system interface
Use this command to configure allowed and denied administrative access protocols, maximum transportation unit (MTU) size, SMTP proxy, and up or down administrative status for the network interfaces of a FortiMail unit.
Proxy and built-in MTA behaviors are configured separately based upon whether the SMTP connection is considered to be incoming or outgoing. Because a network connection considers the network layer rather than the application layer when deciding whether to intercept a connection, the concept of incoming and outgoing connections is based upon slightly different things than that of incoming and outgoing email messages: directionality is determined by IP addresses of connecting clients and servers, rather than the email addresses of recipients.
-
Incoming connections
Destined for the SMTP servers that are protected domains of the FortiMail unit. For example, if the FortiMail unit is configured to protect the SMTP server whose IP address is 10.1.1.1, the FortiMail unit treats all SMTP connections destined for 10.1.1.1 as incoming. For information about configuring protected domains, see domain.
-
Outgoing connections
Destined for SMTP servers that the FortiMail unit has not been configured to protect. For example, if the FortiMail unit is not configured to protect the SMTP server whose IP address is 192.168.1.1, all SMTP connections destined for 192.168.1.1 will be treated as outgoing, regardless of their origin.
Syntax
config system interface
edit {<physical_interface_name> | <logical_interface_name> | loopback}
set speed {auto | 10full | 10half | 100full | 100half | 1000full}
set mtu <mtu_int>
set redundant-link-monitor {mii-link | arp-link}
set redundant-arp-ip <destination_ipv4>
set redundant-member <member-interface_name>
set connection {enable | disable}
set defaultgw {enable disable}
set bridge-member {enable | disable}
set allowaccess {ping http https snmp ssh telnet}
set webaccess {enable | disable}
set mailaccess {imap | imaps | pop3 | pop3s | smtp | smtps}
set proxy-smtp-in-mode {pass‑through | drop | proxy}
set proxy-smtp-local status {enable | disable}
set proxy-smtp-out-mode {pass‑through | drop | proxy}
end
|
Variable |
Description |
Default |
||||
|
Enter a name for the VLAN or redundant interface. Then set the interface type. |
|
|||||
|
Enter the name of the physical network interface, such as port1. |
|
|||||
|
Enter one or more of the following protocols to add them to the list of protocols permitted to administratively access the FortiMail unit through this network interface:
For related settings such as listening port numbers for each service, see also system global. To control SMTP access, configure access control rules and session profiles. For details, see cloud-api profile antivirus and profile session. |
Varies by network interface. |
|||||
|
Enable to bridge the port to the management IP. For more information about bridging networks in transparent mode, see the FortiMail Administration Guide. Bridging is the default configuration for network interfaces when the FortiMail unit operates in transparent mode, and the FortiMail unit will bridge all connections occurring through it from the network to the protected email servers. In cases where the email servers that are protected by the FortiMail unit are located on different subnets, you must connect those email servers through separate physical ports on the FortiMail unit, and configure the network interfaces associated with those ports, assigning IP addresses and removing them from the bridge. This command is only available |
enable |
|||||
|
Enable for the FortiMail unit to attempt to obtain DHCP addressing information from the DHCP server. Disable this option if you are configuring the network interface offline, and do not want the unit to attempt to obtain addressing information at this time. This command is only available when mode {static | dhcp} is |
disable |
|||||
|
Enable to retrieve both the default gateway and DNS addresses from the DHCP server, replacing any manually configured values. This command is only available when mode {static | dhcp} is |
disable |
|||||
|
Enter the IP address and netmask of the network interface. If the FortiMail unit is in transparent mode, interface may alternatively not have an IP address, and instead indicate that it is bridging. This means that the network interface is acting as a Layer 2 bridge. If high availability (HA) is enabled, and the FortiMail is currently a secondary unit, then it may also be normal that a network interface is disconnected (isolated from the network) until a failover occurs and then the secondary becomes the new primary. |
|
|||||
|
Enter the IPv6 address and netmask of the network interface. If the FortiMail unit is in transparent mode, interface may alternatively not have an IP address, and instead indicate that it is bridging. This means that the network interface is acting as a Layer 2 bridge. If high availability (HA) is enabled, and the FortiMail is currently a secondary unit, then it may also be normal that a network interface is disconnected (isolated from the network) until a failover occurs and then the secondary becomes the new primary. |
|
|||||
|
A loopback interface is a logical interface that is always up (no physical link dependency) and the attached subnet is always present in the routing table. The FortiMail unit's loopback IP address does not depend on one specific external port, and is therefore possible to access through several physical or VLAN interfaces. You can only add one loopback interface on the FortiMail unit. The loopback interface is useful when you use a Layer 2 load balancer in front of several FortiMail units. In this case, you can set the FortiMail loopback interface’s IP address the same as the load balancer's IP address and thus the FortiMail unit can pick up the traffic forwarded to it from the load balancer. |
|
|||||
|
Enter a media access control (MAC) address to override the factory set Layer 2 address of this interface. |
Factory set |
|||||
|
Select which types of mail access to allow on the interface. |
|
|||||
|
Enter the interface mode. If configuring for DHCP, see connection {enable | disable} and defaultgw {enable disable}. DHCP mode applies only if the FortiMail unit is operating in gateway mode or server mode. |
static |
|||||
|
Enter the maximum packet or Ethernet frame size in bytes. If network devices between the FortiMail unit and its traffic destinations require smaller or larger units of traffic, packets may require additional processing at each node in the network to fragment or defragment the units, resulting in reduced network performance. Adjusting the MTU to match your network can improve network performance. The valid range is from 576 to 1500 bytes. |
1500 |
|||||
|
Enter how the proxy or built-in MTA will handle SMTP connections on each network interface that are incoming to the IP addresses of email servers belonging to a protected domain:
This option is only available if operation-mode {gateway | server | transparent} is |
proxy |
|||||
|
Enable to allow connections destined for the FortiMail unit itself. This option is only available if operation-mode {gateway | server | transparent} is |
disable |
|||||
|
Enter how the proxy or built-in MTA will handle SMTP connections on each network interface that are incoming to the IP addresses of email servers belonging to a protected domain:
This option is only available if operation-mode {gateway | server | transparent} is |
pass- |
|||||
|
Enter the redundant interface ARP monitoring IP target. This option is only available when redundant-link-monitor {mii-link | arp-link} is |
|
|||||
|
Select the parameters to monitor the connections of the redundant interfaces.
This option is only available when type {vlan | redundant} is |
mii-link |
|||||
|
Enter the redundant member for interface failover. This option is only available when type {vlan | redundant} is |
|
|||||
|
speed {auto | 10full | 10half | 100full | 100half | 1000full} |
Enter the speed of the network interface.
|
auto |
||||
|
Enter either |
up |
|||||
|
|
|||||
|
Enter the VLAN ID for logically separating devices on a network into smaller broadcast domains. This option is only available when type {vlan | redundant} is |
|
|||||
|
Allow web access with the network interface. |
|