Dynamic Threat Prevention System (DTPS), APSecure, FortiASIC, FortiBIOS, FortiBridge, FortiClient,
FortiGate®, FortiGate Unified Threat Management System, FortiGuard®, FortiGuard-Antispam,
FortiGuard-Antivirus, FortiGuard-Intrusion, FortiGuard-Web, FortiLog, FortiAnalyzer, FortiManager,
Fortinet®, FortiOS, FortiPartner, FortiProtect, FortiReporter, FortiResponse, FortiShield, FortiVoIP, and
FortiWiFi are trademarks of Fortinet, Inc. in the United States and/or other countries. The names of actual
companies and products mentioned herein may be the trademarks of their respective owners.
Regulatory compliance
FCC Class A Part 15 CSA/CUS
Caution: Risk of explosion if battery is replaced by incorrect type.
Dispose of used batteries according to instructions.
FortiMail™ Secure Messaging Platform Version 4.0 Patch 1 Install Guide
8Revision 2
http://docs.fortinet.com/ • Feedback
Page 9
Introduction Registering your FortiMail unit
Introduction
Welcome, and thank you for selecting Fortinet products for your network protection.
The FortiMail™ Secure Messaging Platform is an integrated hardware and software
solution that provides powerful and flexible antispam, antivirus, email archiving and
logging capabilities to incoming and outgoing email traffic. FortiMail units have reliable and
high performance features for detecting and blocking spam messages and malicious
attachments.
Built on the Fortinet award winning FortiOS™ and FortiASIC™ technology, the FortiMail
antivirus technology extends full content inspection capabilities to detect the most
advanced email threats.
To ensure up-to-date email protection, FortiMail relies on FortiGuard™ Antivirus and
FortiGuard Antispam security subscription services that are powered by a worldwide 24x7
Global Threat Research Team. FortiMail provides bidirectional email routing, virtualization
and archiving capabilities with a lower total cost of ownership.
This document will assist you in physically connecting and performing required
configuration to achieve a basic FortiMail installation.
This chapter contains the following topics:
•Registering your FortiMail unit
•Customer service and technical support
•Training
•Documentation
•Scope
•Conventions
Registering your FortiMail unit
Before you begin, take a moment to register your Fortinet product at the Fortinet Technical
Support web site, https://support.fortinet.com.
Many Fortinet customer services, such as firmware updates, technical support, and
FortiGuard Antivirus and other FortiGuard services, require product registration.
For more information, see the Fortinet Knowledge Center article Registration Frequently
Asked Questions.
Customer service and technical support
Fortinet Technical Support provides services designed to make sure that your Fortinet
products install quickly, configure easily, and operate reliably in your network.
To learn about the technical support services that Fortinet provides, visit the Fortinet
Technical Support web site at https://support.fortinet.com.
You can dramatically improve the time that it takes to resolve your technical support ticket
by providing your configuration file, a network diagram, and other specific information. For
a list of required information, see the Fortinet Knowledge Center article What does
Fortinet Technical Support require in order to best assist the customer?
Training
Fortinet Training Services provides classes that orient you quickly to your new equipment,
and certifications to verify your knowledge level. Fortinet provides a variety of training
programs to serve the needs of our customers and partners world-wide.
To learn about the training services that Fortinet provides, visit the Fortinet Training
Services web site at http://campus.training.fortinet.com, or email them at
training@fortinet.com.
Documentation
The Fortinet Technical Documentation web site, http://docs.fortinet.com, provides the
most up-to-date versions of Fortinet publications, as well as additional technical
documentation such as technical notes.
In addition to the Fortinet Technical Documentation web site, you can find Fortinet
technical documentation on the Fortinet Tools and Documentation CD, and on the Fortinet
Knowledge Center.
Scope
Fortinet Tools and Documentation CD
Many Fortinet publications are available on the Fortinet Tools and Documentation CD
shipped with your Fortinet product. The documents on this CD are current at shipping
time. For current versions of Fortinet documentation, visit the Fortinet Technical
Documentation web site, http://docs.fortinet.com.
Fortinet Knowledge Center
The Fortinet Knowledge Center provides additional Fortinet technical documentation,
such as troubleshooting and how-to-articles, examples, FAQs, technical notes, a glossary,
and more. Visit the Fortinet Knowledge Center at http://kc.fortinet.com.
Comments on FortiMail technical documentation
Please send information about any errors or omissions in this document to
techdoc_fortimail@fortinet.com.
This document will assist you in physically connecting and using the web-based manager
to perform required configuration to achieve a basic FortiMail installation.
After you have completed the instructions in this document:
•The FortiMail unit is integrated into your network, and you can connect to the webbased manager and/or command line interface (CLI).
•The operation mode has been configured.
•The Quick Start Wizard has been completed.
•Firmware, FortiGuard Antivirus and FortiGuard Antispam updates are completed.
FortiMail™ Secure Messaging Platform Version 4.0 Patch 1 Install Guide
10Revision 2
http://docs.fortinet.com/ • Feedback
Page 11
Introduction Conventions
•DNS records for your mail domains have been updated.
•If the FortiMail unit is operating in transparent or gateway mode, the network is
configured so incoming and outgoing email passes through the FortiMail unit for
examination.
•If the FortiMail unit is operating in server mode, the network is configured to allow the
FortiMail unit access to and from other email servers, typically including external
servers on the Internet, and from email users.
•Advanced features of the FortiMail unit may or may not be enabled. These features
include email archiving, logging, reporting, and advanced antispam and antivirus
configurations.
When you have completed that basic setup, you can use the FortiMail Administration
Guide as a guide when configuring the advanced features, reconfiguring the basic
features, or when performing periodic maintenance such as backups and firmware
upgrades.
This document does not cover commands for the command line interface (CLI). For
information on the CLI, see the FortiMail CLI Reference.
This document is intended for administrators, not end users. If you are an email user,
please click the Help link in FortiMail webmail to see the webmail online help instead, or
contact your administrator.
Conventions
IP addresses
CLI constraints
Notes, Tips and Cautions
Fortinet technical documentation uses the conventions described below.
To avoid publication of public IP addresses that belong to Fortinet or any other
organization, the IP addresses used in Fortinet technical documentation are fictional and
follow the documentation guidelines specific to Fortinet. The addresses used are from the
private IP address ranges defined in RFC 1918: Address Allocation for Private Internets,
available at http://ietf.org/rfc/rfc1918.txt?number-1918.
CLI constraints, such as <address_ipv4>, indicate which data types or string patterns
are acceptable input for a given parameter or variable value. CLI constraint conventions
are described in the CLI Reference document for each product.
Fortinet technical documentation uses the following guidance and styles for notes, tips
and cautions.
Tip: Highlights useful additional information, often tailored to your workplace activity.
Note: Also presents useful information, but usually focused on an alternative, optional
Caution: Warns you about commands or procedures that could have unexpected or
undesirable results including loss of data or damage to equipment.
Typographical conventions
Fortinet documentation uses the following typographical conventions:
Table 1: Typographical conventions in Fortinet technical documentation
ConventionExample
Button, menu, text box,
field, or check box label
CLI input*config system dns
CLI outputFGT-602803030703 # get system settings
EmphasisHTTP connections are not secure and can be intercepted by
File content<HTML><HEAD><TITLE>Firewall
HyperlinkVisit the Fortinet Technical Support web site,
Keyboard entryType a name for the remote VPN peer or client, such as
NavigationGo to VPN > IPSEC > Auto Key (IKE).
Publication
* For conventions used to represent command syntax, see the FortiMail CLI Reference.
From Minimum log level, select Notification.
set primary <address_ipv4>
end
comments : (null)
opmode : nat
a third party.
Authentication</TITLE></HEAD>
<BODY><H4>You must authenticate to use this
service.</H4>
https://support.fortinet.com.
Central_Office_1.
FortiGate Administration Guide.
FortiMail™ Secure Messaging Platform Version 4.0 Patch 1 Install Guide
12Revision 2
http://docs.fortinet.com/ • Feedback
Page 13
Key concepts Email protocols
Key concepts
This chapter defines basic email and FortiMail concepts and terms.
If you are new to FortiMail units, or new to email systems, this chapter can help you to
quickly understand this document and your FortiMail unit.
This chapter contains the following sections:
•Email protocols
•Client-server connections in SMTP
•The role of DNS in email delivery
•FortiMail web-based manager modes
•FortiMail operation modes
•FortiMail high availability modes
Email protocols
There are multiple prevalent standard email protocols.
SMTP
Simple Mail Transfer Protocol (SMTP) is the standard protocol for sending email between:
•two mail transfer agents (MTA)
•a mail user agent (MUA) and an MTA
Note: For definitions of MTA and MUA, see “Client-server connections in SMTP” on
page 14.
SMTP communications typically occur on TCP port number 25.
When an email user sends an email, their MUA uses SMTP to send the email to an MTA,
which is often their email server. The MTA then uses SMTP to directly or indirectly deliver
the email to the destination email server that hosts email for the recipient email user.
When an MTA connects to the destination email server, it determines whether the
recipient exists on the destination email server. If the recipient email address is legitimate,
then the MTA delivers the email to the email server, from which email users can then use
a protocol such as POP3 or IMAP to retrieve the email. If the recipient email address does
not exist, the MTA typically sends a separate email message to the sender, notifying them
of delivery failure.
While the basic protocol of SMTP is simple, many SMTP servers support a number of
protocol extensions for features such as authentication, encryption, multipart messages
and attachments, and may be referred to as extended SMTP (ESMTP) servers.
FortiMail units can scan SMTP traffic for spam and viruses, and support several SMTP
extensions. For details, see the Fortinet Knowledge Center article Supported SMTP-
related RFCs.
POP3
Post Office Protocol version 3 (POP3) is a standard protocol used by email clients to
retrieve email that has been delivered to and stored on an email server.
POP3 communications typically occur on TCP port number 110.
Unlike IMAP, after a POP3 client downloads an email to the email user’s computer, a copy
of the email usually does not remain on the email server’s hard disk. The advantage of
this is that it frees hard disk space on the server. The disadvantage of this is that
downloaded email usually resides on only one personal computer. Unless all of their
POP3 clients are always configured to leave copies of email on the server, email users
who use multiple computers to view email, such as both a desktop and laptop, will not be
able to view from one computer any of the email previously downloaded to another
computer.
FortiMail units do not scan POP3 traffic for spam and viruses, but may use POP3 when
operating in server mode, when an email user retrieves their email. For more information
on server mode, see “FortiMail operation modes” on page 19.
IMAP
Internet Message Access Protocol (IMAP) is a standard protocol used by email clients to
retrieve email that has been delivered to and stored on an email server.
IMAP communications typically occur on TCP port number 143.
Unless configured for offline availability, IMAP clients typically initially download only the
message header. They download the message body and attachments only when the email
user selects to read the email.
Unlike POP3, when an IMAP client downloads an email to the email user’s computer, a
copy of the email remains on the email server’s hard disk. The advantage of this is that it
enables email users to view email from more than one computer. This is especially useful
in situations where more than one person may need to view an inbox, such where all
members of a department monitor a collective inbox. The disadvantage of this is that,
unless email users delete email, IMAP may more rapidly consume the server’s hard disk
space.
