policy ip
Use this command to create policies that apply profiles to SMTP connections based upon the IP addresses of SMTP clients and/or servers.
Syntax
config policy ip
edit <rule_name>
[set comment "<comment_str>"]
set exclusive {enable | disable}
set action {proxy-bypass | reject | scan | temp-fail}
set source-type {geoip-group | ip-address | ip-group | isdb}
set source-ip <client_ipv4mask>
set source-geoip-group <group_name>
set source-ip-group <group_name>
set reverse-dns-pattern-regexp {no | yes}
set reverse-dns-pattern <source_pattern>
set destination-type {ip-address | ip-group}
set destination-ip <smtp-server_ipv4mask>
set destination-ip-group <group_name>
set profile-antispam <profile_name>
set profile-antivirus <profile_name>
set profile-content <profile_name>
set profile-dlp <profile_name>
set profile-ip-pool <profile_name>
set profile-session <profile_name>
set profile-auth-type {imap | ldap | none | pop3 | radius | smtp}
set profile-auth-imap <profile_name>
set profile-auth-ldap <profile_name>
set profile-auth-pop3 <profile_name>
set profile-auth-radius <profile_name>
set profile-auth-smtp <profile_name>
set use-for-smtp-auth {enable | disable}
set smtp-diff-identity {enable | disable}
set smtp-diff-identity-ldap {enable | disable}
set smtp-diff-identity-ldap-profile <profile_name>
end
|
Variable |
Description |
Default |
|
Enter the number that identifies the rule. Note: The identifier number may be different from the order of evaluation. FortiMail units evaluate policies in sequential order, starting at the top of the list. Only the first matching rule is applied. For example, if you enter: move 15 before 1 then rule 15 is evaluated for a match before rule 1. To show the order of evaluation for the list of rules, enter: config policy ip get |
|
|
|
Enter an action for this policy:
|
scan |
|
|
Enter the name of the IP group of the SMTP servers. This option is only available when the destination-type {ip-address | ip-group} is |
|
|
|
Enter the IP address and subnet mask of the SMTP server. To match all servers, enter This option applies only for FortiMail units operating in transparent mode. For other modes, the FortiMail unit receives the SMTP connection, and therefore acts as the server. |
0.0.0.0 0.0.0.0 |
|
|
Select how you will define the destination IP address of the SMTP servers whose connections will match this policy. Also configure destination-ip <smtp-server_ipv4mask>, destination-ip-group <group_name>. |
ip-address |
|
|
Select a service name. The Internet Service Database (ISDB) is an automatically updated list of IP addresses and subnets used by popular services such as 8x8, Akamai, Microsoft 365, and more. To display the list of options for currently known services, enter: set sender-isdb ? This setting is only available if source-type {geoip-group | ip-address | ip-group | isdb} is |
|
|
|
Enter the geographic IP group of the SMTP clients. This setting is only available if source-type {geoip-group | ip-address | ip-group | isdb} is |
|
|
|
Enter the IP group of the SMTP clients. This setting is only available if source-type {geoip-group | ip-address | ip-group | isdb} is |
|
|
|
Enter the IP address and subnet mask of the SMTP client. To match all clients, enter |
192.168.224.15 255.255.255.255 |
|
|
Select how you will define the source IP address of the SMTP clients whose connections will match this policy. Then configure the related setting such as source-isdb {8x8 ...}. |
ip-address |
|
|
Enter a description or comment. |
|
|
|
Enable to omit evaluation of matches with recipient-based policies, causing the FortiMail unit to disregard applicable recipient-based policies and apply only the IP-based policy. Disable to apply both the matching recipient-based policy and IP-based policy. Any profiles selected in the recipient-based policy will override those selected in the IP-based policy. |
disable |
|
|
Enter the name of an outgoing antispam profile, if any, that this policy will apply. |
|
|
|
Enter the name of an antivirus profile, if any, that this policy will apply. |
|
|
|
Enter the name of an IMAP authentication profile. This setting applies if profile-auth-type {imap | ldap | none | pop3 | radius | smtp} is |
|
|
|
Enter the name of an LDAP authentication profile. This setting applies if profile-auth-type {imap | ldap | none | pop3 | radius | smtp} is |
|
|
|
Enter the name of a POP3 authentication profile. This setting applies if profile-auth-type {imap | ldap | none | pop3 | radius | smtp} is |
|
|
|
Enter the name of a RADIUS authentication profile. This setting applies if profile-auth-type {imap | ldap | none | pop3 | radius | smtp} is |
|
|
|
Enter the name of an SMTP authentication profile. This setting applies if profile-auth-type {imap | ldap | none | pop3 | radius | smtp} is |
|
|
|
profile-auth-type {imap | ldap | none | pop3 | radius | smtp} |
Select the type of the authentication profile that this policy will apply, or select |
none |
|
Enter the name of the content profile that you want to apply to connections matching the policy. |
|
|
|
Enter the name of the DLP profile that you want to apply to connections matching this policy. |
|
|
|
Enter the name of the IP pool profile that you want to apply to connections matching the policy. |
|
|
|
Enter the name of the session profile that you want to apply to connections matching the policy. |
|
|
|
To define which SMTP clients match this policy, depending on reverse-dns-pattern-regexp {no | yes}, enter either a:
Because the domain name in the SMTP session greeting ( Note: The domain name must be a valid top level domain (TLD). For example, |
* |
|
|
Select whether the pattern that you enter in reverse-dns-pattern <source_pattern> will be interpreted as a regular expression. |
no |
|
|
Enable to allow the SMTP client to send email using a different sender email address ( Disable to require that the sender email address in the SMTP envelope match the authenticated user name. |
disable |
|
|
Enable or disable whether to verify the sender's identity with LDAP authentication. |
disable |
|
|
Enter the name of the LDAP profile to use for SMTP sender identity verification. This setting is only available if smtp-diff-identity-ldap {enable | disable} is |
disable |
|
|
Enable or disable the policy. |
enable |
|
|
Enable to authenticate SMTP connections using the authentication profile configured in sensitive-data {...}. |
disable |