profile access-control
Use this command to configure access control profiles. These profiles have settings like policy access-control delivery and policy access-control receive, but can be used via session profiles instead.
This feature is available if you have the advanced MTA feature license, and have enabled the feature in mta-adv-ctrl-status {enable | disable}.
Syntax
config profile access-control
edit <profile_name>
[set comment "<comment_str>"]
config access-control
edit <policy_name>
set action {discard | receive | reject | relay | safe | safe-relay}
set authenticated {any | authenticated | not-authenticated}
set recipient-pattern-type {default | external | group | internal | ldap | ldap-query | regexp}
set recipient-pattern <recipient_pattern>
set recipient-pattern-group <group_name>
set recipient-pattern-ldap-profile <profile_name>
set recipient-pattern-group <group_name>
set reverse-dns-pattern <mta-fqdn_pattern>
set reverse-dns-pattern-regexp {yes | no}
set sender-ip-type {geoip-group | ip-group | ip-mask}
set sender-ip-mask <sender_ipv4/mask>
set sender-pattern-type {default | external | group | internal | ldap | ldap-query | regexp}
set sender-pattern <sender_pattern>
set sender-pattern-group <group_name>
set sender-pattern-ldap-groupname <group_name>
set sender-pattern-ldap-profile <profile_name>
set tls-profile <profile_name>
end
end
Variable |
Description |
Default |
Enter the name that identifies the profile. |
|
|
Enter a description or comment. |
|
|
Enter the number that identifies the policy. Note: The identifier number may be different from the order of evaluation. FortiMail units evaluate these policies in sequential order, starting at the top of the list. Only the first matching policy is applied. For example, if you enter: move 15 before 1 then policy 15 is evaluated for a match before policy 1. To show the order of evaluation for the list of policies, enter: get |
|
|
action {discard | receive | reject | relay | safe | safe-relay} |
Select which action the FortiMail unit will perform for SMTP sessions that match this policy:
|
reject |
Select whether to match this policy based upon whether SMTP clients have authenticated with the FortiMail unit, either: |
any |
|
Enter an email address or pattern. Formatting is the same as sender-pattern <sender_pattern>. This setting is available only when recipient-pattern-type {default | external | group | internal | ldap | ldap-query | regexp} is |
* |
|
Enter the group of recipient email addresses. This setting is available only if recipient-pattern-type {default | external | group | internal | ldap | ldap-query | regexp} is |
|
|
Enter the group of recipient email addresses that is in the directory server. This setting is available only if recipient-pattern-type {default | external | group | internal | ldap | ldap-query | regexp} is |
|
|
Enter an LDAP profile. This setting is available only if recipient-pattern-type {default | external | group | internal | ldap | ldap-query | regexp} is Note: Use |
|
|
recipient-pattern-type {default | external | group | internal | ldap | ldap-query | regexp} |
Select how you will define the recipient email addresses that match the policy. Options are the same as sender-pattern-type {default | external | group | internal | ldap | ldap-query | regexp}. |
default |
To define which SMTP clients match this policy, depending on reverse-dns-pattern-regexp {yes | no}, enter either a:
Because the domain name in the SMTP session greeting ( Note: The domain name must be a valid top level domain (TLD). For example, “.lab” is not valid because it is reserved for testing on private networks, not the Internet, and thus a reverse DNS query to DNS servers on the Internet will always fail. |
* |
|
Select |
no |
|
Select a geographic IP address group. This setting is only available if sender-ip-type {geoip-group | ip-group | ip-mask} is |
|
|
Enter the IP group of the SMTP client attempting to send the email message. This setting is only available if sender-ip-type {geoip-group | ip-group | ip-mask} is |
|
|
Enter the IP address and netmask of the SMTP client. For example, you can enter Similarly, if you enter To match any address, enter This setting is only available if sender-ip-type {geoip-group | ip-group | ip-mask} is |
0.0.0.0/0 |
|
Select how you will define the source IP address of SMTP clients that match this policy, either:
|
ip-mask |
|
Select a service name. The Internet Service Database (ISDB) from FortiGuard is an automatically updated list of IP addresses and subnets used by popular services such as 8x8, Akamai, Microsoft 365, and more. To display the list of options for currently known services, enter: set sender-isdb ? This setting is only available if sender-ip-type {geoip-group | ip-group | ip-mask} is |
8x8 |
|
Depending on your selection in sender-pattern-type {default | external | group | internal | ldap | ldap-query | regexp}:
This setting is only available if sender-pattern-type {default | external | group | internal | ldap | ldap-query | regexp} is |
* |
|
Enter the group of recipient email addresses. This setting is available only if sender-pattern-type {default | external | group | internal | ldap | ldap-query | regexp} is |
|
|
Enter the group of recipient email addresses that is in the directory server. This setting is available only if sender-pattern-type {default | external | group | internal | ldap | ldap-query | regexp} is Note: Use |
|
|
Enter an LDAP profile. This setting is available only if sender-pattern-type {default | external | group | internal | ldap | ldap-query | regexp} is |
|
|
sender-pattern-type {default | external | group | internal | ldap | ldap-query | regexp} |
Select how you will define the sender email addresses that match the policy, either:
|
default |
Enable or disable the policy. |
enable |
|
If you want to allow or reject the connection based on whether the session attributes matches TLS profile, then select the TLS profile.
|
|