Fortinet Document Library

Version:


Table of Contents

Cookbook

6.4.0
Download PDF
Copy Link

Configuring access controls

  1. Go to Policy > Access Control > Receiving and click New, or edit an existing access control rule.
  2. Click Enabled.
  3. Set Sender pattern to User Defined, and enter the user's email address in the field below.
  4. Note that it may be preferable to enter the IP address instead of the email address, as it will still allow the user to send and receive emails using their email address from a different machine that is not infected.

  5. In this case, set Sender IP/netmask to User Defined also, and enter the user's IP address and netmask.

  6. Set Action to Reject, and click Create.

Configuring access controls

  1. Go to Policy > Access Control > Receiving and click New, or edit an existing access control rule.
  2. Click Enabled.
  3. Set Sender pattern to User Defined, and enter the user's email address in the field below.
  4. Note that it may be preferable to enter the IP address instead of the email address, as it will still allow the user to send and receive emails using their email address from a different machine that is not infected.

  5. In this case, set Sender IP/netmask to User Defined also, and enter the user's IP address and netmask.

  6. Set Action to Reject, and click Create.