Fortimail 6.0.4 Administration Guide June 6, 2019 3Rd Edition Copyright © 2019 Fortinet, Inc
Total Page:16
File Type:pdf, Size:1020Kb
FortiMail Administration Guide Version 6.0.4 FortiMail 6.0.4 Administration Guide June 6, 2019 3rd Edition Copyright © 2019 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable. Technical Documentation docs.fortinet.com Knowledge Base kb.fortinet.com Customer Service & Support support.fortinet.com Training Services training.fortinet.com FortiGuard fortiguard.com Document Feedback [email protected] Table of contents Concepts and workflow................................................................................... 6 Email protocols ........................................................................................................ 6 Client-server connections in SMTP ......................................................................... 8 The role of DNS in email delivery............................................................................. 9 How FortiMail processes email.............................................................................. 12 FortiMail operation modes..................................................................................... 23 FortiMail high availability modes............................................................................ 24 FortiMail management methods............................................................................ 24 Setting up the system .................................................................................... 26 Connecting to the Web UI or CLI........................................................................... 26 Choosing the operation mode ............................................................................... 34 Running the Quick Start Wizard ............................................................................ 39 Connecting to FortiGuard services........................................................................ 44 Gateway mode deployment................................................................................... 46 Transparent mode deployment.............................................................................. 72 Server mode deployment ...................................................................................... 94 Testing the installation ......................................................................................... 114 Backing up the configuration............................................................................... 126 Using the dashboard.................................................................................... 128 Viewing the dashboard ........................................................................................ 128 Using the CLI Console......................................................................................... 128 Using FortiView............................................................................................. 129 Viewing mail statistics.......................................................................................... 129 View threat statistics............................................................................................ 129 Viewing top user statistics ................................................................................... 129 Viewing current IP sessions................................................................................. 130 Monitoring the system ................................................................................. 131 Viewing log messages ......................................................................................... 131 Managing the quarantines ................................................................................... 137 Managing the mail queue .................................................................................... 144 Viewing the greylist statuses ............................................................................... 147 Viewing sender, authentication and endpoint reputation .................................... 151 Managing archived email..................................................................................... 156 Viewing generated reports................................................................................... 158 Configuring system settings ....................................................................... 160 Configuring network settings............................................................................... 160 Page 1 Configuring administrator accounts and access profiles .................................... 179 Configuring system time, options, and other system options ............................. 185 Configuring mail settings ..................................................................................... 195 Customizing GUI, replacement messages and email templates ......................... 218 Configuring RAID ................................................................................................. 230 Using high availability (HA) .................................................................................. 236 Managing certificates........................................................................................... 275 Using FortiSandbox antivirus inspection ............................................................. 285 Configuring FortiGuard services .......................................................................... 287 System maintenance ........................................................................................... 295 Configuring domains and users.................................................................. 306 Configuring protected domains ........................................................................... 306 Managing users ................................................................................................... 324 Configuring user aliases ...................................................................................... 336 Configuring address mappings............................................................................ 338 Configuring IBE users .......................................................................................... 340 Managing the address book (server mode only) ................................................. 345 Sharing calendars and address books (server mode only).................................. 350 Migrating email from other mail servers (server mode only)................................ 355 Configuring policies ..................................................................................... 358 What is a policy?.................................................................................................. 358 How to use policies ............................................................................................. 359 Controlling SMTP access and delivery................................................................ 361 Controlling email based on IP addresses ............................................................ 374 Controlling email based on sender and recipient addresses .............................. 380 Configuring profiles...................................................................................... 388 Configuring session profiles ................................................................................ 388 Configuring antispam profiles and antispam action profiles ............................... 406 Configuring antivirus profiles and antivirus action profiles .................................. 424 Configuring content profiles and content action profiles..................................... 429 Configuring resource profiles............................................................................... 442 Workflow to enable and configure authentication of email users........................ 444 Configuring authentication profiles...................................................................... 445 Configuring LDAP profiles ................................................................................... 449 Configuring dictionary