profile access-control
Use this command to configure access control profiles. These profiles have settings like policy access-control delivery and policy access-control receive, but can be used via session profiles instead.
This feature is available if you have the advanced MTA feature license, and have enabled the feature in mta-adv-ctrl-status {enable | disable}.
Syntax
config profile access-control
edit <profile_name>
[set comment "<comment_str>"]
config access-control
edit <policy_name>
set sender-pattern-type {default | external | group | internal | ldap | ldap-query | regexp}
set sender-option {envelope-from | header-from | envelope-or-header-from}
set sender-pattern <sender_pattern>
set sender-pattern-group <group_name>
set sender-pattern-ldap-groupname <group_name>
set sender-pattern-ldap-profile <profile_name>
set recipient-pattern-type {default | external | group | internal | ldap | ldap-query | regexp}
set recipient-pattern <recipient_pattern>
set recipient-pattern-group <group_name>
set recipient-pattern-ldap-groupname <group_name>
set recipient-pattern-ldap-profile <profile_name>
set sender-ip-type {geoip-group | ip-group | ip-mask | isdb | ldap-query}
set sender-geoip-group <group_name>
set sender-ip-group <ip_group_name>
set sender-ip-mask <client_ipv4/mask>
set sender-ip-ldap-profile <profile_name>
set reverse-dns-type {ldap-query | regexp | wildcard}
set reverse-dns-pattern <client-fqdn_pattern>
set reverse-dns-ldap-profile <profile_name>
set forged-ip-check {any | fail | pass}
set authenticated {any | authenticated | not-authenticated}
set tls-profile <profile_name>
set action {discard | receive | reject | relay | safe | safe-relay}
end
end
|
Variable |
Description |
Default |
||
|
Enter the number that identifies the policy.
|
|
|||
|
Enter the name that identifies the profile. |
|
|||
|
action {discard | receive | reject | relay | safe | safe-relay} |
Select which action the FortiMail system will perform for SMTP sessions that match this policy:
|
reject |
||
|
Select whether to match this policy based upon whether SMTP clients have authenticated with the FortiMail system, either:
|
any |
|||
|
Enter a description or comment. |
|
|||
|
When the forged IP check is enabled, FortiMail will perform a reverse ( Select which of the following forged IP check results will be matched to this policy:
If the DNS queries fail, or the result does not match this setting, then the policy does not match.
|
any |
|||
|
Enter the group of recipient email addresses. This setting is available only if |
|
|||
|
Enter the group of recipient email addresses that is in the directory server. This setting is available only if |
|
|||
|
Select which LDAP profile to use. This setting is available only if
|
|
|||
|
recipient-pattern-type {default | external | group | internal | ldap | ldap-query | regexp} |
Select how you will define the recipient email addresses that match the policy. Options are the same as |
default |
||
|
Enter an email address or pattern. Formatting is the same as This setting is available only when |
* |
|||
|
Select which LDAP profile to use. This setting is available only if
|
|
|||
|
Depending on which pattern you selected in
This setting is available only if |
* |
|||
|
Select how you will define the FQDN of SMTP clients that match this policy, either:
Because the domain name in the SMTP session greeting (
|
wildcard |
|||
|
Select a geographic IP address group. This setting is only available if |
|
|||
|
Enter the IP group of the SMTP client attempting to send the email message. This setting is only available if |
|
|||
|
Select which LDAP profile to use. This setting is available only if
|
|
|||
|
Enter the IP address and netmask of the SMTP client. For example, you can enter Similarly, if you enter To match any address, enter This setting is only available if |
0.0.0.0/0 |
|||
|
sender-ip-type {geoip-group | ip-group | ip-mask | isdb | ldap-query} |
Select how you will define the source IP address of SMTP clients that match this policy, either:
|
ip-mask |
||
|
Select a service name. The Internet Service Database (ISDB) from FortiGuard is an automatically updated list of IP addresses and subnets used by popular services such as 8x8, Akamai, Microsoft 365, and more. To display the list of options for currently known services, enter: set sender-isdb ? This setting is only available if |
8x8 |
|||
|
sender-option {envelope-from | header-from | envelope-or-header-from} |
Select which sender email addresses to compare for a policy match, either:
This setting is available only if |
envelope-from |
||
|
Enter the group of recipient email addresses. This setting is available only if |
|
|||
|
Enter the group of recipient email addresses that is in the directory server. This setting is available only if
|
|
|||
|
Select which LDAP profile to use. This setting is available only if |
|
|||
|
sender-pattern-type {default | external | group | internal | ldap | ldap-query | regexp} |
Select how you will define the sender email addresses that match the policy, either:
|
default |
||
|
Depending on your selection in
This setting is only available if |
* |
|||
|
Enable or disable the policy. |
enable |
|||
|
If you want to allow or reject the connection based on whether the session attributes matches TLS profile, then select the TLS profile.
|
|