISQ). Typically, organizations deploy the SMA alongside two or more ESAs for centralized control.
Key benefits of using an SMA include:
- A unified interface for email reporting and message tracking
- More efficient handling of tasks like quarantine access and message tracing, which are resource-intensive for the ESA
- Expanded quarantine capacity and control beyond what ESA alone can offer
The SMA is built on the same code base as ESA and offers tight integration, but it’s not capable of independently processing or delivering emails.
ESA Capabilities and Email Security Features
Every ESA model comes equipped with a comprehensive suite of features to secure email communication:
- Connection Controls and Rate Limiting: Prevents abuse from junk senders by controlling connections and access.
- Email Acceptance and Delivery: Filters messages at the perimeter to ensure only legitimate email is delivered.
- Security Filtering: Blocks spam, viruses, phishing attempts, and other malicious content before it reaches end users.
- Data Loss Prevention and Encryption: Detects sensitive content and can encrypt transmissions when necessary.
- Custom Filtering: Uses a powerful rules engine to inspect sender, recipient, subject, body, and attachments, supporting over 400 file formats.
The Three Core Objectives of ESA Email Security
ESA is primarily focused on three key areas of email protection:
- Inbound Security: Blocking malicious or unwanted messages while allowing legitimate mail to flow.
- Outbound Control: Ensuring sensitive internal data is not inadvertently or maliciously sent to unauthorized parties.
- Email Flow Assurance: Identifying and mitigating unplanned disruptions that may hinder email delivery.
Why Email Security Matters
Email remains the most common vector for malware delivery, phishing, and other cyber threats. Attackers frequently use URLs embedded in emails to trick users into downloading malicious content. ESA helps prevent such threats while also enabling organizations to enforce policies that protect intellectual property. Its Data Loss Prevention (DLP) feature enables the classification and enforcement of rules governing what data can be sent externally.
Email communication with ESA relies on the Simple Mail Transfer Protocol (SMTP), as defined in RFC 821, and its extension, ESMTP, as specified in RFC 5321. SMTP operates over TCP port 25 and is transport-agnostic, requiring only a reliable data stream.
SMTP uses a store-and-forward mechanism, meaning messages are held until they can be delivered. Temporary errors are common and managed using retry logic, and SMTP remains human-readable and simple to test using tools like Telnet. Software that speaks SMTP can act as a client, server, or both.
Common SMTP Response Codes in ESA
- 220 – Success code for initial SMTP server greeting
- 250 – Command accepted successfully
- 354 – Server ready to receive message data
- 421 – Temporary failure or rejection due to resource constraints or policy limits
- 452 – Temporary failure due to recipient-specific limits
- 550 – Permanent failure; recipient mailbox does not exist
- 554 – Permanent rejection due to low-reputation sender or invalid source
Additional technical nuances:
- A blank sender address is valid and used for bounce messages or delivery status notifications (DSNs).
- Legacy SMTP commands, such as EXPN and VRFY, are largely unsupported by ESA due to security concerns; however, it may still respond to them.
Cisco ESA, combined with SMA, provides a robust, policy-driven approach to securing email at the gateway level, offering protection against evolving threats while supporting enterprise-grade email hygiene and data protection. This makes it an essential component of any organization’s email infrastructure.
SMTP Commands Recognized by Cisco ESA
The Cisco ESA honors a core set of SMTP commands that facilitate the structured transmission of email. These commands allow ESA to validate senders and recipients, accept message content, and handle session-level control. Below is a breakdown of the commands and their purpose:
- EHLO domain: Initiates the SMTP conversation. Clients use this to identify themselves and indicate their support for Extended SMTP (ESMTP). ESA may respond with a list of ESMTP features it supports.
- MAIL: Starts a new SMTP message session and specifies the sender (MAIL FROM).
- RCPT: Indicates the intended recipient of the message. ESA checks and validates this recipient.
- DATA: Signals that the client is ready to send the email body, including headers and content. The message ends with a termination sequence (CRLF.CRLF).
- RSET: Resets the session without closing the connection. Clears sender, recipient, and message state.
- VRFY email-address: Requests verification of an address. ESA does not implement this command due to its potential for abuse and always replies with “252 ok”.
- EXPN email-address: Checks if an address belongs to a mailing list and requests expansion. ESA does not support this command, responding with “500 command not recognized.”
- QUIT: Gracefully ends the session and closes the connection.
- NOOP: A keepalive command with no effect other than getting a “250 ok” response from ESA.
- HELP: Requests help on commands. ESA limits its response due to security considerations.
- AUTH: Used for SMTP AUTH authentication. ESA only allows this in specific environments like ISPs or academic institutions. Credentials are passed in cleartext unless protected by TLS.
- STARTTLS: Initiates TLS encryption during an SMTP session. This command is only honored when ESMTP is used and ESA is configured to support TLS.
Understanding ESMTP and Extensions in Cisco ESA
When a client uses the EHLO greeting to start a session, it signals its ESMTP capabilities. In response, the ESA returns a list of supported ESMTP extensions. These extensions enhance SMTP by adding optional features without modifying the core protocol, allowing for seamless evolution.
Standard ESMTP extensions must be registered with IANA. However, vendors like Cisco can implement proprietary extensions, which must start with an “X” to distinguish them from standardized ones.
All data sent after the DATA command and before the final termination string is considered the “body” of the message, encompassing both headers and content.
RFC-Defined Headers and Future Continuation
The final section in the notes mentions “Common RFC-Defined Headers” but does not list any. These would typically include:
- From: Identifies the sender
- To: Lists the primary recipient(s)
- Subject: Provides a summary of the email content
- Date: Indicates when the email was sent
- Message-ID: A unique identifier for the email
- Received: Shows the path an email took across servers
These headers are standardized across email protocols and play a vital role in filtering, forensics, and policy enforcement within ESA.
