Fortinet white logo
Fortinet white logo

CLI Reference

profile encryption

profile encryption

Use this command to create encryption profiles, which contain settings for secure MIME (S/MIME), identity-based encryption (IBE), and fallback to IBE if TLS delivery fails.

Message encryption can be used to ensure that email is private and protected from tampering in transit, even if secure connections such as SMTP over TLS are not used by later mail relays or proxies.

Syntax

config profile encryption

edit <profile_name>

[set comment "<description_str>"]

set protocol {ibe | ibe-on-tls-failure | smime}

set tls-profile <profile_name>

set action {encrypt | encryptandsign | sign}

set encryption-algorithm {aes128 | aes192 | aes256 | cast5 | tripledes | des}

set access-method {push | pull}

set max-push-size <size_int>

set action-on-failure {drop | send | tls}

end

Variable

Description

Default

<profile_name>

Enter the name of the profile.

access-method {push | pull}

Select how recipients can retrieve encrypted messages:

  • push: A notification and a secure mail is delivered to the recipient. Recipients must go to FortiMail to open the message. FortiMail does not store the message. If the message exceeds max-push-size <size_int>, the pull method is used instead.

  • pull: A notification is delivered to the recipient. Recipients must go to FortiMail to open the message. FortiMailstores the message.

This setting appears only if protocol {ibe | ibe-on-tls-failure | smime} is ibeor ibe-on-tls-failure.

push

action-on-failure {drop | send | tls}

Select what to do when encrypted messages cannot be used:

This setting appears only if protocol {ibe | ibe-on-tls-failure | smime} is ibeor smime.

drop

action {encrypt | encryptandsign | sign}

Select either:

  • encrypt

  • sign

  • encryptandsign

This setting appears only if protocol {ibe | ibe-on-tls-failure | smime} is smime. (For IBE, encryption occurs.)

encrypt

comment "<description_str>"

Enter a description or comment.

encryption-algorithm {aes128 | aes192 | aes256 | cast5 | tripledes | des}

Select which encryption algorithm will be used to encrypt the email message:

  • aes256

  • aes192

  • aes128

  • cast5

  • tripledes (3DES)

  • des

aes128

max-push-size <size_int>

Select the secure message size limit in kilobytes (KB) for IBE push. If a message exceeds the limit, pull is used instead. Valid range is 0 to 10240.

This setting appears only if protocol {ibe | ibe-on-tls-failure | smime} is ibeor ibe-on-tls-failure.

2048

protocol {ibe | ibe-on-tls-failure | smime}

Select which message encryption protocol to use, either:

smime

tls-profile <profile_name>

Select which TLS profile to try first. If a secure connection cannot be established, then fall back to IBE.

This setting appears only if protocol {ibe | ibe-on-tls-failure | smime} is ibe-on-tls-failure.

Related topics

profile authentication

profile tls

system global

system mailqueue

profile encryption

profile encryption

Use this command to create encryption profiles, which contain settings for secure MIME (S/MIME), identity-based encryption (IBE), and fallback to IBE if TLS delivery fails.

Message encryption can be used to ensure that email is private and protected from tampering in transit, even if secure connections such as SMTP over TLS are not used by later mail relays or proxies.

Syntax

config profile encryption

edit <profile_name>

[set comment "<description_str>"]

set protocol {ibe | ibe-on-tls-failure | smime}

set tls-profile <profile_name>

set action {encrypt | encryptandsign | sign}

set encryption-algorithm {aes128 | aes192 | aes256 | cast5 | tripledes | des}

set access-method {push | pull}

set max-push-size <size_int>

set action-on-failure {drop | send | tls}

end

Variable

Description

Default

<profile_name>

Enter the name of the profile.

access-method {push | pull}

Select how recipients can retrieve encrypted messages:

  • push: A notification and a secure mail is delivered to the recipient. Recipients must go to FortiMail to open the message. FortiMail does not store the message. If the message exceeds max-push-size <size_int>, the pull method is used instead.

  • pull: A notification is delivered to the recipient. Recipients must go to FortiMail to open the message. FortiMailstores the message.

This setting appears only if protocol {ibe | ibe-on-tls-failure | smime} is ibeor ibe-on-tls-failure.

push

action-on-failure {drop | send | tls}

Select what to do when encrypted messages cannot be used:

This setting appears only if protocol {ibe | ibe-on-tls-failure | smime} is ibeor smime.

drop

action {encrypt | encryptandsign | sign}

Select either:

  • encrypt

  • sign

  • encryptandsign

This setting appears only if protocol {ibe | ibe-on-tls-failure | smime} is smime. (For IBE, encryption occurs.)

encrypt

comment "<description_str>"

Enter a description or comment.

encryption-algorithm {aes128 | aes192 | aes256 | cast5 | tripledes | des}

Select which encryption algorithm will be used to encrypt the email message:

  • aes256

  • aes192

  • aes128

  • cast5

  • tripledes (3DES)

  • des

aes128

max-push-size <size_int>

Select the secure message size limit in kilobytes (KB) for IBE push. If a message exceeds the limit, pull is used instead. Valid range is 0 to 10240.

This setting appears only if protocol {ibe | ibe-on-tls-failure | smime} is ibeor ibe-on-tls-failure.

2048

protocol {ibe | ibe-on-tls-failure | smime}

Select which message encryption protocol to use, either:

smime

tls-profile <profile_name>

Select which TLS profile to try first. If a secure connection cannot be established, then fall back to IBE.

This setting appears only if protocol {ibe | ibe-on-tls-failure | smime} is ibe-on-tls-failure.

Related topics

profile authentication

profile tls

system global

system mailqueue