Configuring Aliases - Symantec 10490452 - Mail Security 8220 Administration Manual

Administration guide
Table of Contents

Advertisement

Configuring aliases

To import a list of masqueraded entries
1
In the Control Center, click Settings > Address Masquerading.
2
Click Import.
3
On the Import Masqueraded Entry page, enter or browse to the filename
containing the list of masqueraded entries.
4
Click Import.
Note: If entries in the import file are not specified correctly, do not match
the required file format, or are duplicates, a message is displayed. You can
click a link to download a file containing the unprocessed entries. Click
Cancel to return to the main Address Masquerading page to review the valid
imported entries.
An alias is an email address that translates to one or more other email
addresses. Windows users may understand this concept as a "distribution list."
You can add an alias as a convenient shortcut for typing a long list of recipients.
An alias can also translate addresses from one top-level domain to another, such
as from example.com to example-internetsecurity.com. Email addressed to
kyi@example.com, for example, would be delivered to kyi@example-
internetsecurity.com.
Note: The alias functionality available on the Settings > Aliases page is separate
from LDAP aliases.
Note the following additional information about aliases:
Aliases are recursive. This means that an alias specified in the destination
email address list is expanded as defined in the list of aliases. For example,
with the aliases specified in
it@example.com would be delivered to the destination addresses for both
it@example.com and ops@example.com, because it@example.com includes
ops@example.com.
Table 3-1
Example of recursive aliases
Alias
Destination addresses
it@example.com
alro@example.com, oak@example.com, ops@example.com
ops@example.com
tla@example.com, bmi@example.com, map@example.com
Table
3-1, a message addressed to
Configuring email settings
Configuring aliases
47

Advertisement

Table of Contents
loading

This manual is also suitable for:

Mail security

Table of Contents