system mailserver
Use this command to configure system-wide mail settings.
Syntax
config system mailserver
set default-auth-domain <domain_name>
set smtp-auth {enable | disable}
set smtp-auth-over-tls {enable | disable}
set smtp-auth-smtps {enable | disable}
set smtps-tls-status {enable | disable}
set tls-tracking-status {enable | disable}
set smtp-msa {enable | disable}
set smtp-smtputf8 {enable | disable}
set smtp-service {enable | disable}
set pop3-service {enable | disable}
set imap-service {enable | disable}
set deadmail-expiry <days_int>
set defer-delivery-starttime <time_str>
set defer-delivery-stoptime <time_str>
set dsn-status {enable | disable}
set dsn-ehlo-option {host-name | domain-name | other-name}
set dsn-ehlo-other-name <name_str>
set dsn-sender-address <email_str>
set dsn-sender-displayname <name_str>
set dsn-email-attach-orig {enable | disable}
set dsn-email-customization-status {enable | disable}
set dsn-failure-status {enable | disable}
set dsn-failure-custom-status {enable | disable}
set dsn-warning-status {enable | disable}
set dsn-warning-custom-status {enable | disable}
set dsn-success-custom-status {enable | disable}
set dsn-regular-service-status {enable | disable}
set dsn-extended-service-status {enable | disable}
set smtp-eom-bare-lf-handling {allow | disallow | ignore}
edit {default | incoming | outgoing}
set queue-dsn-timeout <days_int>
set queue-max-delivery-attempt <tries_int>
set queue-max-delivery-attempt-on-dsn <tries_int>
end
set relay-server-status {enable |disable}
set relay-server-name <relay_name>
set delivery-failure-handling-option {normal | relay-to-host}
set delivery-failure-host <host_name>
set delivery-failure-min-age <minutes_int>
set delivery-tracking-status {enable | disable}
set ldap-domaincheck {enable | disable}
set ldap-domaincheck-profile <profile_str>
set ldap-domaincheck-auto-associate {enable | disable}
set ldap-domaincheck-internal-domain <domain_str>
set smtp-max-connections <connections_int>
set timeout-connect <seconds_int>
set timeout-greeting <seconds_int>
set smtp-max-hop-count <hops_int>
set smtp-delivery-addr-pref {ipv4-ipv6 | ipv6-ipv4 | ipv4 | ipv6}
set smtp-delivery-queue-runner-option enhanced
set smtp-delivery-session-preference {domain | host}
set show-acceptable-cert-ca {enable | disable}
set smtp-mtasts-status {check-all-domain | check-external-domain | disable}
set ip-pool-direction {all | exclude-internal-to-internal}
set queue-regular-delivery-attempt <tries_int>
end
|
Variable |
Description |
Default |
||||
|
Enter the name of the mail queue that you want to configure. |
default |
|||||
|
Enter the number of days to keep permanently undeliverable email in the dead mail folder. Dead mail has both incorrect recipient and sender email addresses, and can neither be delivered nor the sender notified via DSN. Valid range is from 0 to 365. 0 means not to save email to the deal mail folder. |
1 |
|||||
|
Enter the domain to use for default authentication. |
|
|||||
|
Enter the time that the FortiMail unit will begin to process deferred oversized email, using the format |
00:00 |
|||||
|
Enter the time that the FortiMail unit will stop processing deferred oversized email, using the format |
00:00 |
|||||
|
Select either:
|
no |
|||||
|
delivery-failure-conditions {dns-failure | mta-failure-permanant | mta-failure-temporary | network-failure-connection | network-failure-other} |
Select which type of failed network connections that the backup relay should take over and retry. Also configure delivery-failure-handling-option {normal | relay-to-host}. |
|
||||
|
Select what to do when email delivery fails temporarily or permanently.
