profile tls
Use this command to configure TLS profiles that can be used by policy access-control receive and policy access-control delivery.
A common use of TLS profiles is to enforce encrypted transport to a specific domain, and to authenticate the identity of the receiving servers. This provides more specific control than basic TLS support. For global settings on connections that FortiMail receives, see smtps-tls-status {enable | disable}.
Syntax
config profile tls
edit <profile_name>
set level {none | preferred | secure}
set check-ssl-version {enable | disable}
set min-ssl-version {ssl3 | tls1_0 | tls1_1 | tls1_2 | tls1_3}
set check-encryption-strength {enable | disable}
set encryption-strength <bits_int>
set check-ca-name {enable | disable}
set check-ca-type {match | substring | wildcard}
set check-cert-subject {enable | disable}
set check-cert-type {match | substring | wildcard}
set cert-subject "<subject-dn_str>"
set dane-support {mandatory | none | opportunistic}
set mtasts-status {enable | monitor | none}
end
|
Variable |
Description |
Default |
|
Enter the name of the profile. |
|
|
|
Select whether SSL/TLS is supported or required:
Effects vary by directionality and global settings. For details, see FortiMail TLS behavior in both directions of mail flow. |
none |
|
|
Select the action FortiMail performs when an SSL/TLS connection cannot be established, either:
This option does not apply if Tip: Optionally, you can configure |
tempfail |
|
|
Enter a string that matches only trusted CAs. Use forward slashes to separate each part of the Distinguished Name (DN). For example: /CN=ca.example.com/O=Example Inc. This option is only available when |
|
|
|
Enter a string that matches only accepted certificate subjects. Use forward slashes to separate each part of the Distinguished Name (DN). For example: /CN=mail.example.com/O=Example Inc. This option is only available when |
|
|
|
Enable to perform the action in Each certificate's signature is validated with the list of trusted CA certificates (for information on installing CA certificates, see the FortiMail Administration Guide.), so this additional CA setting effectively filters which trusted CAs can be used by specific sessions. This option is only available when |
disable |
|
|
Select how to compare this setting with the peer certificate's
This option is only available when |
match |
|
|
Enable to perform the action in This option is only available when |
disable |
|
|
Select how to compare this setting with the peer certificate's
This option is only available when |
match |
|
|
Enable to perform the action in This option is only available when |
disable |
|
|
Enable to perform the action in This option is only available when |
disable |
|
|
Select the DNS-based Authentication of Named Entities (DANE) support level:
See also RFC 7929. |
none |
|
|
Enter the bit size of the encryption key. Greater key size results in stronger encryption, but requires more processing resources. This setting takes effect only if |
256 |
|
|
Select the required minimum secure connection protocol and version, either:
This option is only available when |
tls1_1 |
|
|
Select the MTA Strict Transport Security (MTA-STS) domain verification level. This setting applies only when smtp-mtasts-status {check-all-domain | check-external-domain | disable} is not |
none |