Cisco ESA’s adherence to SMTP and ESMTP protocols, along with its strict command handling and support for extensions, underpins its role as a secure, policy-driven gateway for enterprise email traffic. Whether it’s filtering spam, enforcing encryption, or regulating outbound data, ESA leverages protocol-level precision to protect organizations at the email perimeter.
RFC Headers and MIME Formatting in ESA
While many headers in SMTP messages are defined by RFC standards, organizations may also use custom headers for internal tracking or compliance purposes. These custom headers must start with “X-” and adhere to SMTP header format rules, including limits on header length.
SMTP messages involve two types of sender and recipient addresses:
- Envelope addresses, specified using MAIL FROM and RCPT TO commands.
- Visible headers, such as To, From, CC, or Reply-To, which the user sees. ESA typically ignores these visible headers unless explicitly configured to inspect or filter based on them.
Handling Binary and Multipart Content: MIME in ESA
MIME (Multipurpose Internet Mail Extensions) enables email systems like ESA to process binary content and multipart messages, capabilities SMTP lacks natively. MIME is also widely used in other internet protocols like HTTP.
A valid MIME message starts with a MIME-Version header. The Content-Type header follows, specifying the overall format (e.g., text/plain, image/jpeg). MIME parts can include:
- Entire message bodies
- Attached files
- Nested subparts (for instance, a multipart/mixed section inside another multipart/mixed)
The multipart/mixed type tells the receiving client (MUA) that multiple types of content are present (e.g., plain text and a PDF). Clients may render these parts differently depending on the implementation. Another common structure, multipart/alternative, includes the same message in different formats (e.g., text/plain and text/html), allowing the client to choose the most suitable one.
MIME Categories and ESA’s Role
According to the MIME standards (RFCs 2045–2049), five global MIME categories exist:
- text/ – Plain or formatted textual content like HTML or Rich Text
- image/ – Displayable image data such as JPEG, PNG, or GIF
- video/ – Multimedia data including synchronized audio and video (e.g., MPEG)
- audio/ – Audio-only data like MP3 or WAV
- application/ – Software-specific binary formats (e.g., Word docs, PDFs, EXEs)
Binary data is encoded using Content-Transfer-Encoding headers, such as Base64 or quoted-printable. ESA is capable of decoding and inspecting these formats natively without requiring conversion, making it especially effective in detecting threats hidden within attachments or compressed archives.
SMTP and DNS: Behind the Scenes
SMTP’s ability to deliver messages depends heavily on DNS MX records. To deliver mail, a client must:
- Look up the MX record for the recipient’s domain.
- If no MX exists, fall back to the A record.
- Extract hostnames, TTLs, and MX preferences from the record.
- Attempt delivery to the destination IP over TCP port 25.
If multiple MX records share the same priority, the client can choose randomly among them. Delivery proceeds until the first IP accepts the SMTP connection.
Core Responsibilities of an MTA (like Cisco ESA)
Mail Transfer Agents (MTAs) must perform several key tasks to handle email securely and efficiently:
- Accepting Internet mail for local domains only: Prevents open relay misuse.
- Validating recipients: Confirm that email addresses exist before accepting messages.
- Queueing and retrying: Retry delivery on failure, consistent with store-and-forward architecture.
- Routing based on directories: Look up delivery targets from recipient directories or routing tables.
- Sending outbound mail: Transfer internal messages to Internet-based recipients.
- Filtering messages: Conduct spam, virus, and content filtering, one of ESA’s core functions.
While some setups combine MTA, MUA, and mailstore functions, the most common design uses separate components for performance and control.
Security Enhancements: Recipient Validation and DHAP
ESA enhances recipient validation through:
- Recipient Access Table (RAT): Maintains lists of valid recipients.
- LDAP queries or directory sync: Dynamically verify recipient legitimacy.
- Static directory tables: Used when dynamic lookup isn’t feasible.
Preventing Directory Harvest Attacks
Directory Harvest Attacks (DHAs) occur when spammers brute-force email addresses. ESA combats this with Directory Harvest Attack Prevention (DHAP) policies:
- Policies define thresholds for invalid recipient attempts.
- Offending senders are blocked for one hour if limits are exceeded.
This proactive defense makes brute-force harvesting ineffective, especially when combined with real-time recipient verification.
Cisco ESA is more than a filter — it is a protocol-aware, standards-compliant email security gateway. By intelligently managing SMTP flow, MIME content, DNS integration, and minimizing the attack surface, it stands as a vital line of defense in any organization’s cybersecurity posture.
ESA as an MTA: Acting as an Email Proxy
In a traditional email setup, a client (like Outlook) communicates with an internal SMTP server to send outgoing mail. However, when Cisco ESA is introduced into the infrastructure, it functions as an intermediary MTA, sitting between the internal mail server and the outside world. It essentially acts as a proxy for email communication.
Here’s how the flow typically works:
- The client sends an email to the internal SMTP server.
- Instead of routing the email directly to an external SMTP server, the internal server forwards it to the ESA.
- The ESA then takes responsibility for outbound delivery, scanning the message for threats, applying policies, and finally forwarding the sanitized message to its final destination.
This model allows the ESA to inspect both inbound and outbound email traffic, applying filters, encryption, and compliance rules at the network perimeter.
Typical Deployment: ESA in the DMZ
In most enterprise environments, the ESA is placed in the Demilitarized Zone (DMZ). This placement gives the appliance controlled access to both the internal network (where the internal SMTP server resides) and the external internet (for communication with remote SMTP servers).
The typical topology looks like this:
- Users send messages from their devices to an internal SMTP server.
- The internal SMTP server relays the message to the ESA in the DMZ.
- The ESA evaluates, filters, and forwards the message to the external SMTP infrastructure.
This configuration provides a layered security approach, allowing internal servers to remain isolated from the internet while the ESA enforces security policies at the boundary.