FortiMail units do not scan IMAP traffic for spam and viruses, but may use IMAP when
operating in server mode, when an email user retrieves their email. For more information
on server mode, see “FortiMail operation modes” on page 19.
HTTP and HTTPS
Secured and non-secured HyperText Transfer Protocols (HTTP/HTTPS), while not strictly
for the transport of email, are often used by webmail applications to view email that is
stored remotely.
HTTP communications typically occur on TCP port number 80; HTTPS communications
typically occur on TCP port number 443.
FortiMail units do not scan HTTP or HTTPS traffic for spam or viruses, but use them to
display quarantines and, if the FortiMail unit is operating in server mode, FortiMail
webmail. For more information on server mode, see “FortiMail operation modes” on
page 19.
Client-server connections in SMTP
Client-server connections and connection directionality in SMTP differ from how you may
be familiar with them in other protocols.
For example, in the SMTP protocol, an SMTP client connects to an SMTP server. This
seems consistent with the traditional client-server model of communications. However,
due to the notion of relay in SMTP, the SMTP client may be either:
•an email application on a user’s personal computer
FortiMail™ Secure Messaging Platform Version 4.0 Patch 1 Install Guide
14Revision 2
http://docs.fortinet.com/ • Feedback
Page 15
Key concepts Client-server connections in SMTP
•another SMTP server that acts as a delivery agent for the email user, relaying the email
to its destination email server
The placement of clients and servers within your network topology may affect the
operation mode you choose when installing a FortiMail unit. If your FortiMail unit will be
operating in gateway mode or server mode, SMTP clients — including SMTP servers
connecting as clients — must be configured to connect to the FortiMail unit.
Note: For more information on gateway mode and server mode, see “FortiMail operation
modes” on page 19.
Terms such as MTA and MUA describe server and client relationships specific to email
protocols.
MTA
A Mail Transfer Agent (MTA) is an SMTP server that relays email messages to another
SMTP server.
FortiMail units operating in gateway mode function as an MTA. FortiMail units operating in
server mode function as an MTA and full (SMTP, IMAP, POP3, webmail) email server.
In order to deliver email, unless the email is incoming and the email server has no domain
name and is accessed by IP address only, MTAs must query a DNS server for the MX
record and the corresponding A record. For more information, see “The role of DNS in
email delivery” on page 16.
MUA
A Mail User Agent (MUA), or email client, is software such as Microsoft Outlook that
enables users to send and receive email.
FortiMail units support SMTP connections for sending of email by a MUA.
FortiMail units operating in server mode support POP3 and IMAP connections for retrieval
of email by a MUA. For email users that prefer to use their web browsers to send and
retrieve email instead of a traditional MUA, FortiMail units operating in server mode also
provide FortiMail webmail.
Incoming vs. outgoing directionality
Many FortiMail features such as proxies and policies act upon the directionality of an
SMTP connection or email message. Rather than being based upon origin, incoming or
outgoing directionality is determined by whether the destination is a protected domain.
Incoming connections consist of those destined for the SMTP servers that are protected
domains of the FortiMail unit. For example, if the FortiMail unit is configured to protect the
SMTP server whose IP address is 10.1.1.1, the FortiMail unit treats all SMTP connections
destined for 10.1.1.1 as incoming.
Outgoing connections consist of those destined for SMTP servers that the FortiMail unit
has not been configured to protect. For example, if the FortiMail unit is not configured to
protect the SMTP server whose IP address is 192.168.1.1, all SMTP connections destined
for 192.168.1.1 will be treated as outgoing, regardless of their origin.
Directionality at the connection level may be different than directionality at the level of
email messages contained by the connection. It is possible that an incoming connection
could contain an outgoing email message, and vice versa.
For example, in Figure 1 on page 16, connections from the internal mail relays to the
internal mail servers are outgoing connections, but they contain incoming email
messages. Conversely, connections from remote MUAs to the internal mail relays are
incoming connections, but may contain outgoing email messages if the recipients’ email
addresses (RCPT TO:) are external.
Similarly to when determining the directionality of an SMTP connection, when determining
the directionality of an email message, FortiMail units examine the domain to which the
recipient belongs: if the domain to which the recipient email address belongs is a
protected domain, the email message is considered to be incoming; if the domain to which
the recipient email address belongs is not a protected domain, the email message is
considered to be outgoing.
The role of DNS in email delivery
SMTP can be configured to operate without DNS, using IP addresses instead of domain
names for SMTP clients, SMTP servers, and recipient email addresses. However, this
configuration is rare.
SMTP as it is typically used relies upon DNS to determine the mail gateway server (MX)
for a domain name, and to resolve domain names into IP addresses. As such, you usually
must configure email servers and FortiMail units to be able to query a DNS server.
In addition, you may also be required to configure the DNS server with an MX record, an A
record, and a reverse DNS record for protected domain names and for the domain name
of the FortiMail unit itself.
FortiMail™ Secure Messaging Platform Version 4.0 Patch 1 Install Guide
16Revision 2
http://docs.fortinet.com/ • Feedback
Page 17
Key concepts The role of DNS in email delivery
MX record
Mail Exchanger (MX) records are configured on a DNS server. MX records for a domain
name indicate designated email servers or email gateways that deliver email to that
domain, and their order of preference. In their most simple form, MX records use the
following format:
example.com IN MX 10 mail.example.com
where:
•example.com is the name of the domain
•IN indicates the Internet protocol class
•MX indicates that the DNS resource record is of the MX type
•10 indicates the order of preference (greater values indicate lower preference)
•mail.example.com is the host name of an email server or gateway
When an email client sends an email, the sender’s MTA queries a DNS server for the MX
record of the domain name in the recipient’s email address. To resolve the host name of
the MTA referenced by the MX record, it then queries for the A record of the destination
MTA. That A record provides the IP address of the email server or gateway. The sender’s
MTA then attempts to deliver the email to that IP address.
For example, if the recipient email address is user1@example.com, in order to deliver the
email, the sender’s MTA would query the MX and A records to determine the IP address of
the email gateway of example.com.
Often, the domain name and/or IP address of the email domain is different from that of its
email server or gateway. The fully qualified domain name (FQDN) of an email server or
gateway may be a subdomain or another domain name entirely, such as that of the MTA of
an Internet service provider (ISP). For example, the email gateways for the email domain
example.com could be mail1.example.com and mail2.example.com, or
mail.isp.example.net.
If your FortiMail unit will operate in transparent mode, and you will configure it be fully
transparent at both the IP layer and in the SMTP envelope and message headers by
enabling “Hide this box from the mail server” in the session profile, “Hide the transparent
box” in the protected domain, and “Use client-specified SMTP server to send email” for the
proxies, no MX record changes are required.
If your FortiMail unit will operate in gateway mode or server mode, or in transparent mode
while not configured to be fully transparent, you must configure the public DNS server for
your domain name with an MX record that refers to the FortiMail unit which will operate as
the email gateway, such as:
example.com IN MX 10 fortimail.example.com
Caution: If your FortiMail unit will operate in gateway mode or server mode, or in
transparent mode while not fully transparent, configure the MX record to refer to the
FortiMail unit, and remove other MX records. If you do not configure the MX record to refer
to the FortiMail unit, or if other MX records exist that do not refer to the FortiMail unit,
external MTAs may not be able to deliver email to or through the FortiMail unit, or may be
able to bypass the FortiMail unit. If you have configured secondary MX records for failover
reasons, consider configuring FortiMail high availability (HA) instead. For details, see
“FortiMail high availability modes” on page 19.
Note: For more information on gateway mode and server mode, see “FortiMail operation
Exceptions include if you are configuring a private DNS server for use with the Use MX
Record option (see “Use MX Record” on page 83). In that case, rather than referencing
the FortiMail unit as the mail gateway and being used by external SMTP servers to route
mail, the MX record references the protected SMTP server and is used by the FortiMail
unit to define the SMTP servers for the protected domain.
A record
A records are configured on a DNS server. A records indicate the IP address to which a
host name resolves. In their most simple form, A records use the following format:
mail IN A 192.168.1.10
where:
•mail is the name of the host
•IN indicates the Internet protocol class
•A indicates that the DNS resource record is of the IPv4 address type
•192.168.1.10 indicates the IP address that hosts the domain name
When an email client sends an email, the sender’s MTA queries a DNS server for the MX
record of the domain name in the recipient’s email address. To resolve the host name of
the MTA referenced by the MX record, it then queries for the A record of the destination
MTA. That A record provides the IP address of the email server or gateway. The sender’s
MTA then attempts to deliver the email to that IP address.
You must configure the public DNS server for your host names with an A record to resolve
the host names referenced in MX records, and the host name of the FortiMail unit, if any.
For example, if an MX record is:
example.com IN MX 10 fortimail.example.com
the required A record in the example.com zone file might be:
fortimail IN A 192.168.1.15
Reverse DNS record
Because the SMTP protocol does not strictly require SMTP clients to use their own
domain name during the SMTP greeting, it is possible to spoof the origin domain. In an
attempt to bypass antispam measures against domain names known to be associated
with spam, spammers often exploit that aspect of SMTP by pretending to send email from
legitimate domains.
For example, the spammer spam.example.com might initiate an SMTP session with the
command:
EHLO nonspam.example.edu
To prevent this form of attack, many SMTP servers query reverse DNS records to verify
that the domain name provided in the SMTP greeting genuinely matches the IP address of
the connecting SMTP client.
You should configure the public DNS server for your protected domain names with a
reverse DNS record to resolve the IP addresses of your protected SMTP servers and/or
FortiMail unit into domain names.
For example, if the outgoing MTA for example.com is the FortiMail unit,
fortimail.example.com, and the public network IP address of the FortiMail unit is
10.10.10.1, a public DNS server’s reverse DNS zone file for the 10.10.10.0/24 subnet
might contain:
1 IN PTR fortimail.example.com.
FortiMail™ Secure Messaging Platform Version 4.0 Patch 1 Install Guide
18Revision 2
http://docs.fortinet.com/ • Feedback
Page 19
Key concepts FortiMail web-based manager modes
where fortimail.example.com is the FQDN of the FortiMail unit.
Note: Reverse DNS records are required for FortiMail units operating in gateway mode or
server mode. However, they are also required for FortiMail units operating in transparent
mode, unless they have been configured to be completely transparent. For more
information on transparency, see the FortiMail Administration Guide.
FortiMail web-based manager modes
The web-based manager has two modes: basic mode and advanced mode.
•Basic mode: Provides easy navigation using a simplified set of menu options that
allow for many typical FortiMail unit configurations, and includes the Quick Start
Wizard.
•Advanced mode: Provides the full set of menu options which allows you to achieve
more complex configurations, but does not include the Quick Start Wizard.
Unless otherwise specified, this document describes setup of the FortiMail unit using the
basic mode of the web-based manager.
For more information on basic mode, advanced mode, the Quick Start Wizard, or
configuring your FortiMail unit using either mode of the web-based manager, see the
FortiMail Administration Guide.
FortiMail operation modes
FortiMail units can run in one of three operation modes: gateway mode, transparent mode,
and server mode.
•Gateway mode: The FortiMail unit acts as a mail transfer agent (MTA), or email
gateway, relaying email to and from the email servers that it protects. It does not locally
store email unless queued or quarantined.