|
normal |
|||||
|
Enter a host to relay email when access to original mail host fails. |
|
|||||
|
Enter the time in minutes the undelivered email should wait in the normal queue before trying the backup relay. |
30 |
|||||
|
Enable to record the following mail delivery statuses in the history log:
You can view queued email except IBE email in the history log from the right-click pop-up menu. For security reasons, IBE email cannot be viewed in the queue. |
disable |
|||||
|
Select which DSN
|
host-name |
|||||
|
If dsn-ehlo-option {host-name | domain-name | other-name} is |
|
|||||
|
Enable to attach original email in delivery status notifications (DSN) or non-delivery reports (NDR). |
disable |
|||||
|
Enable DSN and NDR customization. |
disable |
|||||
|
Enable or disable extended DSN service. |
disable |
|||||
|
Enable or disable customization of the DSN failure message. |
disable |
|||||
|
Enable or disable DSN failure messages. |
enable |
|||||
|
Enable or disable regular DSN service to notify email users of delivery delays and/or failure.
|
enable |
|||||
|
Enter the sender email address in DSN email messages sent by the FortiMail unit to notify email users of delivery failure. If this field is empty, the FortiMail unit uses the default sender email address of |
|
|||||
|
Enter the display name of the sender email address for DSN. If this string is empty, the FortiMail unit uses the display name |
|
|||||
|
Enable or disable delivery status notifications (DSN) or non-delivery reports (NDR) to notify email users of delivery delays and/or failure. |
disable |
|||||
|
Enable or disable customization of the DSN success message. |
disable |
|||||
|
Enable or disable customization of the DSN warning message. |
disable |
|||||
|
Enable or disable DSN warning messages. |
enable |
|||||
|
Enter the port number on which the FortiMail unit’s IMAP server will listen for IMAP connections. This option applies only if the FortiMail unit is operating in server mode. |
143 |
|||||
|
Enable to allow IMAP service. |
enable |
|||||
|
Enter the port number on which the FortiMail unit’s IMAPS server will listen for secure IMAP connections. This option applies only if the FortiMail unit is operating in server mode. |
993 |
|||||
|
By default, IP pools in IP policies and domain settings will be applied to all email directions, including internal to internal, internal to external, external to internal, and external to external. If you want to exempt IP pool usage for internal-to-internal email, select exclude-internal-to-internal.
|
|
|||||
|
If ldap-domaincheck {enable | disable} is
|
disable |
|||||
|
If ldap-domaincheck {enable | disable} is |
|
|||||
|
If ldap-domaincheck {enable | disable} is |
|
|||||
|
Enable to verify the existence of domains that have not been configured as protected domains. Also configure To verify the existence of unknown domains, the FortiMail unit queries an LDAP server for a user object that contains the email address. If the user object exists, the verification is successful, the action varies by configuration of |
disable |
|||||
|
Enter the port number on which the FortiMail unit’s POP3 server will listen for POP3 connections. This option applies only if the FortiMail unit is operating in server mode. |
110 |
|||||
|
Enable to allow POP3 service. |
enable |
|||||
|
Enter the port number on which the FortiMail unit’s POP3 server will listen for secure POP3 connections. This option applies only if the FortiMail unit is operating in server mode. |
995 |
|||||
|
Select the maximum number of hours a delivery status notification (DSN) can remain in the default, incoming, or outgoing queues. After it reaches the maximum, the FortiMail unit moves the DSN email to the dead mail folder. If this setting is Valid range is 0 to 10. |
5 |
|||||
|
Enter the maximum number of tries to send a delivery status notification (DSN) message in the mail queue. Valid range is 0 to 144. Entering 0 means no limit. Alternatively, configure queue-timeout <hours_int>. FortiMail applies whichever occurs first. |
0 |
|||||
|
Enter the maximum number of tries to send an email in the default, incoming, or outgoing mail queues. Valid range is 0 to 144. Entering 0 means no limit. Alternatively, configure queue-timeout <hours_int>. FortiMail applies whichever occurs first. |
0 |
|||||
|
Enter the number of tries for a delivery in the default, incoming, or outgoing mail queues. If delivery is not successful, then the email is moved to a slow mail queue. Valid range is from 1 to 3.
|
3 |
|||||
|
Enter the number of minutes between delivery retries for email in the deferred and spam mail queues. Valid range is from 5 to 120.