Why This Architecture Matters
Positioning ESA as an intermediary MTA offers several strategic advantages:
- Isolation: Internal email systems are shielded from direct internet exposure.
- Security enforcement: ESA enforces security policies, filters spam, and blocks malware before it enters or leaves the organization.
- Control: Outbound mail can be logged, inspected for compliance, and encrypted as necessary.
Ultimately, the ESA is not just another server in the chain; it is a purpose-built security gateway that filters, evaluates, and controls email traffic as part of a zero-trust email architecture.
Understanding ESA Model Differences
The primary differentiator between ESA models lies in performance, specifically, throughput. This refers to how many email messages a system can accept, scan, and deliver within a given timeframe. Throughput is often measured in messages per second or per hour at an average message size. System throughput is influenced by:
- ESA hardware capacity
- Number and complexity of enabled filters
- Type of network interface configuration
Initial Setup: Default Configuration and System Setup Wizard (SSW)
Out of the box, ESA ships with a factory configuration that includes a single preconfigured network interface. Logging and administrative subsystems are also enabled, and the default administrative user is:
- Username: admin
- Password: ironport
By default, the ESA management interface is configured with the IP 192.168.42.42/24 and supports SSH, HTTP, and HTTPS. You can connect to the web GUI using this IP in a browser.
Upon login, the System Setup Wizard (SSW) launches, which walks you through:
- Accepting the End User License Agreement (EULA)
- Hostname and Alert Setup:
- Set fully qualified hostname for ESA reporting and alerting
- Configure admin email address for notifications
- Define NTP servers and timezone
- Set a new admin password
- Optional Opt-In Services:
- SenderBase Network Participation (SBNP): Provides anonymized telemetry to Cisco.
- AutoSupport: Sends weekly support snapshots to IronPort support (including hashed filenames and IPs).
- Networking and Domain Setup:
- Configure DNS resolution manually or via Internet Root Servers.
- Assign IP address, subnet mask, and hostname per interface.
- Define behavior:
- Accept mail on this interface: Allows public SMTP connections for listed domains.
- Relay mail on this interface: Allows internal hosts to send email to the ESA for outbound delivery.
- Install and Finalize:
- Review settings and click Install This Configuration.
- If you changed the IP, reconnect to the new IP.
- An optional Active Directory setup wizard will appear for binding AD accounts to ESA.
Navigating the ESA Interface
After completing setup, ESA presents five primary menu groups:
- Network: Manage IP interfaces, routing, and DNS.
- Mail Policies: Includes Host Access Table (HAT) and Recipient Access Table (RAT).
- Security Services: Configure IPAS, rule updates, and antivirus engines.
- System Administration: Manage upgrades, licensing, and Active Directory integration.
- Monitoring: View logs, message tracking, and reporting.
Note: Interface configuration changes are CLI-only and performed via the etherconfig command under the media submenu. Cisco recommends keeping Ethernet interfaces in AutoSelect mode unless a specific configuration is required.
Enabling Anti-Spam and Centralized Quarantine
If you enable IronPort Anti-Spam (IPAS) and IronPort Spam Quarantine (ISQ), ESA will scan and redirect spam messages into quarantine. In multi-ESA deployments using an SMA (Security Management Appliance), it’s recommended to disable local ISQ on each ESA and instead enable Centralized ISQ through the SMA.
ESA requires outbound HTTP and HTTPS access to retrieve:
- Rule and engine updates
- Anti-virus definitions
- AsyncOS software updates
You can monitor update status under the Security Services and System Upgrade menus. Rule engines typically check for updates every 5 minutes.
ESA Network Topologies
ESA offers flexible deployment options. The most common configurations include single-arm, two-arm, and three-arm topologies.
1. Single-Arm (One-Arm) Configuration
- Only one physical interface is used.
- ESA resides in the DMZ, where it:
- Accepts mail
- Delivers mail
- Hosts the management GUI
- Connects to all IPs in the subnet via ARP; other traffic is routed to the default gateway.
Virtual Gateways (VGs) can be used to simulate multiple logical interfaces on one NIC. This enables round-robin delivery or separates traffic by assigning:
- Data IPs: 192.168.1.100/24, 192.168.1.101/24, etc.
- Management IPs: Assigned separately but on the same physical port.
2. Two-Arm Configuration
- Uses two physical interfaces:
- One connected to the external network
- One to the internal network
- Must be on different subnets (e.g., 204.15.82.79/24 externally, 192.168.1.100/24 internally)
- Ideal for separating internal and external traffic for security and routing purposes
3. Three-Arm Configuration
- Adds a third interface for a dedicated management network (e.g., 10.1.1.100/24)
- Provides physical separation between:
- Data plane (inbound/outbound mail)
- Internal mail routing
- Management traffic
- Used in high-security environments needing out-of-band management
Choosing the Right ESA Deployment Model
The choice between single, two, or three-arm configurations depends on your operational needs:
- Simplicity: Single-arm setups are easiest to deploy and require no static routing.
- Security: Two- and three-arm designs improve traffic isolation. A firewall can enforce strict access controls for each interface.
- Performance: Segregating mail delivery from management traffic improves throughput and reduces latency.
- Flexibility: Two-arm setups allow distinct listener policies per interface, giving you more granular control.
DNS, Routing, and Security Filtering on Cisco ESA
As we dive deeper into ESA deployment best practices, it’s essential to understand how DNS, routing rules, and filtering engines work under the hood. These mechanisms ensure mail delivery is seamless, secure, and policy-driven.
Basic Routing Logic on ESA
Cisco ESA is not a router and thus relies on very simple packet-forwarding rules:
- If the destination IP is on the same subnet as an ESA interface, it uses that source interface to send the packet.
- If the destination IP is on a different subnet, ESA routes the packet to the default gateway using the interface on the same subnet as that gateway.
This simplicity makes proper subnetting and gateway configuration critical during setup. Additionally, every route on the ESA is given a named route for easy management and policy binding.