•Transparent mode: The FortiMail unit transparently proxies or relays email traffic to
and from the email servers that it protects. It does not locally store email unless
queued or quarantined.
•Server mode: The FortiMail unit operates as a stand-alone email server and MTA. The
FortiMail unit locally stores email for delivery to its email users. Email users can access
their email using FortiMail webmail, POP3, or IMAP.
All operation modes can scan email traffic for viruses and spam, and can quarantine
suspicious email and attachments.
For more information on the differences between operation modes and configuring the
operation mode, see “Choosing the operation mode” on page 71.
FortiMail high availability modes
FortiMail units can be configured to operate in high availability (HA) clusters. FortiMail HA
has two modes: active-passive and config-only.
•Active-passive HA: Two FortiMail units operate as an HA cluster, synchronizing both
configuration and data, providing failover protection.
•Config-only HA: Up to 25 FortiMail units use an identical configuration, but do not
synchronize data, and therefore operate as independent FortiMail units.
Fortinet recommends HA to achieve uninterrupted service.
For more information on HA, see the FortiMail Administration Guide.
FortiMail™ Secure Messaging Platform Version 4.0 Patch 1 Install Guide
20Revision 2
http://docs.fortinet.com/ • Feedback
Page 21
Hardware installation Cautions and warnings
Hardware installation
This chapter provides information on mounting and connecting a FortiMail unit (except for
the FortiMail-2000B unit and FortiMail-5001A board) to your network. For information
about installing the FortiMail-2000B unit, see “FortiMail-2000B hardware installation” on
page 33. For information about installing the FortiMail-5001A board, see the “FortiMail5001A hardware installation” on page 53.
This chapter includes the following topics:
•Cautions and warnings
•Environmental specifications
•Mounting the FortiMail unit
•Powering on the FortiMail unit
•Turning off the FortiMail unit
•Connecting to the web-based manager or CLI
Cautions and warnings
Review the following cautions before installing your FortiMail unit.
Grounding
•Ensure the FortiMail unit is connected and properly grounded to a lightning and surge
protector. WAN or LAN connections that enter the premises from outside the building
should be connected to an Ethernet CAT5 (10/100 Mb/s) surge protector.
•Shielded Twisted Pair (STP) Ethernet cables should be used whenever possible rather
than Unshielded Twisted Pair (UTP).
•Do not connect or disconnect cables during lightning activity to avoid damage to the
FortiMail unit or personal injury.
Rack mount instructions
•Elevated Operating Ambient: If installed in a closed or multi-unit rack assembly, the
operating ambient temperature of the rack environment may be greater than room
ambient temperature. Therefore, consideration should be given to installing the
equipment in an environment compatible with the maximum ambient temperature
(Tma) specified by the manufacturer.
•Reduced Air Flow: Installation of the equipment in a rack should be such that the
amount of air flow required for safe operation of the equipment is not compromised.
•Mechanical Loading: Mounting of the equipment in the rack should be such that a
hazardous condition is not achieved due to uneven mechanical loading.
•Circuit Overloading: Consideration should be given to the connection of the
equipment to the supply circuit and the effect that overloading of the circuits might have
on overcurrent protection and supply wiring. Appropriate consideration of equipment
nameplate ratings should be used when addressing this concern.
•Reliable Earthing: Reliable earthing of rack-mounted equipment should be
maintained.
Particular attention should be given to supply connections other than direct connections to
the branch circuit (e.g. use of power strips).
If required to fit into a rack unit, remove the rubber feet from the bottom of the FortiMail
unit.
Environmental specifications
•Operating temperature: 32 to 104°F (0 to 40°C)
If you install the FortiMail unit in a closed or multi-unit rack assembly, the operating
ambient temperature of the rack environment may be greater than room ambient
temperature. Therefore, make sure to install the equipment in an environment
compatible with the manufacturer's maximum rated ambient temperature.
•Storage temperature: -13 to 158°F (-25 to 70°C)
•Humidity: 5 to 90% non-condensing
•Air flow: For rack installation, make sure that the amount of air flow required for safe
operation of the equipment is not compromised.
For free-standing installation, make sure that the FortiMail unit has sufficient clearance
on each side to allow for adequate air flow and cooling.
Mounting the FortiMail unit
FortiMail-100 and FortiMail-100C
Adhere the rubber feet included in the package to the underside of the FortiMail unit, near
the corners of the unit if not already attached.
Place the FortiMail unit on any flat, stable surface. Ensure the FortiMail unit has sufficient
clearance on each side to ensure adequate airflow for cooling.
If you remove the rubber feet, you can alternatively mount the FortiMail unit in a 2U-tall
space in any standard 19-inch rack unit.
FortiMail-400
The FortiMail unit can be placed on any flat surface, or mounted in a standard 19-inch rack
unit.
When placing the FortiMail unit on any flat, stable surface, ensure the FortiMail unit has
sufficient clearance on each side to ensure adequate airflow for cooling.
For rack mounting, use the mounting brackets and screws included with the FortiMail unit.
Caution: To avoid personal injury, you may require two or more people to mount the
FortiMail unit in the rack.
To install the FortiMail unit into a rack
1 Attach the mounting brackets to the side to the unit so that the brackets are on the front
portion of the FortiMail unit.
The following photos illustrate how the brackets should be mounted. Note that the
screw configuration may vary.
FortiMail™ Secure Messaging Platform Version 4.0 Patch 1 Install Guide
22Revision 2
http://docs.fortinet.com/ • Feedback
Page 23
Hardware installation Mounting the FortiMail unit
Figure 2: Installed mounting brackets
2 Position the FortiMail unit in the rack to allow for sufficient air flow.
3 Line up the mounting bracket holes to the holes on the rack, ensuring the FortiMail unit
is level.
4 Finger tighten the screws to attach the FortiMail unit to the rack.
5 Once you verify the spacing of the FortiMail unit and that it is level, tighten the screws
with a screwdriver.
Figure 3: Mounting in a rack
FortiMail-2000A and FortiMail-4000A
To mount the FortiMail unit on a 19-inch rack or cabinet, use the slide rails included with
the product.
Caution: To avoid personal injury or damage to the FortiMail unit, it is highly recommended
a minimum of two people perform this procedure.
Mounting requires three steps:
•disassembling the slide rail from the slide housing
•attaching the slide rail to the sides of the FortiMail unit
•mounting the FortiMail unit to the rack or cabinet
The slide rail assembly has two moving rails within the housing. You need to remove the
innermost rail. This rail will attach to the sides of the FortiMail unit.
Figure 4: FortiMail side rail
To remove the side rail
1 Open the slide rails package and remove the rails.
2 Extend the slide rail and locate the slide rail lock.
3 Push down on the lock while pulling the rail completely out of the slide rail assembly.
4 Repeat these steps for the other slide rail assembly.
You will attach this part to the side of the FortiMail unit.
24Revision 2
FortiMail™ Secure Messaging Platform Version 4.0 Patch 1 Install Guide
http://docs.fortinet.com/ • Feedback
Page 25
Hardware installation Mounting the FortiMail unit
Attaching the slide rail to the FortiMail unit
Attach the disconnected slide rails from the previous step to the sides of the FortiMail unit.
Use the screws provided with the slide rail package, being sure to securely fasten the rail
to the FortiMail chassis.
Mounting the FortiMail unit
Mounting the FortiMail-2000A or FortiMail-4000A is a two step process. First, you must
attached the slide rail housing to the rack or cabinet, then insert the FortiMail unit.
To mount the FortiMail unit
1 Mount the slide rail housing to the rack or cabinet frame. Adjust the outside L-shaped
brackets for a proper fit. Ensure that both housings are on the same level to ensure the
FortiMail unit can easily glide into place and is level.
2 Use the screws and additional L-brackets if required to securely fasten the housing.
3 Position the FortiMail unit so that the back of the unit is facing the rack, and the slide
rails affixed in the previous step line up with the slide rail housing.
4 Gently push the FortiMail unit into the rack or cabinet. You will hear a click when the
slide rail lock has been engaged.
5 Push the FortiMail unit until it is fully inserted into the rack.
FortiMail-2000B
The FortiMail-2000B rack mounting and hard drive installation is described in the
“FortiMail-2000B hardware installation” on page 33.
FortiMail-5001A
Before using the FortiMail-5001A board, it must be inserted into an Advanced
Telecommunications Computing Architecture (ACTA) chassis such as the FortiGate-5140,
FortiGate-5050, or FortiGate-5020 chassis.
Powering on the FortiMail unitHardware installation
For information about installing the FortiMail-5001A board, see the “FortiMail-5001A
hardware installation” on page 53.
Powering on the FortiMail unit
FortiMail-100 and FortiMail-100C
The FortiMail-100 does not have a power switch.
To power on the FortiMail unit
1 Connect the AC adapter to the power connection at the back of the FortiMail unit.
2 Connect the AC adapter to the power cable.
3 Connect the power cable to a power outlet.
The FortiMail unit starts and the Power and Status LEDs light up. The Status LEDs
flash while the FortiMail unit starts up, and remain lit when the system is running.
FortiMail-400
Use the following steps to connect the power supply to the FortiMail unit.
To power on the FortiMail unit
1 Ensure the power switch, located at the back of the FortiMail unit is in the off position,
indicated by the “O”.
2 Connect the power cord at the back of the FortiMail unit.
3 Connect the power cable to a power outlet.
4 Set the power switch on the back left of the FortiMail unit to the on position indicated by
the “I”.
After a few seconds, SYSTEM STARTING appears on the LCD. The main menu setting
appears on the LCD when the system is running.
FortiMail-2000A and FortiMail-4000A
The FortiMail unit does not have an on/off switch.
To power on the FortiMail unit
1 Connect the two power cables to the power connections on the back of the
FortiMail unit.
2 Connect the two power cables to power outlets.
Each power cable should be connected to a different power source. If one power
source fails, the other may still be operative.
After a few seconds, SYSTEM STARTING appears on the LCD. The main menu setting
appears on the LCD when the system is running.
The FortiMail unit starts and the Power and Status LEDs light up. The Status LEDs
flash while the FortiMail unit starts up, and remain lit when the system is running.
Note: If only one power supply is connected, an audible alarm sounds to indicate a failed
power supply. Press the red alarm cancel button on the rear panel next to the power supply
to stop the alarm.
FortiMail™ Secure Messaging Platform Version 4.0 Patch 1 Install Guide
26Revision 2
http://docs.fortinet.com/ • Feedback
Page 27
Hardware installation Turning off the FortiMail unit
FortiMail-2000B
Use the following steps to connect the power supply to the FortiMail unit.
To power on the FortiMail unit
1 Connect the two power cables to the power connections on the back of the
FortiMail unit.
2 Connect the two power cables to power outlets.
Each power cable should be connected to a different power source. If one power
source fails, the other may still be operative.
3 Press the power switch on the front to turn on the unit.
FortiMail-5001A
To power on the FortiMail-5001A board, you must turn on the chassis power. For details,
see the FortiGate 5000 series chassis guides at http://docs.fortinet.com.
