Fortinet white logo
Fortinet white logo

CLI Reference

policy delivery-control

policy delivery-control

Use this command to configure email delivery rate limits for a protected domain, or for all domains protected by the FortiMail unit. (To apply limits only for a specific sender email address instead, see sender-addr-rate-ctrl-state {enable | disable}.)

Administrators often block MTA IP addresses that send email at a high rate because this is a common trait of spammers. Because of this, marketing mail campaigns can accidentally cause your protected domains to be registered in a DNSBL.

To prevent this problem, you can rate limit email delivery.

When the FortiMail unit initiates an SMTP session, each delivery rate limit policy is compared to the domain name in the recipient email address (RCPT TO:) in the SMTP envelope. Policies are evaluated for a match in order, from top to bottom of the list. If a match does not exist, then the email is delivered with no rate control. If a match does exist, then the rate limit is applied. No subsequent delivery rate limit policies are applied. Only one delivery rate limit policy is applied to each SMTP session.

Syntax

config policy delivery-control

edit <policy_name>

set max-concurrent-connection <limit_int>

set max-messages-per-connection <limit_int>

set max-recipients-per-message <limit_int>

set max-recipients-per-period <limit_int>

set recipient-domain <domain_fqdn>

set status {enable | disable}

end

Variable

Description

Default

<policy_name>

Enter the number that identifies the policy.

Note: The identifier number may be different from the order of evaluation. FortiMail units evaluate these policies in sequential order, starting at the top of the list. Only the first matching policy is applied.

For example, if you enter:

move 15 before 1

then policy 15 is evaluated for a match before policy 1.

To show the order of evaluation for the list of policies, enter:

config policy delivery-control

get

max-concurrent-connection <limit_int>

Enter the maximum concurrent SMTP connections, or enter 0 to disable the limit. Valid range is 0-100.

5

max-messages-per-connection <limit_int>

Enter the maximum number of email per SMTP connection, or enter 0 to disable the limit. Valid range is 0-1000.

50

max-recipients-per-message <limit_int>

Enter the maximum recipients per email, or enter 0 to disable the limit. Valid range is 0-1000.

100

max-recipients-per-period <limit_int>

Enter the maximum recipients per 30 minute time span, or enter 0 to disable the limit. Valid range is 0-1000000000.

0

recipient-domain <domain_fqdn>

Enter a complete or partial domain name in recipient email addresses. Wild card characters can be used to match multiple domain names. An asterisk (*) represents one or more characters. A question mark (?) represents any single character. For example:

*.example.???

matches all sub-domains at example.com, example.net, example.org, or any other “example" domain ending with a three‑letter top-level domain name.

*

status {enable | disable}

Enable or disable the policy.

enable

Related topics

policy access-control delivery

policy delivery-control

policy delivery-control

Use this command to configure email delivery rate limits for a protected domain, or for all domains protected by the FortiMail unit. (To apply limits only for a specific sender email address instead, see sender-addr-rate-ctrl-state {enable | disable}.)

Administrators often block MTA IP addresses that send email at a high rate because this is a common trait of spammers. Because of this, marketing mail campaigns can accidentally cause your protected domains to be registered in a DNSBL.

To prevent this problem, you can rate limit email delivery.

When the FortiMail unit initiates an SMTP session, each delivery rate limit policy is compared to the domain name in the recipient email address (RCPT TO:) in the SMTP envelope. Policies are evaluated for a match in order, from top to bottom of the list. If a match does not exist, then the email is delivered with no rate control. If a match does exist, then the rate limit is applied. No subsequent delivery rate limit policies are applied. Only one delivery rate limit policy is applied to each SMTP session.

Syntax

config policy delivery-control

edit <policy_name>

set max-concurrent-connection <limit_int>

set max-messages-per-connection <limit_int>

set max-recipients-per-message <limit_int>

set max-recipients-per-period <limit_int>

set recipient-domain <domain_fqdn>

set status {enable | disable}

end

Variable

Description

Default

<policy_name>

Enter the number that identifies the policy.

Note: The identifier number may be different from the order of evaluation. FortiMail units evaluate these policies in sequential order, starting at the top of the list. Only the first matching policy is applied.

For example, if you enter:

move 15 before 1

then policy 15 is evaluated for a match before policy 1.

To show the order of evaluation for the list of policies, enter:

config policy delivery-control

get

max-concurrent-connection <limit_int>

Enter the maximum concurrent SMTP connections, or enter 0 to disable the limit. Valid range is 0-100.

5

max-messages-per-connection <limit_int>

Enter the maximum number of email per SMTP connection, or enter 0 to disable the limit. Valid range is 0-1000.

50

max-recipients-per-message <limit_int>

Enter the maximum recipients per email, or enter 0 to disable the limit. Valid range is 0-1000.

100

max-recipients-per-period <limit_int>

Enter the maximum recipients per 30 minute time span, or enter 0 to disable the limit. Valid range is 0-1000000000.

0

recipient-domain <domain_fqdn>

Enter a complete or partial domain name in recipient email addresses. Wild card characters can be used to match multiple domain names. An asterisk (*) represents one or more characters. A question mark (?) represents any single character. For example:

*.example.???

matches all sub-domains at example.com, example.net, example.org, or any other “example" domain ending with a three‑letter top-level domain name.

*

status {enable | disable}

Enable or disable the policy.

enable

Related topics

policy access-control delivery