DNS Is Critical for ESA Functionality
DNS plays a fundamental role in SMTP operations. ESA uses DNS to:
- Look up MX and A records to determine how to route outgoing mail
- Validate PTR, SPF, and DKIM records
- Query SenderBase Reputation Scores (SBRS) for incoming connections
- Resolve sender domain legitimacy
For new ESA deployments:
- Ensure all public IPs have valid PTR records mapped to their hostnames.
- PTR and A records should be mutually consistent.
- If you’re using NAT, the external IP’s PTR matters, not the internal one.
- ESA’s own interface settings should match these public DNS records.
It’s also wise to have your internal DNS properly configured with named records for ESA management interfaces.
Locking Down ESA Update Traffic
Securing ESA’s outgoing update traffic is crucial for both control and security. Cisco recommends restricting update access to specific IPs or URLs:
- Navigate to Security Services > Service Updates.
- Click Edit Update Settings.
- Under Update Servers (images), select Local Update Servers and set the base URL (port 80).
- Change the Host value to updates-static and commit the changes.
SNMP Configuration and Access Control
By default, ESA’s SNMP daemon is disabled. If you wish to enable SNMP for monitoring, you’ll need to:
- Use the CLI snmpconfig command.
- Define access controls for the SNMP port within that utility.
Host Access Table (HAT) and Sender Access Control
The Host Access Table (HAT) on ESA defines how external IPs can interact with the appliance. Each listener interface has its own HAT that determines:
- Which senders are accepted
- Connection privileges
- Rate limits and filters
SenderBase Reputation Scores (SBRS) are used to classify incoming IPs:
- Scores from -10.0 to -3.0 are BLOCKED and placed on the BLACKLIST
- Scores just above this are THROTTLED, allowing limited connections
- IPs with neutral scores are put on the UNKNOWNLIST, treated with default ACCEPTED policies
- No IPs are WHITELISTED by default
ESA includes internal IPs in a group called the RELAYLIST. These are trusted sources allowed to relay outbound mail through ESA. It’s important to ensure this list is tightly scoped, as RELAYED traffic is largely unrestricted.
Antivirus and Threat Detection Engines
ESA utilizes multiple engines for virus and malware detection, which can be enabled via the System Setup Wizard (SSW) or configured later under Security Services. The engines include:
- Binary antivirus scanners
- Cisco Outbreak Filters (OF), which analyze global internet trends to detect zero-day attacks
Each antivirus engine provides four possible verdicts:
- Repaired – Malicious content was detected and cleaned.
- Encrypted – Content could not be scanned due to encryption (e.g., password-protected ZIP files or S/MIME).
- Unscannable – Content couldn’t be scanned for reasons other than encryption (e.g., corruption).
- Virus Infected – The file is confirmed to be malicious and should be blocked.
Despite its role as a high-throughput security appliance, ESA operates with straightforward routing logic, heavily depends on DNS, and builds its policy enforcement around sender reputation and preconfigured access groups. Its filtering engines offer layered protection—from HAT-based filtering to antivirus and Outbreak Filters—ensuring that both known and unknown threats are neutralized before reaching your mail infrastructure.
Inside the Cisco ESA Email Pipeline: Message Flow and Listeners
Message Direction and Pipeline Behavior
On Cisco ESA, messages do not travel through distinct “incoming” or “outgoing” queues. Instead, all email flows—regardless of direction—pass through a unified pipeline, and the direction of a message dictates which stages and filters are applied. The pipeline can be logically divided into three major stages:
- Connection and SMTP Stages
ESA controls:- Whether a connection is accepted
- Whether the sender and recipient addresses are valid during the SMTP handshake
- Filtering Stage
Once a message and its envelope data are accepted, various filters and scanning engines assess:- Headers, sender reputation, recipients
- Message body content, attachments
- Compliance and threat indicators (e.g., spam, viruses, DLP)
- Delivery Stage
If the message survives all filters—whether unaltered or modified—it is queued for delivery. Several policy features may still influence:- The final destination
- Message routing
- Delivery rate and prioritization
Note: Some messages generated directly by the ESA (such as bounce messages or notifications) bypass the entire acceptance and filtering pipeline and are routed straight to delivery.
Listener Architecture and Control
A listener in ESA is essentially an SMTP daemon bound to a specific IP interface and port. Listeners manage the first third of the pipeline and are responsible for everything from connection acceptance to domain rewriting. ESA allows you to create multiple listeners, each with its own:
- Host Access Table (HAT)
- Recipient Access Table (RAT)
- LDAP configurations
These elements govern how messages are accepted and what transformations or lookups apply.
Validation and Transformations During Connection Stage
Listeners are configured to validate and transform sender/recipient information during the SMTP handshake. The key mechanisms include:
Sender and Recipient Checks:
- Domain-level checks against DNS for envelope sender domains
- Exception table lookups to override reject/accept rules
- Recipient checks against the RAT and/or LDAP queries
- Default domain mapping for partial addresses missing an @domain
Transformations:
- Domain Map: Maps the domain portion of email addresses (e.g., rewrite @internal.local to @corp.example.com)
- Masquerading: Alters both envelope and visible headers for consistency, often using static rules or LDAP
LDAP Queries:
- Used for validating inbound recipients against enterprise directory services
- Must be explicitly assigned to the listener in question
Listener-Specific Restrictions and Policies
Listeners also enforce several other behaviors that affect how messages are processed:
- Character and Format Restrictions:
- Control over 8-bit MIME data
- Whether special or illegal characters are accepted in addresses (e.g., CR/LF fixes)
- Optional Message Modifiers:
- Disclaimers can be added to the top or bottom of messages
- Bounce Profiles control retry behavior for failed deliveries
- Timeouts allow administrators to limit SMTP session duration and drop stuck connections
ESA Listeners as the First Line of Control
Listeners on Cisco ESA serve as the gatekeepers of the email security pipeline. Before a single byte of message content is analyzed, ESA listeners determine whether the session is valid, the senders are trusted, and the recipient exists. By centralizing control of HAT, RAT, LDAP, and transformation policies within each listener, administrators can tightly segment and secure how email is received across different IP interfaces and network zones.