Connecting to the network
Until the FortiMail unit is configured with an IP address and other settings in the Quick
Start Wizard required to connect to your network, you may prefer to connect the FortiMail
unit directly to your management computer, or through a switch, in a peer network that is
isolated from your overall network. However, isolation is not required.
Note: If you will upgrade the FortiMail firmware and configure the FortiMail unit while it is
isolated from your overall network, download the FortiMail firmware to your management
computer before disconnecting it from your overall network. For details, see “Updating the
firmware” on page 63.
Using the supplied Ethernet cable, connect one end of the cable to port1 on the FortiMail
unit; connect the other end of the cable to the router, switch, or directly to your
management computer.
Turning off the FortiMail unit
Always shut down the FortiMail unit properly before turning off the power switch to avoid
potential hardware problems. This enables the hard drives to spin down and park correctly
and avoid losing data.
To power off the FortiMail unit
1 From the web-based manager (see “Connecting to the web-based manager” on
page 28), go to Management > Status > Status in the basic mode of the web-based
manager, or System > Status > Status in the advanced mode of the web-based
manager.
2 In the System Command widget, select Shutdown.
3 Turn off and/or disconnect the power cables from the power supply.
Powering off the FortiMail-5001A board
To avoid potential hardware problems or data loss, always shut down the board before
powering down the chassis.
Connecting to the web-based manager or CLIHardware installation
Note: Executing a shutdown command will shut down the board’s operating system. The
board itself will still receive power from the chassis and indicator lights on the board may
remain lit after a successful shut down operation.
Powering off the FortiMail board using the web-based manager
1 To shut down the FortiMail board, go to System > Status in the advanced
management mode or Management > Status in the basic management mode.
2 Select Shutdown under System Command.
3 Confirm the operation by selecting OK.
4 The FortiMail board is now shut down. Power to the chassis can be safely turned off.
Powering off the FortiMail board using the CLI commands
1 Connect to the FortiMail board and enter the shutdown command.
execute shutdown
2 Confirm the operation by pressing y.
You can now safely turn off power to the chassis.
Connecting to the web-based manager or CLI
To configure, maintain, and administer the FortiMail unit, you need to connect to it. There
are three methods for these tasks:
•using the web-based manager, a graphical user interface (GUI), from within a current
web browser
•using the command line interface (CLI), a command line interface similar to DOS or
UNIX commands, from a Secure Shell (SSH) or Telnet terminal
•using the front panel’s LCD display and control buttons on some models that are
equipped with LCD displays and control buttons
If you are connecting for the first time, or if you have just reset the configuration to its
default state, or have just restored the firmware, access to the CLI and/or web-based
manager is not yet configured, and you must access it using the default settings.
In that case, you can use the following procedures to connect.
After you have connected, you can use the web-based manager or CLI to configure basic
network settings and access to the CLI and/or web-based manager through your network.
Connecting to the web-based manager
To connect to the web-based manager using its default settings, you must have:
•a computer with an Ethernet port
•a web browser such as Microsoft Internet Explorer version 6.0 or greater, or a recent
version of Mozilla Firefox, with Adobe Flash Player 10 or greater plug-in
•a crossover Ethernet cable
FortiMail™ Secure Messaging Platform Version 4.0 Patch 1 Install Guide
28Revision 2
http://docs.fortinet.com/ • Feedback
Page 29
Hardware installation Connecting to the web-based manager or CLI
Table 2: Default settings for connecting to the web-based manager
To connect to the web-based manager
1 On your management computer, configure the Ethernet port with the static IP address
192.168.1.2 with a netmask of 255.255.255.0.
1 Using the Ethernet cable, connect your computer’s Ethernet port to the FortiMail unit’s
port1.
2 Start your web browser and enter the URL https://192.168.1.99/admin. (Remember to
include the “s” in https://.)
To support HTTPS authentication, the FortiMail unit ships with a self-signed security
certificate, which it presents to clients whenever they initiate an HTTPS connection to
the FortiMail unit. When you connect, depending on your web browser and prior
access of the FortiMail unit, your browser might display two security warnings related
to this certificate:
• The certificate is not automatically trusted because it is self-signed, rather than
being signed by a valid certificate authority (CA). Self-signed certificates cannot be
verified with a proper CA, and therefore might be fraudulent. You must manually
indicate whether or not to trust the certificate.
• The certificate might belong to another web site. The common name (CN) field in
the certificate, which usually contains the host name of the web site, does not
exactly match the URL you requested. This could indicate server identity theft, but
could also simply indicate that the certificate contains a domain name while you
have entered an IP address. You must manually indicate whether this mismatch is
normal or not.
Both warnings are normal for the default certificate.
3 Verify and accept the certificate, either permanently (the web browser will not display
the self-signing warning again) or temporarily. You will not be able to log in until you
have accepted the certificate.
For details on accepting the certificate, see the documentation for your web browser.
4 In the Name field, type admin, then select Login. (In its default state, there is no
password for this account.)
Login credentials entered are encrypted before they are sent to the FortiMail unit. If
your login is successful, the web-based manager is displayed. To continue, see
“Updating the firmware” on page 63.
Connecting to the CLI
Using its default settings, you can access the CLI from your management computer using
either of these two ways:
•a local serial console connection
•an SSH connection, either local or through the network
To connect to the CLI using a local serial console connection, you must have:
•a computer with a serial communications (COM) port
Connecting to the web-based manager or CLIHardware installation
•the RJ-45-to-DB-9 serial or null modem cable included in your FortiMail package
•terminal emulation software, such as HyperTerminal for Microsoft Windows
To connect to the CLI using an SSH connection, you must have:
•a computer with an Ethernet port
•a crossover Ethernet cable
•an SSH client, such as PuTTY
Table 3: Default settings for connecting to the CLI by SSH
Network Interfaceport1
IP Address192.168.1.99
SSH Port Number22
Administrator Accountadmin
Password(none)
To connect to the CLI using a local serial console connection
Note: The following procedure uses Microsoft HyperTerminal. Steps may vary with other
terminal emulators.
1 Using the RJ-45-to-DB-9 or null modem cable, connect your computer’s serial
communications (COM) port to the FortiMail unit’s console port.
2 Verify that the FortiMail unit is powered on.
3 On your management computer, start HyperTerminal.
4 On Connection Description, enter a Name for the connection, and select OK.
5 On Connect To, from Connect using, select the communications (COM) port where you
connected the FortiMail unit.
6 Select OK.
7 Select the following Port settings and select OK.
Bits per second9600
Data bits8
ParityNone
Stop bits1
Flow controlNone
8 Press Enter.
The terminal emulator connects to the CLI, and the CLI displays a login prompt.
9 Type admin and press Enter twice. (In its default state, there is no password for this
account.)
The CLI displays the following text:
Welcome!
Type ? for a list of commands.
You can now enter commands. To continue, see “Updating the firmware” on page 63.
For information about how to use the CLI, including how to connect to the CLI using
SSH or Telnet, see the FortiMail CLI Reference.
FortiMail™ Secure Messaging Platform Version 4.0 Patch 1 Install Guide
30Revision 2
http://docs.fortinet.com/ • Feedback
Page 31
Hardware installation Connecting to the web-based manager or CLI
To connect to the CLI using an SSH connection
Note: The following procedure uses PuTTY. Steps may vary with other SSH clients.
1 On your management computer, configure the Ethernet port with the static IP address
192.168.1.2 with a netmask of 255.255.255.0.
2 Using the Ethernet cable, connect your computer’s Ethernet port to the FortiMail unit’s
port1.
3 Verify that the FortiMail unit is powered on.
4 On your management computer, start your SSH client.
5 In Host Name (or IP Address), type 192.168.1.99.
6 In Port, type 22.
7 From Connection type, select SSH.
8 Select Open.
The SSH client connects to the FortiMail unit.
The SSH client may display a warning if this is the first time you are connecting to the
FortiMail unit and its SSH key is not yet recognized by your SSH client, or if you have
previously connected to the FortiMail unit but it used a different IP address or SSH key.
If your management computer is directly connected to the FortiMail unit with no
network hosts between them, this is normal.
9 Click Yes to verify the fingerprint and accept the FortiMail unit’s SSH key. You will not
be able to log in until you have accepted the key.
The CLI displays a login prompt.
10 Type admin and press Enter. (In its default state, there is no password for this
account.)
The CLI displays the following text:
Type ? for a list of commands.
You can now enter commands. To continue, see “Updating the firmware” on page 63.
For information about how to use the CLI, including how to connect to the CLI using
SSH or Telnet, see the FortiMail CLI Reference.
Using the front panel’s control buttons and LCD display
On FortiMail-400 and FortiMail-2000 models, you can use the front panel’s control buttons
and LCD display to configure:
•IP addresses and netmasks for each of the network interfaces
•the default gateway
•the operating mode
You can also use the front panel to reset the FortiMail unit to the default settings for its
Connecting to the web-based manager or CLIHardware installation
Table 4: Control buttons on the front panel
ButtonDescription
EnterMove into the currently selected menu area, or confirm your selected
EscExit the current menu area.
Up Select the previous option, or increase the number for an IP address,
Down Select the next option, or decrease the number for an IP address,
option.
default gateway address, or netmask.
default gateway address, or netmask.
After using the front panel to configure these basic settings, you must still connect to the
web-based manager to complete additional setup. To continue, see “Connecting to the
web-based manager” on page 28.
FortiMail™ Secure Messaging Platform Version 4.0 Patch 1 Install Guide
32Revision 2
http://docs.fortinet.com/ • Feedback
Page 33
FortiMail-2000B hardware installation Mounting the FortiMail unit
FortiMail-2000B hardware installation
This chapter describes:
•Mounting the FortiMail unit
•Installing the cable management arm
•Installing the hard drives
•Installing the bezel
•Connecting the keyboard, mouse, and monitor
•Connecting the power cables
•Securing the power cord
Mounting the FortiMail unit
The FortiMail-2000B unit comes with a sliding rail kit. Use the instructions below to install
the rails.
Caution: Only trained service technicians are authorized to remove the system cover and
access any of the components inside the system. Before you begin, review the safety
instructions that came with the system.
Note: The illustrations in this document are not intended to represent a specific server.
To install the sliding rail kit
1 Locate the components for installing the rail kit assembly:
Mounting the FortiMail unitFortiMail-2000B hardware installation
1
2
Figure 1: Rail kit contents
2 In square-hole racks, do the following:
•Position the left and right rail end pieces of the rail module labeled FRONT facing
inward and orient each end piece to seat in the square holes on the front side of the
vertical rack flanges (3).
FortiMail™ Secure Messaging Platform Version 4.0 Patch 1 Install Guide
34Revision 2
http://docs.fortinet.com/ • Feedback
Page 35
FortiMail-2000B hardware installation Mounting the FortiMail unit
3
6
5
4
Figure 2: Installing and removing the rails (square-hole racks)
•Align each end piece to seat the pegs in the bottom hole of the first U and the top
hole of the second U (4).
•Engage the back end of the rail until it fully seats on the vertical rack flange and the
second “tooth” on the latch locks in place. Repeat these steps to position and seat
the front end piece on the vertical flange (5).
•To remove the rails, pull on the latch release button on the end piece midpoint and
unseat each rail (6).