|
15 |
|||||
|
Enter the maximum number of hours that email can remain in the default, incoming, or outgoing mail queues. During this time, the FortiMail unit periodically retries to send the email. If retries were not successful, and expiry occurs, then the FortiMail unit sends a final delivery status notification (DSN) email to notify the sender that the email was not deliverable. Valid range is from 1 to 240. Alternatively, configure queue-max-delivery-attempt <tries_int>. FortiMail applies whichever occurs first. |
72 |
|||||
|
Select the number of hours after the 1st delivery failure to deliver the 1stdelivery status notification (DSN) message, notifying the sender that the email was delayed. Valid range is from 1 to 24. |
2 |
|||||
|
Enter the name of the relay server that will deliver outgoing email. See also mailsetting relay-host-list. |
|
|||||
|
If enabled, the relay server will be used to deliver outgoing email. If disabled, the FortiMail built-in MTA will be used. |
disable |
|||||
|
Enable to show acceptable client certificate CA. |
enable |
|||||
|
Enable to accept the |
enable |
|||||
|
Enable to accept the |
enable |
|||||
|
Enable to accept the |
enable |
|||||
|
smtp-delivery-addr-pref {ipv4-ipv6 | ipv6-ipv4 | ipv4 | ipv6} |
When FortiMail delivers email to a host name, it does DNS Use this command to specify the IPv4/IPv6 delivery preferences:
|
ipv4-ipv6 |
||||
|
Enable to allow Without enable this feature, the queue runners are started in a batch. If one queue runner finishes its job first, it will stay idle and wait other queue runners in the same batch to finish their job. Then the queue controller will start a new batch of queue runners after the last queue runner finishes its job. |
|
|||||
|
Select how to handle recipient domain names that resolve to the same MTA:
|
domain |
|||||
|
Normally, to signal the end of the email, the message body should end with an end-of-message (EOM): <CR><LF>.<CR><LF> where However in SMTP servers that are not RFC-compliant, or with attackers, the email does not end with a valid EOM. Instead its EOM is not complete, such as: <LF>.<CR><LF> and then continues with more email and attachments, often from other senders, nested within the same message body as an implicit pipeline. Attacks that use this are called SMTP smuggling. Select either:
|
allow |
|||||
|
Enter the maximum number of concurrent SMTP connections that FortiMail can accept from the SMTP clients. See also conn-concurrent <connections_int>. |
Platform dependent |
|||||
|
Enter the maximum number of hops that FortiMail can accept from the SMTP connections. Valid range is 1 to 200. |
30 |
|||||
|
Enter the port number on which the FortiMail unit listens for email clients to submit email for delivery. |
587 |
|||||
|
Enable to allow your email clients to use SMTP for message submission on a separate TCP port number from deliveries or mail relay by MTAs. For details on message submission by email clients as distinct from SMTP used by MTAs, see RFC 2476. |
disable |
|||||
|
smtp-mtasts-status {check-all-domain | check-external-domain | disable} |
Enable MTA Strict Transport Security (MTA-STS) domain checking:
|
disable |
||||
|
Enter the port number on which the FortiMail unit’s SMTP server will listen for SMTP connections. |
25 |
|||||
|
Enable to allow SMTP service. |
disable |
|||||
|
Enable for UTF-8 support in SMTP session commands and message headers. This allows non-ASCII characters in email addresses and international domain names (IDN) in RCPT TO: <pelé@example.com> SMTPUTF8 Disable if SMTP clients are not compatible with SMTPUTF8. For details, see RFC 6530, RFC 6531, RFC 6532, and RFC 6533. |
disable |
|||||
|
Enter the port number on which the FortiMail unit’s built-in MTA listens for secure SMTP connections. |
465 |
|||||
|
Enable to allow SSL- and TLS-secured connections from SMTP clients that request SSL/TLS. When disabled, SMTP connections with the FortiMail unit’s built-in MTA must occur as clear text, unencrypted.
|
disable |
|||||
|
Enter the maximum amount of time to wait, after the FortiMail unit initiates it, for the receiving SMTP server to establish the network connection. Valid range is 10 to 120.
|
30 |
|||||
|
Enter the maximum amount of time to wait for an SMTP server to send SMTP reply code 220 to the FortiMail unit. Valid range is 10 to 360.
|
30 |
|||||
|
Enable to show FortiView > TLS Statistics in the FortiMail GUI. These mail statistics are how many email were received from and delivered to each domain using a clear text (plain, unencrypted) or secure (SSL/TLS) connection, including which SSL/TLS version was used. |
disable |