Host Access Table (HAT), Sender Reputation, and Connection Actions
Before the Cisco ESA even presents an SMTP greeting banner, it performs several critical checks using the Host Access Table (HAT) and Reputation Filters. These determine how a connection is classified and whether it should be allowed to proceed.
Initial DNS and Reputation Lookups
When a connection request is received, ESA performs:
- PTR (Reverse DNS) Lookup: Resolves the IP address of the connecting client into a fully qualified domain name.
- A (Forward DNS) Lookup: Resolves the hostname back to its IP to ensure consistency.
- SenderBase Reputation Score (SBRS) Lookup: Returns a numerical score from -10.0 (worst) to +10.0 (best), with None indicating no data. Lower scores suggest spammy behavior.
- Optional Lookups: DNS-based blacklists (DNSBL) or third-party lookup services can also be queried if configured.
These results are used to place the sender into a sender group within the HAT.
HAT Groups and Matching Logic
ESA classifies each connection based on attributes and matches them against HAT groups:
- Default groups include:
- WHITELIST: Empty by default, for trusted IPs/hosts.
- BLACKLIST: For SBRS -10.0 to -3.0.
- SUSPECTLIST: For SBRS -3.0 to -1.0.
- UNKNOWNLIST: SBRS between -1.0 and +10.0.
- ALL: Catch-all for unmatched entries.
The first match from top to bottom is used. Once a sender is placed into a group, that classification is fixed for the rest of the session.
Core HAT Actions
Every sender group in HAT has one of four possible outcomes:
- Accept
The connection is allowed, SMTP session starts, and the sender can send email. ESA applies Recipient Access Table (RAT) checks to validate recipients. - Relay
The connection is allowed, and the sender is granted permission to send to any recipient, regardless of RAT. This setting should be tightly scoped to trusted internal systems. - TCP Refuse
ESA closes the connection with a FIN packet before the SMTP handshake begins. While effective, it’s not RFC-compliant and discouraged for most production environments. - Reject
ESA accepts the TCP connection but issues an SMTP 554 response, explicitly denying further communication. The banner message is customizable and is the default response for BLOCKED senders.
SMTP Conversation and EHLO Processing
For accepted or relayed senders, ESA proceeds with the SMTP handshake and issues a 250 banner with the hostname. The client then issues EHLO, and ESA responds with supported ESMTP features.
At this point, if throttling is configured for the SUSPECTLIST or THROTTLED groups, ESA begins enforcing connection and message limits to mitigate abuse.
Throttling and Rate Limiting Controls
ESA implements throttling and mail flow restrictions via the HAT and Mail Flow Policies. Administrators can:
- Limit recipients per hour, per IP or envelope sender.
- Enforce caps using specific SMTP response codes (e.g., 452 for temp failures).
- Configure Directory Harvest Attack Prevention (DHAP) with thresholds for invalid recipients per IP per hour.
If thresholds are exceeded, ESA may:
- Drop connections
- Apply policy-based delays
- Respond with customized SMTP codes
This functionality helps slow down or block bulk spam senders and harvesting attempts.
Additional Envelope Checks and Authentication
Cisco ESA also performs several envelope and DNS validation steps:
- Envelope DNS Verification: Ensures the domain in the MAIL FROM address has a valid DNS A or MX record.
- SPF Authentication: If configured, ESA checks Sender Policy Framework records for the sending domain during SMTP dialogue. Failures can result in rejections or reduced SBRS scoring.
- Recipient Access Table (RAT) and LDAP Checks:
Every recipient listed in an SMTP RCPT TO command is validated against:- Static entries in the RAT
- LDAP queries (if configured)
All accepted domains must be explicitly listed in the RAT, even if LDAP validation is used; otherwise, ESA will not accept mail for them.
Granular Filtering Begins Before the Message is Sent
The Host Access Table is ESA’s first line of defense, using DNS, SBRS, and policy rules to classify senders before any data is received. Once a connection is accepted, ESA continues to scrutinize the conversation using envelope checks, recipient validation, and sender authentication, all while enforcing tight throttling rules where needed.
This multi-layered approach ensures that suspicious or noncompliant senders are filtered long before a malicious payload has the chance to arrive.
Understanding Cisco ESA: RAT Tables, Recipient Rewrites, LDAP Queries, and the Work Queue
One of the critical components in Cisco ESA’s mail flow policy enforcement is the Recipient Access Table (RAT). RAT entries allow the ESA to determine whether a recipient is accepted based on different formats: hostnames, IP address literals, full email addresses, or even username portions like postmaster@. For example, wildcarding all subdomains of a domain requires two entries—one for the base domain and another for subdomains. This flexibility supports precise routing and rejection controls.
Each RAT entry supports several options: accepting or rejecting the recipient, bypassing LDAP validation, specifying custom SMTP responses, or ignoring recipient-based rate limits. These options provide granular control over how mail is processed. Beyond this, recipient transformation features such as default domain assignment, domain maps (for transforming the domain portion of email addresses), and aliases (used for one-to-one, one-to-many, or many-to-one mappings) further refine how emails are routed internally. Aliases are also configurable via LDAP using the LDAP Routing feature.
Masquerading complements recipient rewrites by altering sender address visibility. It’s especially useful for hiding internal structure or branding outgoing mail. LDAP Accept checks can be tied to specific listeners and define where in the pipeline the action takes place—typically during the SMTP conversation. This helps ensure only valid recipients make it through to delivery.