3 In round-hole racks, do the following:
•Position the left and right rail end pieces of the rail module labeled FRONT facing
inward and orient each end piece to seat in the round holes on the front side of the
vertical rack flanges (7).
Mounting the FortiMail unitFortiMail-2000B hardware installation
7
8
9
10
Figure 3: Installing and removing the rails (round-hole racks)
•Align each end piece to seat the pegs in the bottom hole of the first U and the top
hole of the second U (8).
•Engage the back end of the rail until it fully seats on the vertical rack flange and the
first “tooth” on the latch locks in place. Repeat these steps to position and seat the
front end piece on the vertical flange (9).
•To remove the rails, pull on the latch release button on the end piece midpoint and
unseat each rail (10).
4 To install the system into the rack, do the following:
•Pull the inner slide rails out of the rack until they lock into place (11).
FortiMail™ Secure Messaging Platform Version 4.0 Patch 1 Install Guide
36Revision 2
http://docs.fortinet.com/ • Feedback
Page 37
FortiMail-2000B hardware installation Mounting the FortiMail unit
11
12
13
14
Figure 4: Installing the system on the rack
•Locate the three shoulder screws on one side of the system and lower them into the
J-slots on the slide assembly (12).
•Seat the three screws on the other side, lowering the system until all shoulder
screws engage in the J-slots (13).
•Push the system inward until the front release latch clicks into place. Press the
slide-release lock buttons on both rails and slide the system into the rack (14).
5 To engage and release the slam latch, do the following:
•Facing the front, locate the slam latch on either side of the system (15).
Mounting the FortiMail unitFortiMail-2000B hardware installation
1
2
3
Figure 5: Engaging and releasing the slam latch
•The latches engage automatically as the system is pushed into the rack and are
released by pulling up on the latches (16).
•To secure the system for shipment in the rack or for other unstable environments,
locate the hard-mount screw under each latch and tighten each screw with a #2
Phillips screwdriver (17).
6 To route the cables, do the following:
•Locate the inner and outer CMA brackets on the interior sides of both rack flanges
(18).
FortiMail™ Secure Messaging Platform Version 4.0 Patch 1 Install Guide
38Revision 2
http://docs.fortinet.com/ • Feedback
Page 39
FortiMail-2000B hardware installation Mounting the FortiMail unit
18
20
19
Figure 6: Routing the cables
•Bundle the cables gently, pulling them clear of the system connectors to the left and
right sides (19).
•Thread the Velcro straps through the tooled slots on the outer or inner CMA
brackets on each side of the system to secure the cable bundles (20).
Removing the system from the rack
To remove the system from the rack
1 Locate the lock levers on the front ends of both inner rails (1).
Installing the cable management armFortiMail-2000B hardware installation
1
3
2
Figure 7: Removing the system from the rack
2 Pull up on each lever into the release position to unlock (2).
3 Grasp the sides of the system firmly and pull forward and up to unseat the system from
the J-slots. Lift the system up and away from the rack and place on a level surface (3).
Installing the cable management arm
The FortiMail-2000B unit comes with a cable management arm. Use the instructions
below to install the arm.
Caution: Only trained service technicians are authorized to remove the system cover and
access any of the components inside the system. Before you begin, review the safety
instructions that came with the system.
Note: The illustrations in this document are not intended to represent a specific server.
To install the cable management arm
1 Locate the components for installing the Cable Management Arm (CMA) assembly:
•Cable Management Arm tray (1)
•Cable Management Arm (2)
•Nylon cable tie wraps (3)
40Revision 2
FortiMail™ Secure Messaging Platform Version 4.0 Patch 1 Install Guide
http://docs.fortinet.com/ • Feedback
Page 41
FortiMail-2000B hardware installation Installing the cable management arm
1
2
3
Figure 8: Cable Management Arm kit contents
Note: To secure the CMA for shipment in the rack, loop the tie wraps around both baskets
and tray and cinch them firmly. For larger CMAs, the tie wraps can be threaded through the
inner and outer baskets and around the tray to secure them. Securing the CMA in this
manner will also secure your system in unstable environments.
2 To install or remove the Cable Management Arm Tray, do the following:
Note: The CMA tray provides support and acts as a retainer for the CMA.
•Align and engage each side of the tray with the receiver brackets on the inner
edges of the rails and push forward until the tray clicks into place (4).
Installing the cable management armFortiMail-2000B hardware installation
5
4
Figure 9: Installing and removing the cable management arm tray
•To remove the tray, squeeze the latch-release buttons on both sides toward the
center and pull the tray out of the receiver brackets (5).
3 To install and remove the CMA, do the following:
Note: You can attach the CMA to either the right or left mounting rail, depending on how
you intend to route cables from the system. Mounting the CMA on the side opposite of the
power supplies is recommended; otherwise, the CMA must be disconnected in order to
remove the outer power supply. You must remove the tray before removing the power
supplies.
•At the back of the system, fit the latch on the front end of the CMA on the innermost
bracket of the slide assembly until the latch engages (6).
FortiMail™ Secure Messaging Platform Version 4.0 Patch 1 Install Guide
42Revision 2
http://docs.fortinet.com/ • Feedback
Page 43
FortiMail-2000B hardware installation Installing the cable management arm
6
7
8
Figure 10: Installing and removing the cable management arm
•Fit the other latch on the end of the outermost bracket until the latch engages (7).
•To remove the CMA, disengage both latches by pressing the CMA release buttons
at the top of the inner and outer latch housings (8).
4 To move the CMA away from the CMA tray, do the following:
•The CMA can be pulled away from the system and extended away from the tray for
access and service (9).
Installing the cable management armFortiMail-2000B hardware installation
9
10
Figure 11: Moving the CMA away from the CMA tray
•At the hinged end, lift the CMA up and off of the tray to unseat it from the tray catch.
Once it is unseated from the tray, swing the CMA away from the system (10).
Note: You can also extend the CMA into the service position once it is cabled to access the
back of the system.
5 To cable the system using the CMA, do the following:
Caution: To avoid potential damage from protruding cables, secure any slack in the status
indicator cable before routing this cable through the CMA.
•Using the tie wraps provided, bundle the cables together as they enter and exit the
baskets so they do not interfere with adjacent systems (11).
FortiMail™ Secure Messaging Platform Version 4.0 Patch 1 Install Guide
44Revision 2
http://docs.fortinet.com/ • Feedback
Page 45
FortiMail-2000B hardware installation Installing the hard drives
11
12
13
14
15
16
Figure 12: Cabling the system using the CMA
•With the CMA in the service position, route the cable bundle through the inner and
outer baskets (12).
•Use the preinstalled Velcro straps on either end of the baskets to secure the cables
(13).
•Adjust the cable slack as needed at the hinge position (14).
•Swing the CMA back into place on the tray (15).
•Install the status indicator cable at the back of the system and secure the cable by
routing it through the CMA. Attach the other end of this cable to the corner of the
outer CMA basket. (16).
Installing the hard drives
The FortiMail-2000B unit has six 3.5-inch drive bays. All chassis support hot-swappable
SAS and SATA hard drives.
All drives are installed at the front of the system and connect to the system board through
the SAS backplane. Hard drives are supplied in special hot-swappable hard-drive carriers
that fit in the hard-drive bays.
Caution: Do not turn off or reboot your system while the drive is being formatted. Doing so
can cause a drive failure
Note: Use only drives that have been tested and approved for use with the SAS backplane
board.
When you format a hard drive, allow enough time for the formatting to be completed. Be
aware that high-capacity hard drives can take a number of hours to format.
Installing the hard drivesFortiMail-2000B hardware installation
3
1
2
3
Mixed SAS/SATA hard-drive configurations
Mixed hard-drive configurations of SAS and SATA drives are allowed. In this configuration,
two SAS drives must be installed in hard-drive slots 0 and 1 only. The remaining slots can
have SATA drives installed.
Mixed 2.5-inch and 3.5-inch configurations of SAS and SATA drives are also supported in
the 3.5-inch–bay chassis only. In this configuration, two 10,000-RPM 2.5-inch SAS drives
installed in 3.5-inch adapters must be used in hard-drive slots 0 and 1 only. The remaining
hard drives must be 3.5 inches in size and must be either all SAS or all SATA drives.
Removing a hard-drive blank
Caution: To maintain proper system cooling, all empty hard-drive bays must have drive
blanks installed
1 Remove the front bezel. See “Installing the Bezel” on page 18.
2 Grasp the front of the hard-drive blank, press the release lever on the right side, and
slide the blank out until it is free of the drive bay. See Figure 13.
Figure 13: Removing and Installing a Hard Drive Blank
13.5-in hard drive blank22.5-in hard drive blank
3release latch
Installing a hard-drive blank
Align the hard-drive blank with the drive bay and insert the blank into the drive bay until the
release lever clicks into place.
Removing a hot-swap hard drive
Caution: Ensure that your operating system supports hot-swap drive removal and
installation. See the documentation provided with your operating system for more
information.
1 If present, remove the front bezel. See “Installing the Bezel” on page 18.
FortiMail™ Secure Messaging Platform Version 4.0 Patch 1 Install Guide
46Revision 2
http://docs.fortinet.com/ • Feedback
Page 47
FortiMail-2000B hardware installation Installing the hard drives
2
1
2 From the RAID management software, prepare the drive for removal. Wait until the
hard-drive indicators on the drive carrier signal that the drive can be removed safely.
See your SAS RAID controller documentation for information about hot-swap drive
removal.
If the drive has been online, the green activity/fault indicator will flash as the drive is
powered down. When the drive indicators are off, the drive is ready for removal.
3 Press the button on the front of the drive carrier and open the drive carrier release
handle to release the drive. See Figure 14.
4 Slide the hard drive out until it is free of the drive bay.
5 Insert a drive blank in the vacated drive bay. See “Installing a hard-drive blank” on
page 46.
6 If applicable, install the bezel. See “Installing the Bezel” on page 18.
Installing a hot-swap hard drive
Caution: When installing a hard drive, ensure that the adjacent drives are fully installed.
Inserting a hard-drive carrier and attempting to lock its handle next to a partially installed
carrier can damage the partially installed carrier's shield spring and make it unusable.
1 If present, remove the front bezel. See “Installing the Bezel” on page 18.
2 If a drive blank is present in the bay, remove it. See “Removing a hard-drive blank” on
page 46.
Figure 14: Installing a hot-swap hard drive
1release button2hard drive carrier handle
3 Install the hot-swap hard drive.
•Press the button on the front of the drive carrier and open the handle.
•Insert the hard-drive carrier into the drive bay until the carrier contacts the
backplane.
•Close the handle to lock the drive in place.
4 If applicable, install the bezel. See “Installing the Bezel” on page 18.
A lock on the bezel restricts access to the power button, optical drive, and hard drive(s).
The LCD panel and navigation buttons are accessible through the front bezel.
FortiMail™ Secure Messaging Platform Version 4.0 Patch 1 Install Guide
48Revision 2
http://docs.fortinet.com/ • Feedback
Page 49
FortiMail-2000B hardware installation Connecting the keyboard, mouse, and monitor
4
1
3
2
To remove the front bezel
1 Using the system key, unlock the bezel.
2 Pull up on the release latch next to the key lock.
3 Rotate the left end of the bezel away from the system to release the right end of the
bezel.
