|
|
set | ip_profile check |
ip_profile check
Use these commands to configure various session checks.
Syntax
set ip_profile <name_str> check 3_way {enable disable}
set ip_profile <name_str> check allow_pipelining {no loose strict} set ip_profile <name_str> check domain {enable disable}
set ip_profile <name_str> check eom_ack {enable disable} set ip_profile <name_str> check helo {enable disable}
set ip_profile <name_str> check open_relay {enable disable} set ip_profile <name_str> check recipient {enable disable} set ip_profile <name_str> check rewrite_helo {enable disable}
set ip_profile <name_str> check rewrite_helo_custom {enable disable} <helo_str>
set ip_profile <name_str> check send_dsn {enable | disable} | |||||
set | ip_profile | <name_str> check | sender | {enable | disable} | <integer> |
set | ip_profile | <name_str> check | splice | {enable | disable} |
{seconds kilobytes}
set ip_profile <name_str> check stop_empty_domains {enable disable} set ip_profile <name_str> check stop_encrypted {enable disable} set ip_profile <name_str> check syntax {enable disable}
Keywords and Variables | Description | Default |
|
|
|
<name_str> | Enter the name of the session profile. |
|
3_way | Enable or disable message rejection if recipient and HELO domain match | disable |
{enable disable} | but sender domain is different. |
|
| This check only affects unauthenticated sessions. |
|
allow_pipelining | Disable, enable, or enable strict command pipelining. | no |
{no loose | • {no} The FortiMail unit accepts only a single command at a time during |
|
strict} | an SMTP session. |
|
| • {loose} Some SMTP command sequences are accepted and |
|
| processed as a group, increasing performance over |
|
| connections. |
|
| • {strict} Pipelining is enabled, but limited to strict compliance with |
|
|
| |
domain | Enable or disable rejection of EHLO/HELO commands with invalid | disable |
{enable disable} | characters in the domain. |
|
eom_ack | Enable or disable immediately acknowledging end of message (EOM) | disable |
{enable disable} | signal. If disabled, the antispam check is run on the message before |
|
acknowledgement is sent. The sending server could |
| |
| waiting for EOM acknowledgement. |
|
|
|
|
helo {enable | Enable to disable checking of the existence of the domain reported in the | disable |
disable} | client’s HELO command by looking up both the MX record and A record. |
|
open_relay | Enable or disable open relay check. This check only affects | disable |
{enable disable} | unauthenticated sessions. |
|
recipient | Enable or disable checking the recipient address for a valid domain. | disable |
{enable disable} |
|
|
rewrite_helo | Enable or disable rewriting the EHLO/HELO domain to the IP string of the | disable |
{enable disable} | client address. The rewritten EHLO/HELO will be in the format x.x.x.x |
|
rewrite_helo_custom | Select to rewrite the HELO domain to the specified value for any session | disable |
{enable disable} | this profile applies to. |
|
<helo_str> |
|
|
FortiMail™ Secure Messaging Platform Version 3.0 MR4 CLI Reference |
|
175 |