LDAP Routing and LDAP Masquerading are similar, except that queries are done dynamically instead of relying on static tables. Even if a query fails, the message proceeds unchanged, which prevents blocking due to temporary lookup issues. LDAP groups can also be used to map users based on any attribute like department, location, or privilege. This enables differentiated filtering or policy enforcement across organizational boundaries.
Once a message is accepted by the ESA, it enters the work queue, where it passes through a series of engines: Message Filters, Anti-Spam, Anti-Virus, Content Filters, Virus Outbreak Filters, and Data Loss Prevention. Each stage processes the message based on customizable policies defined through the Incoming or Outgoing Mail Policy framework. These policies classify messages and dictate how each stage should handle them.
A powerful feature called Message Splintering allows the ESA to break apart messages with multiple recipients if those recipients match different policy rules. This results in each message fragment being processed separately through the relevant policy pipeline.
The Message Filters module, configured through the CLI, provides advanced logic using regular expression rules to control message flow. Filters can reroute messages based on sender or subject, bypass antivirus scanning, enforce S/MIME validation, or manipulate headers. This enables fine-tuned filtering and conditional processing.
The Recipient Access Table (RAT) is a critical component in Cisco Email Security Appliance (ESA) configurations, determining which recipient addresses are permitted through the pipeline. RAT entries can be defined using a variety of formats, including hostnames or domain names, IP address literals, full email addresses, and even username portions. For example, a domain entry like domain.com will accept all users at that domain, while an entry like postmaster@ will accept mail for that username at any domain. If complete wildcarding across a domain and its subdomains is required, you must explicitly list both the root domain and its subdomain variant (e.g., domain.com and .domain.com).
Each RAT entry comes with a set of configurable actions and options. The basic directive is either to accept or reject the message—by default, RAT rejects unless told otherwise. Additional options include bypassing LDAP validation (handy if you want ESA to accept an address regardless of directory lookup), assigning custom SMTP responses for rejections or acceptances, and overriding standard rate-limiting behavior with the “Bypass Receiving Control” setting.
In addition to these entry controls, the ESA offers various transformation features for recipient addresses. The Default Domain option on a listener is used when incoming recipient addresses don’t include a fully qualified domain name (FQDN); the system appends a domain automatically. The Domain Map allows one-to-one transformations of recipient domains, useful when migrating domains or consolidating address spaces. Notably, domain mapping takes precedence early in the message pipeline, even before the RAT is consulted, so only the mapped domain needs a corresponding RAT entry. This is especially useful in setups where addresses like left.com are rewritten to right.com, allowing the RAT to focus only on the right.com addresses.
Alias configurations also enhance flexibility. These are managed globally through the CLI with the aliasconfig command and can implement one-to-one, one-to-many (e.g., distribution lists), or many-to-one mappings. For instance, a single alias can forward mail to multiple recipients or consolidate several addresses into one.
Masquerading complements aliasing by rewriting outbound addresses. This feature is often used to hide internal user structures or departments behind standardized email addresses. Masquerading changes can affect the envelope sender, visible headers (To, From, CC, Reply-To), and more. These rewrites are managed per listener and can be applied statically or via LDAP queries.
LDAP Accept queries, when added to a listener, give admins the flexibility to choose whether a message must pass the LDAP check during the SMTP conversation. If a recipient fails validation at this point, ESA can either bounce the message or silently drop it. However, when using the work queue, ESA can queue these messages during LDAP outages and process them once connectivity is restored.
Finally, LDAP routing and masquerading can be extended beyond static mappings. In these cases, ESA retrieves recipient data via live LDAP queries, allowing more dynamic handling. LDAP groups can be used to apply message policies based on user attributes, such as department or privilege level. This enables precise segmentation and differentiated security filtering for various internal groups, improving the efficacy and targeting of ESA’s anti-spam and content filtering engines.
In Cisco Email Security Appliance (ESA), the Recipient Access Table (RAT) plays a critical role in determining which messages are allowed into the system. Entries in the RAT can be configured using various formats such as a hostname or domain name, IP address literal, full email address, or the username portion only (e.g., postmaster@). These configurations dictate which users and domains are permitted, and are essential for customizing and securing email acceptance rules.
Each RAT entry supports several options. The primary action is either to accept or reject the recipient, with the default being reject. Administrators can bypass LDAP checks for certain recipients, define custom SMTP responses for accepted or rejected addresses, and enable bypasses for receiving controls to override rate limits.
Recipient transformations provide additional flexibility in how ESA handles email addresses. A default domain setting allows addresses without a fully qualified domain name (FQDN) to be mapped appropriately. The domain map table can map domains early in the pipeline, even before the RAT is consulted—this is especially powerful when consolidating domains. Aliases allow one-to-one, one-to-many, and many-to-one mappings, which are useful for distribution lists and aliasing old addresses to new ones. Importantly, domain maps can include fully qualified email addresses, offering precise control and reducing administrative overhead.
LDAP integration further enhances ESA’s flexibility. Aliases and recipient routing can be managed dynamically through LDAP routing. Masquerading complements recipient rewrites by transforming sender addresses, often to anonymize or standardize the sender’s identity. This transformation applies to envelope and visible headers like To, From, CC, and Reply-To, and is only performed on outgoing mail. Each listener has a static masquerade table that specifies which headers should be rewritten.
LDAP Accept queries provide a mechanism for validating recipients during the SMTP conversation. Administrators can decide where in the message pipeline these checks should occur. If validation fails during the SMTP phase, ESA has two options: bounce the message with a reply or silently drop it. Work queues offer resilience by allowing ESA to queue messages if LDAP services become temporarily unavailable.
LDAP routing and masquerading operate similarly, but without halting message flow if a lookup fails. Instead, the message continues without any transformation. Group-based LDAP queries allow ESA to evaluate whether a sender or recipient belongs to a specific group using attributes like department, physical location, or access level. These group results feed into the ESA’s filtering and policy engines, enabling granular policy enforcement based on organizational context.