4 Pull the bezel away from the system. See Figure 16.
Figure 16: Removing the front bezel
1release latch2bezel
3hinge tabs4key lock
To install the front bezel
1 Insert the hinge tab on the right of the bezel into the slot on the right side of the system
front panel.
2 Rotate the left side of the bezel toward the system.
3 Press the bezel to the system to engage the latch.
Connecting the power cablesFortiMail-2000B hardware installation
Figure 17: Connecting the keyboard, mouse, and monitor
Connect the keyboard, mouse, and monitor (optional).
The connectors on the back of your system have icons indicating which cable to plug into
each connector. Be sure to tighten the screws (if any) on the monitor's cable connector.
Connecting the power cables
Figure 18: Connecting the power cables.
Connect the system’s power cable(s) to the system and, if a monitor is used, connect the
monitor’s power cable to the monitor.
FortiMail™ Secure Messaging Platform Version 4.0 Patch 1 Install Guide
50Revision 2
http://docs.fortinet.com/ • Feedback
Page 51
FortiMail-2000B hardware installation Securing the power cord
Securing the power cord
Figure 19: Securing the power cord
Bend the system power cable into a loop as shown in the illustration and secure the cable
to the bracket using the provided strap.
Plug the other end of the power cables into a grounded electrical outlet or a separate
power source such as an uninterruptible power supply (UPS) or a power distribution unit
(PDU).
Securing the power cordFortiMail-2000B hardware installation
FortiMail™ Secure Messaging Platform Version 4.0 Patch 1 Install Guide
52Revision 2
http://docs.fortinet.com/ • Feedback
Page 53
FortiMail-5001A hardware installation
FortiMail-5001A hardware installation
Before use, the FortiMail board must be correctly inserted into an Advanced
Telecommunications Computing Architecture (ACTA) chassis such as the FortiGate-5140,
FortiGate-5050, or FortiGate-5020 chassis.
Before inserting the board into a chassis you should make sure the SW-11 switch is set
correctly.
Standalone Mode for FortiGate-5020
(no Shelf Manager)
Changing FortiMail SW11 switch settings
The SW11 switch on the FortiMail board is factory set by Fortinet to detect a shelf
manager (Figure 20). This is the correct setting if you are installing the FortiMail board in a
chassis that contains an operating shelf manager (such as the FortiGate-5140 or
FortiGate-5050 chassis).
Figure 20: FortiGate-5140 and 5050 setting for SW11 (factory default shelf manager mode)
By default a FortiMail board will not start up if the board is installed in a chassis, such as a
FortiGate-5020, that does not contain a shelf manager or that contains a shelf manager
that is not operating. Before installing a FortiMail in a FortiGate-5020 chassis or a chassis
that does not contain an operating shelf manager you must change the SW11 switch
setting as shown in Figure 21.
Figure 21: FortiGate-5020 setting for SW11 (standalone mode)
In all cases you should confirm that you have the correct SW11 setting before installing
the board in a chassis.To change or verify the SW11 switch setting
Table 1: FortiMail SW11 settings for different chassis
ChassisCorrect SW11
Setting
FortiGate-5140 or 5050 or any
ACTA chassis with an
operating shelf manager
(factory default shelf manager
mode).
FortiGate-5020 or any ACTA
chassis without an operating
shelf manager (standalone
mode).
1OffShelf manager cannot find FortiMail
2On
3Off
4Off
1OffFortiMail board will not start up.
2On
3On
4Off
Result of wrong jumper setting
board. No shelf manager information
about the FortiMail board available.
To complete this procedure, you need:
•A FortiMail board
•A tool for changing the SW11 switch setting (optional)
•An electrostatic discharge (ESD) preventive wrist strap with connection cord
Caution: FortiMail boards must be protected from static discharge and physical shock.
Only handle or work with FortiMail boards at a static-free workstation. Always wear a
grounded electrostatic discharge (ESD) preventive wrist strap when handling FortiMail
boards.
1 Attach the ESD wrist strap to your wrist and to an available ESD socket or wrist strap
terminal.
2 If you have installed the FortiMail board in a chassis, remove it.
For removal instructions, see “Removing a FortiMail board” on page 59.
3 Use Figure 22 to locate SW11 on the FortiMail board.
The top of the FortiMail board is covered with a copper heat sink. The printed circuit
board is under the copper heat sink. SW11 is located on the printed circuit board and is
accessible from the left side of the FortiMail board under the copper heat sink (see
Figure 22).
Figure 22: Location of SW11 on the FortiMail board
Location of SW 11
Factory Default (Shelf Manager Required)
SW11
Standalone Mode for FortiGate-5020
(no Shelf Manager)
SW11
1 Off
ON
2 On
3 Off
4 Off
3421
1 Off
ON
2 On
3 On
4 Off
3421
FortiManager-5001A
board (top view)
FortiManager-5001A
Front Faceplate
4 If required, change SW11 to the correct setting.
5 Insert the FortiMail board into a chassis and verify that the board starts up and
operates correctly.
For inserting instructions, see “Inserting a FortiMail board” on page 56.
FortiMail mounting components
To install a FortiMail board you slide the board into an open slot in the front of an ATCA
chassis and then use the mounting components to lock the board into place in the slot.
When locked into place and positioned correctly the board front panel is flush with the
chassis front panel. The board is also connected to the chassis backplane.
Inserting a FortiMail boardFortiMail-5001A hardware installation
Note: FortiMail boards are horizontal when inserted into a FortiGate-5050 chassis and
vertical when inserted into a FortiGate-5140 chassis. The inserting and removing
procedures are the same in either case. For clarity the descriptions in this document refer
to the left (top) and right (bottom) mounting components.
To position the board correctly you must use the mounting components shown in
Figure 23 for the right (bottom) side of the front panel. The mounting components on the
left (top) side of the FortiMail front panel are the same but reversed. The FortiMail
mounting components align the board in the chassis slot and are used to insert and eject
the board from the slot.
Figure 23: FortiMail right (bottom) mounting components
Closed
Alignment Pin
Retention
Screw
Handle
Lock
Handle
Alignment
Pin
Retention
Screw
Lock
Open
Alignment Pin
Alignment
Pin
Retention
Hook
(right handle
only)
Lock
Retention
Handle
Handle
Screw
Hook
(right handle
only)
Screw
Lock
The FortiMail handles align the board in the chassis slot and are used to insert and eject
the board from the slot. The right handle activates a microswitch that turns on or turns off
power to the board. If the FortiMail board is installed in a FortiGate-5140 chassis this is the
lower handle. When the right handle is open the microswitch is off and the board cannot
receive power. When the right handle is fully closed the microswitch is on and if the board
is fully inserted into a chassis slot the board can receive power. You can use the right
handle to cycle the power and reset the board without removing the board from the
chassis. See “Resetting a FortiMail board” on page 61.
Inserting a FortiMail board
The FortiMail board must be fully installed in a chassis slot, with the handles closed and
locked and retention screws fully tightened for the FortiMail board to receive power and
operate normally. If the FortiMail board is not receiving power, the IPM LED glows solid
blue and all other LEDs remain off. For descriptions of the LEDs, see the FortiMail-5001A
QuickStart Guide.
FortiMail-5001A hardware installation Inserting a FortiMail board
It is important to carefully seat the FortiMail board all the way into the chassis, to not use
too much force on the handles, and to make sure that the handles are properly locked.
Only then will the FortiMail board power-on and start up correctly.
FortiMail boards are hot swappable. The procedure for inserting a FortiMail board into a
chassis slot is the same whether or not the chassis is powered on.
To insert a FortiMail board into a chassis slot
To complete this procedure, you need:
•A FortiMail board with either the correct AMC slot filler panel or a FortiGate AMC
module installed in the front panel AMC opening
•An ATCA chassis with an empty slot
•An electrostatic discharge (ESD) preventive wrist strap with connection cord
Caution: FortiMail boards must be protected from static discharge and physical shock.
Only handle or work with FortiMail boards at a static-free workstation. Always wear a
grounded electrostatic discharge (ESD) preventive wrist strap when handling FortiMail
boards.
Caution: Do not carry the FortiMail board by holding the handles or retention screws.
When inserting or removing the FortiMail board from a chassis slot, handle the board by the
front panel. The handles are not designed for carrying the board. If the handles become
bent or damaged the FortiMail board may not align correctly in the chassis slot.
1 Attach the ESD wrist strap to your wrist and to an available ESD socket or wrist strap
terminal.
2 If required, remove the protective metal frame that the FortiMail board has been
shipped in.
3 Insert the FortiMail board into the empty slot in the chassis.
4 Unlock the handles by squeezing the handle locks.
Unlock
Handle
5 Open the handles to their fully open positions.
Caution: To avoid damaging the lock, make sure you squeeze the handles fully to unlock
them before opening. The handles should pop easily out of the board front panel.
Inserting a FortiMail boardFortiMail-5001A hardware installation
Alignment Pin
Alignment Pin
Handle
Open
Handle
Lock
6 Insert the FortiMail board into the empty slot in the chassis.
7 Carefully guide the board into the chassis using the rails in the slot.
Insert the board by applying moderate force to the front faceplate (not the handles) to
slide the board into the slot. The board should glide smoothly into the chassis slot. If
you encounter any resistance while sliding the board in, the board could be aligned
incorrectly. Pull the board back out and try inserting it again.
8 Slide the board in until the alignment pins are inserted half way into their sockets in the
chassis.
9 Turn both handles to their fully-closed positions.
The handles should hook into the sides of the chassis slot. Closing the handles draws
the FortiMail board into place in the chassis slot and into full contact with the chassis
backplane. The FortiMail front panel should be in contact with the chassis front panel.
Both handles lock into place.
As the handles close, power is supplied to the board. If the chassis is powered on the
IPM LED starts flashing blue. If the board is aligned correctly, inserted all the way into
the slot, and the handles are properly closed the IPM LED flashes blue for a few
seconds. At the same time the STATUS LED flashes green, the interface LEDs flash
amber, and the ACC LED starts flashing green. After a few seconds the IPM LED goes
out and the FortiMail firmware starts up. During start up the STATUS LED may
continue to flash green. Once the board has started up and is operating correctly, the
front panel LEDs are lit as described in Ta bl e 2 .
Table 2: FortiMail normal operating LEDs
LEDState
Off (Or flashing green when the system accesses the FortiMail flash
ACC
OOS
(Out of
Service)
Power
Status
IPM
disk.)
Off
Green
Off
Off
If you have installed an AMC module in the FortiMail board, the AMC LEDs are lit as
described in Tab le 3 .
FortiMail-5001A hardware installation Removing a FortiMail board
Table 3: FortiGate AMC module normal operating LEDs
LEDState
HSOff
OOSOff
PWRAmber
OTOff
If the board has not been inserted properly the IPM LED changes to solid blue and all
other LEDS turn off. If this occurs, open the handles, slide the board part way out, and
repeat the insertion process.
10 Once the board is inserted correctly, fully tighten the retention screws to lock the
FortiMail board into position in the chassis slot.
Tighten
Removing a FortiMail board
The following procedure describes how to correctly use the FortiMail mounting
components described in “FortiMail mounting components” on page 55 to remove a
FortiMail board from an ATCA chassis slot.