The heart of ESA’s processing is the work queue, where all filtering and scanning operations occur. This includes engines for spam filtering, antivirus scanning, content filtering, virus outbreak detection, data loss prevention (DLP), and envelope encryption. These engines are triggered based on incoming and outgoing mail policies configured through the web user interface (WUI). These policies determine the action and path of each message based on sender, recipient, domain, or LDAP group.
An important feature in this phase is message splintering. When a message has multiple recipients matching different policies, ESA breaks it into separate message flows so each recipient’s policy can be enforced independently.
Message filters offer a powerful, script-like environment accessible through CLI for creating custom processing rules. These filters allow actions such as rerouting messages, bypassing anti-spam or antivirus engines, verifying S/MIME signatures, and manipulating headers. They serve as a flexible complement to the GUI-configured content filters, giving administrators full control over message handling at every step of the processing pipeline.
Once a message is accepted into the ESA, it enters the work queue, which is the central hub for all processing on the appliance. This is where most of the heavy lifting occurs, including applying custom filters, performing security scans, and enforcing organizational policies. Filtering logic is structured around the Incoming and Outgoing Mail Policies, which determine the nature of the message—whether it’s incoming or relayed. This classification is based on how the connection behaved during the Host Access Table (HAT) evaluation. Each policy can be tailored to match specific sender or recipient addresses (including domains and subdomains), or LDAP groups. After classifying a message, administrators can apply specific settings to each stage of the work queue.
A unique feature of ESA is Message Splintering, which ensures each recipient gets a version of the message tailored to their applicable policy. For example, if a message is sent to two users governed by different policies, ESA splits the message and processes each copy according to its respective pipeline. This guarantees accurate enforcement of all configured rules.
The first module in the queue is the Message Filters engine. Operating in a script-like CLI interface, this engine allows administrators to define custom rules using regular expressions and logic. It’s particularly useful for rerouting messages based on metadata such as sender, recipient, subject, or size. Filters can also be used to bypass spam or antivirus scanning, apply advanced conditions like verifying S/MIME signatures, or to manipulate headers. Unlike content filters, message filters provide granular CLI-level control.
Next in the processing chain is the Anti-Spam Engine, powered by the Context-Adaptive Scanning Engine (CASE). CASE deconstructs each message into components—headers, bodies, and attachments—and evaluates them against dynamic spam rules. Once evaluated, the engine applies one of several actions:
- Drop: Immediately discards the message; processing ends here.
- Deliver: Sends the message onward through the queue for antivirus scanning, possibly with modifications.
- Spam Quarantine: Flags the message for quarantine while continuing through the work queue.
- Bounce: Drops the message and sends a bounce notice to the original sender—though generally discouraged for spam to avoid backscatter.
Following spam filtering, Antivirus Engines take over. These engines operate in isolated processes to ensure stability and performance. Like spam processing, antivirus scanning offers multiple handling actions:
- Drop: Message is discarded without further processing.
- Deliver: Message continues through the queue as-is.
- Deliver with Modification: Strips malicious attachments while delivering the rest of the content.
- Quarantine: Holds the message in the virus quarantine configured on the appliance.
Both the spam and antivirus engines support message archiving prior to discarding, useful for compliance or forensic investigations.
Content Filtering Policies
At the heart of ESA’s policy engine is Content Filtering, which allows administrators to define custom rules that analyze virtually any part of an email message—its attachments, headers, sender, recipient, or body. Filters can quarantine or drop attachments based on type, strip them while allowing the rest of the message through, or append disclaimers for legal or compliance purposes.
More advanced applications include rerouting specific messages based on header or attribute values, integrating external systems (e.g., DLP platforms), and filtering for sensitive content like Social Security or credit card numbers. These filters are created globally but applied selectively on a per-policy basis, enabling flexible customization across departments or user groups.
Virus Outbreak Filters (VOF)
VOF is ESA’s defense mechanism for detecting mass-distributed threats before antivirus signatures are updated. When an outbreak rule is triggered, it evaluates the message or attachment against a severity rating from 1 to 5. A higher score reflects greater certainty and threat level. The only action VOF takes is quarantining messages.
There are three key controls for VOF:
- A global severity threshold (default is 3) to trigger quarantines.
- A per-policy exclusion list for attachment types.
- Adaptive rules, which leverage local message history to refine VOF behavior on the appliance.
Data Loss Prevention (DLP) and Encryption
Data Loss Prevention is only available for outbound messages. Its role is to detect sensitive information—such as financial data or confidential files—being sent from internal users to external destinations. The ESA extracts text from message bodies and attachments, evaluating them against built-in or custom DLP policies. Violations are ranked by severity from 0 to 100 and categorized as Low, Medium, High, or Critical.
When triggered, DLP can take one or more of the following actions:
- Deliver: Send the message with optional modifications.
- Deliver with Encryption: Use TLS or Cisco’s Envelope Encryption (via IronPort) to protect sensitive content.
- Quarantine: Hold the message in ESA’s quarantine system for administrative review.
- Drop: Permanently discard the message without delivery.
Additional responses include sending copies to a designated address or triggering violation alerts. The Envelope Encryption engine, typically used by DLP and content filters, encrypts emails before delivery. Recipients authenticate through the Cisco Registered Email Service (CRES) to access secured messages.
These layers of filtering and protection make Cisco ESA a robust solution for organizations needing precise control over email security, compliance enforcement, and data protection. Whether you’re building out filters for routine compliance or deploying advanced DLP with encryption, ESA provides the hooks and policy logic to customize every stage of the mail pipeline.
Message Delivery Stages
Once a message clears previous inspection stages without being dropped or bounced, it enters the delivery phase. The ESA follows a defined delivery pipeline consisting of:
- Virtual Gateways
- Destination Controls
- Global Unsubscribe
- SMTP Routes
- Final Disposition: Delivered, Dropped, or Bounced
Destination Controls
The Destination Controls table sets the pace and volume for message delivery to remote domains. While it doesn’t impose strict delivery limits by default, ESA uses a “good neighbor” algorithm—starting with a single connection and opening more only as volume warrants. This conservative connection strategy helps prevent overloading external systems and enhances deliverability.
Global Unsubscribe
Global Unsubscribe is a rarely used but powerful table that halts all delivery attempts to specified recipients or domains. Accessible only via CLI using the unsubscribe command, this feature offers two actions—drop or bounce. When configured, it takes immediate effect and guarantees the ESA won’t deliver mail to any listed entry, regardless of other policies.
SMTP Routes
SMTP route configuration is essential to guiding emails to their final destinations. These routes are defined globally and can be edited via CLI or WUI. Each entry in the SMTP route table must be a full domain or subdomain (not individual recipients), and several destination types are supported:
- Domain Name – Performs an MX record lookup followed by an A record lookup if MX fails.
- Hostname – Behaves like a domain, useful for local mail. MX lookup precedes A record lookup.
- [Brackets] – Skips MX lookup; uses A record only.
- IP Address – No DNS lookup; directly delivers to the specified IP.
- Special Destination: USEDNS – Forces ESA to revert to DNS-based delivery for exceptions to wildcard entries.
- Special Destination: /dev/null – Drops mail post-scanning but before delivery—intended only for testing or non-production use.
A default route is also available to catch unmatched destinations. If no SMTP route exists for a domain, ESA will perform normal DNS lookups (MX, then A record). If both fail, the message is bounced. Each SMTP route may list multiple destinations for load balancing or failover. Priority values allow fine-tuning, with lower numbers having higher delivery priority. Equal-priority entries are load-balanced, while lower-priority entries are used only if higher ones are unavailable.
If delivery requires authentication, administrators must configure SMTP Auth profiles and associate them with the appropriate SMTP route entries.
Bounce Profiles
Bounce profiles aren’t a pipeline stage per se, but they influence how ESA responds when a message cannot be delivered. These profiles define retry behavior, how many times and how frequently to attempt redelivery before giving up, and what actions to take when a message is deemed undeliverable.
Bounce profiles also determine whether a delivery status notification (DSN) or a bounce message is generated and who receives it (typically the envelope sender).
Bounce Profile Assignment
Bounce profiles can be assigned in three areas:
- Listeners – Each listener assigns a bounce profile as the message is accepted.
- Message Filters – Filters can assign bounce profiles through bounce-profile actions.
- Destination Controls – Bounce profiles may be applied to specific domains for granular control.
Managing Delivery Failures
Bounce profiles are configured via the WUI’s Bounce Profiles section or the CLI command bounceconfig. Key settings include:
- Max number of retries
- Max message queue duration
- Actions upon exceeding limits
A “no bounce” profile can also be created for automation systems that don’t require delivery failure notifications.
Note that retry behavior for unreachable hosts is handled globally, not per profile.
Final Disposition
All messages in the ESA pipeline conclude in one of three final states:
- Delivered – Successfully sent to the recipient or target mail server.
- Dropped – Silently discarded without attempting delivery, often due to policy or unsubscribe rules.
- Bounced – Rejected with a bounce message sent to the sender, indicating a delivery failure.
These states reflect the ultimate fate of each message and serve as essential indicators in message tracking and troubleshooting workflows.
ESA Packet Flow Overview
The flow of email through ESA depends on whether the message is incoming or outgoing—each direction follows a different path and engages different policy mechanisms. These flows help determine how emails are evaluated for threats, filtered, or flagged before reaching their destination.
Incoming Email Flow
When an incoming email arrives at the ESA from an external SMTP server, it passes through a sequence of filters:
- Reputation Filters – The first checkpoint in the flow, the ESA assesses the SenderBase Reputation Score (SBRS), which ranges from -10 to +10. This helps the appliance judge the trustworthiness of the sending server.
- Message Filters – Here, the ESA enforces custom policies that may inspect headers, body content, or metadata for further filtering and control.
- Antispam Engine – Messages are analyzed for spam content using advanced heuristics and known spam signatures.
- Antivirus Scan – Messages are scanned for malware or embedded threats. This step is crucial for inbound protection.
- Content Filters – These apply specific policies such as keyword matching or attachment inspection. Though off by default, they can be enabled as needed.
- Outbreak Filters – These are specialized filters that detect and block emerging threats based on outbreak heuristics and telemetry.
By default, almost all these stages are enabled for inbound mail, offering strong protection against a wide range of threats.
Outgoing Email Flow
For emails leaving the internal network through ESA, a similar but slightly altered path is followed:
- Reputation Filters – Generally disabled by default for outbound traffic.
- Message Filters – Enabled by default, used to enforce organizational policies on outgoing mail.
- Antispam Engine – Off by default, though it can be turned on if there’s concern about internal sources being compromised.
- Antivirus – Enabled by default, ensuring outbound emails don’t spread malware.
- Content Filters – Typically off, but useful for DLP and keyword filtering.
- Outbreak Filters – Disabled by default, but available if needed.
- DLP Engine – On by default, but requires configuration to be effective. Just being “on” doesn’t mean any actual data loss prevention is enforced unless policies are defined.
This layered approach for outgoing mail allows organizations to prevent sensitive data leaks and avoid becoming a source of malware distribution.
HAT and RAT Listeners
To manage email flow directionality, ESA uses Listeners, which operate on one or more ports. There are two primary listener types:
- HAT (Host Access Table) – Handles inbound email. When external SMTP servers send mail to the ESA, HAT policies control the connection and sender evaluation.
- RAT (Recipient Access Table) – Manages outbound email. It validates recipients as messages leave the internal SMTP environment.
These listeners can be configured to share a port or be distributed across separate ports, offering flexible deployment scenarios. A typical setup might place HAT and RAT on port 25 with different policy applications depending on the mail direction.