FortiMail boards are hot swappable. The procedure for removing a FortiMail board from a
chassis slot is the same whether or not the chassis is powered on.
To remove a FortiMail board from a chassis slot
To complete this procedure, you need:
•An ATCA chassis with a FortiMail board installed
•An electrostatic discharge (ESD) preventive wrist strap with connection cord
Caution: FortiMail boards must be protected from static discharge and physical shock.
Only handle or work with FortiMail boards at a static-free workstation. Always wear a
grounded electrostatic discharge (ESD) preventive wrist strap when handling FortiMail
boards.
Retention
Screw
Caution: Do not carry the FortiMail board by holding the handles or retention screws.
When inserting or removing the FortiMail board from a chassis slot, handle the board by the
front panel. The handles are not designed for carrying the board. If the handles become
bent or damaged the FortiMail board may not align correctly in the chassis slot.
1 Attach the ESD wrist strap to your wrist and to an available ESD socket or wrist strap
terminal.
2 Disconnect all cables from the FortiMail board, including all network cables, the
Removing a FortiMail boardFortiMail-5001A hardware installation
Handle
Alignment Pin
Open
Alignment Pin
Lock
Handle
Fully Closed
and Locked
Alignment Pin
Handle
Close
Alignment Pin
Handle
3 Fully loosen the retention screws on the FortiMail front panel.
Retention
Screw
Loosen
4 Unlock the handles by squeezing both handle locks.
5 Open the handles to their fully open positions.
Caution: To avoid damaging the lock, make sure you squeeze the handles fully to unlock
them before opening. The handles should pop easily out of the board front panel.
You need to open the handles with moderate pressure to eject the board from the
chassis. Pivoting the handles turns off the microswitch, turns off all LEDs, and ejects
the board from the chassis slot.
6 Pull the board about half way out.
7 Turn both handles to their fully-closed positions.When the FortiMail handles are fully-
closed they lock into place.
8 Carefully slide the board completely out of the slot.
9 Re-attach the protective metal frame before shipping or storing the FortiMail board.
FortiMail-5001A hardware installation Resetting a FortiMail board
Resetting a FortiMail board
You must eject the FortiMail board from the chassis slot to cycle the power and reset the
board. See “Removing a FortiMail board” on page 59 for information about how to eject a
FortiMail board from a chassis.
Troubleshooting
This section describes the following troubleshooting topics:
•FortiMail system does not start up
•FortiMail status LED is flashing during system operation
FortiMail system does not start up
Shelf manager or firmware problems may prevent a FortiMail board from starting up
correctly.
Chassis with a shelf manager: no communication with shelf manager
If the FortiMail board is receiving power and the handles are fully closed and the FortiMail
still does not start up, the problem could be that the FortiMail cannot communicate with the
chassis shelf manager. This problem can only occur in an ATCA chassis that contains a
shelf manager (such as the FortiGate-5140 and FortiGate-5050).
To correct this problem power down and then restart the chassis. If you are operating a
FortiGate-5000 series chassis you can power down and then restart the chassis without
removing FortiGate-5000 series components.
All chassis: firmware problem
If the FortiMail board is receiving power and the handles are fully closed, and you have
restarted the chassis and the FortiMail still does not start up, the problem could be with
FortiOS. Connect to the FortiMail console and try cycling the power to the board. If the
BIOS starts up, interrupt the BIOS startup and install a new firmware image. For details
about installing a new firmware image in this way, see the FortiGate-5000 Series Firmware
and FortiUSB Guide.
If this does not solve the problem, contact Fortinet Technical Support.
FortiMail status LED is flashing during system operation
Normally, the FortiMail Status LED is off when the FortiMail board is operating
normally. If this LED starts flashing while the board is operating, a fault condition may
exist. At the same time the FortiMail may stop processing traffic.
To resolve the problem you can try removing and reinserting the FortiMail board in the
chassis slot. Reloading the firmware may also help.
If this does not solve the problem there may have been a hardware failure or other
problem. Contact Fortinet Technical Support for assistance.
Updating the firmware Testing new firmware before installing it
Updating the firmware
Fortinet periodically releases FortiMail firmware updates to include enhancements and
address issues. After you have registered your FortiMail unit, FortiMail firmware is
available for download at http://support.fortinet.com.
Installing new firmware can introduce new features and overwrites antivirus and antispam
packages using the versions of the packages that were current at the time that the
firmware image was built. To avoid repeat configuration and updates, update the firmware
before configuring the FortiMail unit and/or updating your FortiGuard Antivirus and
FortiGuard Antispam packages.
For late-breaking information specific to the firmware release version, see the Release
Notes available with that release.
Note: In addition to major releases that contain new features, Fortinet releases patch
releases that resolve specific issues without containing new features and/or changes to
existing features. It is recommended to download and install patch releases as soon as
they are available.
This chapter includes the following topics:
•Testing new firmware before installing it
•Installing firmware
•Installing backup firmware
•Restoring firmware
Testing new firmware before installing it
You can test a new firmware image by temporarily running it from memory, without saving
it to disk. By keeping your existing firmware on disk, if the evaluation fails, you do not have
to re-install your previous firmware. Instead, you can quickly revert to your existing
firmware by simply rebooting the FortiMail unit.
To test a new firmware image
1 Connect your management computer to the FortiMail console port using a RJ-45-to-
DB-9 serial cable or a null-modem cable.
2 Initiate a connection from your management computer to the CLI of the FortiMail unit.
For details, see “Connecting to the CLI” on page 29.
3 Connect port1 of the FortiMail unit directly or to the same subnet as a TFTP server.
4 Copy the new firmware image file to the root directory of the TFTP server.
5 Verify that the TFTP server is currently running, and that the FortiMail unit can reach
the TFTP server.
To use the FortiMail CLI to verify connectivity, enter the following command:
execute ping 192.168.1.168
where 192.168.1.168 is the IP address of the TFTP server.
Testing new firmware before installing itUpdating the firmware
6 Enter the following command to restart the FortiMail unit:
execute reboot
7 As the FortiMail units starts, a series of system startup messages are displayed.
Press any key to display configuration menu........
8 Immediately press a key to interrupt the system startup.
Note: You have only 3 seconds to press a key. If you do not press a key soon enough, the
FortiMail unit reboots and you must log in and repeat the execute reboot command.
If you successfully interrupt the startup process, the following messages appears:
[G]: Get firmware image from TFTP server.
[F]: Format boot device.
[B]: Boot with backup firmware and set as default.
[I]: Configuration and information.
[Q]: Quit menu and continue to boot with default firmware.
[H]: Display this list of options.
Enter G,F,B,I,Q,or H:
9 Type G to get the firmware image from the TFTP server.
The following message appears:
Enter TFTP server address [192.168.1.168]:
10 Type the IP address of the TFTP server and press Enter.
The following message appears:
Enter Local Address [192.168.1.188]:
11 Type a temporary IP address that can be used by the FortiMail unit to connect to the
TFTP server.
The following message appears:
Enter File Name [image.out]:
12 Type the firmware image file name and press Enter.
The FortiMail unit downloads the firmware image file from the TFTP server and
displays a message similar to the following:
Save as Default firmware/Backup firmware/Run image without
saving:[D/B/R]
13 Type R.
The FortiMail image is loaded into memory and uses the current configuration, without
saving the new firmware image to disk.
14 To verify that the new firmware image has been loaded, log in to the CLI and type:
get system status
15 Test the new firmware image.
• If the new firmware image operates successfully, you can install it to disk,
overwriting the existing firmware, using the procedure “Installing firmware” on
page 65.
• If the new firmware image does not operate successfully, reboot the FortiMail unit to
discard the temporary firmware and resume operation using the existing firmware.
FortiMail™ Secure Messaging Platform Version 4.0 Patch 1 Install Guide
64Revision 2
http://docs.fortinet.com/ • Feedback
Page 65
Updating the firmware Installing firmware
Installing firmware
You can use either the web-based manager or the CLI to upgrade or downgrade the
firmware of the FortiMail unit.
Firmware changes are either:
•an upgrade to a newer version
•a reversion to an earlier version
The firmware version number is used to determine if you are upgrading or reverting your
firmware image.
For example, if your current firmware version is FortiMail-400
3.00,build288,080327, changing to FortiMail-400 3.00,build266,071209,
an earlier build number and date, indicates you are reverting.
Caution: Back up your configuration before beginning this procedure.
Reverting to an earlier firmware version could reset the configuration, including the IP
addresses of network interfaces. For information on reconnecting to a FortiMail unit whose
network interface configuration has been reset, see “Connecting to the web-based
manager or CLI” on page 28.
To install firmware using the web-based manager
1 Log in to the Fortinet Technical Support web site, https://support.fortinet.com/.
2 Download the firmware image file to your management computer.
3 Log in to the web-based manager as the “admin” administrator, or an administrator
account whose domain is “system” and that has system configuration read and write
privileges.
4 In the advanced management mode, go to System > Status > Status.
If this menu option does not appear, first select Advanced >> to switch to the advanced
mode of the web-based manager.
5 In the System Information widget, in the Firmware Version row, select Update.
6 Select Browse to locate and select the firmware file that you want to install, then select
OK.
7 Select OK.
Your management computer uploads the firmware image to the FortiMail unit. The
FortiMail unit installs the firmware and restarts. Time required varies by the size of the
file and the speed of your network connection.
If you are downgrading the firmware to a previous version, the FortiMail unit reverts the
configuration to default values for that version of the firmware. You must either
reconfigure the FortiMail unit or restore the configuration file.
8 To verify that the firmware was successfully installed, log in to the web-based manager
and go to System > Status > Status. Text appearing in the Firmware Version row
indicates the currently installed firmware version.
To install firmware using the CLI
1 Log in to the Fortinet Technical Support web site, https://support.fortinet.com/.
2 Download the firmware image file to your management computer.
3 Connect your management computer to the FortiMail console port using a RJ-45-to-
4 Initiate a connection from your management computer to the CLI of the FortiMail unit,
and log in as the “admin” administrator, or an administrator account whose domain is
“system” and that has system configuration read and write privileges.
For details, see “Connecting to the CLI” on page 29.
5 Connect port1 of the FortiMail unit directly or to the same subnet as a TFTP server.
6 Copy the new firmware image file to the root directory of the TFTP server.
7 Verify that the TFTP server is currently running, and that the FortiMail unit can reach
the TFTP server.
To use the FortiMail CLI to verify connectivity, enter the following command:
execute ping 192.168.1.168
where 192.168.1.168 is the IP address of the TFTP server.
8 Enter the following command to download the firmware image from the TFTP server to
the FortiMail unit:
execute restore image <name_str> <tftp_ipv4>
where <name_str> is the name of the firmware image file and <tftp_ipv4> is the
IP address of the TFTP server. For example, if the firmware image file name is
image.out and the IP address of the TFTP server is 192.168.1.168, enter:
execute restore image.out 192.168.1.168
One of the following message appears:
This operation will replace the current firmware version!
Do you want to continue? (y/n)
or:
Get image from tftp server OK.
Check image OK.
This operation will downgrade the current firmware version!
Do you want to continue? (y/n)
9 Type y.
The FortiMail unit downloads the firmware image file from the TFTP server. The
FortiMail unit installs the firmware and restarts. Time required varies by the size of the
file and the speed of your network connection.
If you are downgrading the firmware to a previous version, the FortiMail unit reverts the
configuration to default values for that version of the firmware. You must either
reconfigure the FortiMail unit or restore the configuration file.
10 To verify that the firmware was successfully installed, log in to the CLI and type:
get system status
11 Update the FortiGuard Antivirus definitions.
Note: Installing firmware replaces the current antivirus definitions with those included with
the firmware release that you are installing. After you install the new firmware, make sure
that your FortiGuard Antivirus definitions are up-to-date. For more information, see
“Configuring scheduled updates” on page 91.
Installing backup firmware
You can install backup firmware which can be loaded if the primary firmware fails.
FortiMail™ Secure Messaging Platform Version 4.0 Patch 1 Install Guide
66Revision 2
http://docs.fortinet.com/ • Feedback
Page 67
Updating the firmware Installing backup firmware
To install backup firmware
1 Log in to the Fortinet Technical Support web site, https://support.fortinet.com/.
2 Download the firmware image file to your management computer.
3 Connect your management computer to the FortiMail console port using a RJ-45-to-
DB-9 serial cable or a null-modem cable.
4 Initiate a connection from your management computer to the CLI of the FortiMail unit,
and log in as the “admin” administrator, or an administrator account that has system
configuration read and write privileges.
For details, see “Connecting to the CLI” on page 29.
5 Connect port1 of the FortiMail unit directly or to the same subnet as a TFTP server.
6 Copy the new firmware image file to the root directory of the TFTP server.
7 Verify that the TFTP server is currently running, and that the FortiMail unit can reach
the TFTP server.
To use the FortiMail CLI to verify connectivity, enter the following command:
execute ping 192.168.1.168
where 192.168.1.168 is the IP address of the TFTP server.
8 Enter the following command to restart the FortiMail unit:
execute reboot
9 As the FortiMail units starts, a series of system startup messages are displayed.
Press any key to display configuration menu........
10 Immediately press a key to interrupt the system startup.
Note: You have only 3 seconds to press a key. If you do not press a key soon enough, the
FortiMail unit reboots and you must log in and repeat the execute reboot command.
If you successfully interrupt the startup process, the following messages appears:
[G]: Get firmware image from TFTP server.
[F]: Format boot device.
[B]: Boot with backup firmware and set as default.
[I]: Configuration and information.
[Q]: Quit menu and continue to boot with default firmware.
[H]: Display this list of options.
Enter G,F,B,I,Q,or H:
11 Type G to get the firmware image from the TFTP server.
The following message appears:
Enter TFTP server address [192.168.1.168]:
12 Type the IP address of the TFTP server and press Enter.
The following message appears:
Enter Local Address [192.168.1.188]:
13 Type a temporary IP address that can be used by the FortiMail unit to connect to the
TFTP server.
The following message appears:
Enter File Name [image.out]:
14 Type the firmware image file name and press Enter.
The FortiMail unit downloads the firmware image file from the TFTP server and
displays a message similar to the following:
Save as Default firmware/Backup firmware/Run image without
saving:[D/B/R]
15 Type B.
The FortiMail unit saves the backup firmware image and restarts. When the FortiMail
unit restarts, it is running the primary firmware.
To use backup firmware as the primary firmware
1 Connect your management computer to the FortiMail console port using a RJ-45-to-
DB-9 serial cable or a null-modem cable.
2 Initiate a connection from your management computer to the CLI of the FortiMail unit,
and log in as the “admin” administrator, or an administrator account that has system
configuration read and write privileges.
For details, see “Connecting to the CLI” on page 29.
3 Enter the following command to restart the FortiMail unit:
execute reboot
4 As the FortiMail units starts, a series of system startup messages are displayed.
Press any key to display configuration menu........
Immediately press a key to interrupt the system startup.
If you successfully interrupt the startup process, the following messages appears:
[G]: Get firmware image from TFTP server.
[F]: Format boot device.
[B]: Boot with backup firmware and set as default.
[I]: Configuration and information.
[Q]: Quit menu and continue to boot with default firmware.
[H]: Display this list of options.
Enter G,F,B,I,Q,or H:
5 Type B to reboot and use the backup firmware.
Restoring firmware
If you are unable to connect to the FortiMail unit using the web-based manager or the CLI,
or if you want to install firmware without preserving any existing configuration, you can
restore the firmware.
Note: You have only 3 seconds to press a key. If you do not press a key soon enough, the
FortiMail unit reboots and you must log in and repeat the execute reboot command.
Caution: Back up your configuration before beginning this procedure, if possible. Restoring
firmware resets the configuration, including the IP addresses of network interfaces. For
information on reconnecting to a FortiMail unit whose network interface configuration has
been reset, see “Connecting to the web-based manager or CLI” on page 28.
FortiMail™ Secure Messaging Platform Version 4.0 Patch 1 Install Guide
68Revision 2
http://docs.fortinet.com/ • Feedback
Page 69
Updating the firmware Restoring firmware
Caution: If you are reverting to a previous FortiMail version (for example, reverting from
v3.0 to v2.80), you might not be able to restore your previous configuration from the backup
configuration file.
To restore the firmware
1 Connect your management computer to the FortiMail console port using a RJ-45-to-
DB-9 serial cable or a null-modem cable.
2 Initiate a connection from your management computer to the CLI of the FortiMail unit,
and log in as the “admin” administrator, or an administrator account that has system
configuration read and write privileges.
For details, see “Connecting to the CLI” on page 29.
3 Connect port1 of the FortiMail unit directly or to the same subnet as a TFTP server.
4 Copy the new firmware image file to the root directory of the TFTP server.
5 Verify that the TFTP server is currently running, and that the FortiMail unit can reach
the TFTP server.
To use the FortiMail CLI to verify connectivity, enter the following command:
execute ping 192.168.1.168
where 192.168.1.168 is the IP address of the TFTP server.
6 Enter the following command to restart the FortiMail unit:
execute reboot
7 As the FortiMail units starts, a series of system startup messages are displayed.
Press any key to display configuration menu........
8 Immediately press a key to interrupt the system startup.
Note: You have only 3 seconds to press a key. If you do not press a key soon enough, the
FortiMail unit reboots and you must log in and repeat the execute reboot command.
If you successfully interrupt the startup process, the following messages appears:
[G]: Get firmware image from TFTP server.
[F]: Format boot device.
[B]: Boot with backup firmware and set as default.
[I]: Configuration and information.
[Q]: Quit menu and continue to boot with default firmware.
[H]: Display this list of options.
Enter G,F,B,I,Q,or H:
9 Type G to get the firmware image from the TFTP server.
The following message appears:
Enter TFTP server address [192.168.1.168]:
10 Type the IP address of the TFTP server and press Enter.
The following message appears:
Enter Local Address [192.168.1.188]:
11 Type a temporary IP address that can be used by the FortiMail unit to connect to the
TFTP server.
The following message appears:
Enter File Name [image.out]:
12 Type the firmware image file name and press Enter.
The FortiMail unit downloads the firmware image file from the TFTP server and
displays a message similar to the following:
Save as Default firmware/Backup firmware/Run image without
saving:[D/B/R]
13 Type D.
The FortiMail unit downloads the firmware image file from the TFTP server. The
FortiMail unit installs the firmware and restarts. Time required varies by the size of the
file and the speed of your network connection.
The FortiMail unit reverts the configuration to default values for that version of the
firmware.
Note: Installing firmware replaces the current FortiGuard Antivirus definitions with the
definitions included with the firmware release you are installing. After you install new
firmware, update the antivirus definitions. For details, see “Configuring scheduled updates”
on page 91.
FortiMail™ Secure Messaging Platform Version 4.0 Patch 1 Install Guide
70Revision 2
http://docs.fortinet.com/ • Feedback
Page 71
Choosing the operation mode
Choosing the operation mode
Once the FortiMail unit is mounted and powered on, and you have connected to either the
FortiMail unit’s web-based manager or CLI, you can configure the operation mode of the
FortiMail unit.
FortiMail units can run in one of three operation modes: gateway mode, transparent mode,
and server mode. Requirements of each operation mode vary.
Table 4: Comparison of gateway, transparent, and server mode of operation
GatewayTransparentServer
SMTP roleMTA/relayTransparent
FortiMail unit is hiddenNoYes, if enabledNo
Email user accountsPreferences and
Requires DNS record changeYesNo, if hidden
May require changes to SMTP
client configurations or other
infrastructure
Requires FortiMail unit located
between external MTAs and
protected email server(s)
with no perrecipient
quarantines or
Bayesian scan
Server
Yes
Yes
(FortiMail unit
acts as email
server)
(FortiMail unit
acts as email
server)
In addition, some FortiMail features are specific to the operation mode. As a result,
changing the operation mode may reset your FortiMail configuration.
You will usually choose the operation mode that is appropriate for your topology and
requirements and configure the operation mode only once, during installation, before
using the Quick Start Wizard.
This section describes each operation mode, assisting you in choosing the operation
mode that best suits your requirements.
Characteristics of gateway modeChoosing the operation mode
External
Em ail Server
Local Em ail Users
Rem ote Em ail Users
DNS Server
Internal Em ail Server
172 .16.1.10
Internet
Sw itch
internal
172 .16.1.1
wan1
10.10.10.1
Protected Domain:
@exam ple.co m
Em ail Dom ain:
@exam ple.co m
exam ple.com IN MX 10 fortimail.exam p le.com
fortimail IN A 10.10.10.1
port1
172 .16.1.5
Gateway Mode
Private DNS Server
exam ple.com IN MX 10 mail.exam ple.co m
mail IN A 172.16.1.10
Characteristics of gateway mode
When operating in gateway mode, the FortiMail is a mail transfer agent (MTA), sometimes
also known as an email gateway or relay. The FortiMail unit receives email messages,
scans for viruses and spam, then relays email to its destination email server for delivery.
External MTAs connect to the FortiMail unit, rather than directly to the protected email
server.
FortiMail units operating in gateway mode provide a web-based user interface from which
email users can access personal preferences and email quarantined to their per-recipient
quarantine. However, FortiMail units operating in gateway mode do not locally host
mailboxes such as each email user’s inbox, which are instead stored on protected email
servers.
Gateway mode requires some changes to an existing network. Requirements include MX
records on public DNS servers for each protected domain, which must refer to the
FortiMail unit instead of the protected email servers. You may also need to configure
firewalls or routers to direct SMTP traffic to the FortiMail unit rather than your email
servers.
Figure 24: Example gateway mode topology
Characteristics of transparent mode
72Revision 2
For example, an Internet service provider (ISP) could deploy a FortiMail unit to protect
their customers’ email servers. For security reasons, customers do not want their email
servers to be directly visible to external MTAs. Therefore, the ISP installs the FortiMail unit
in gateway mode, and configures its network such that all email traffic must pass through
the FortiMail unit before reaching customers’ email servers.
For sample deployment scenarios, see “Gateway mode deployment” on page 95.
When operating in transparent mode, the FortiMail is either an implicit relay or a proxy.
The FortiMail unit intercepts email messages, scans for viruses and spam, then transmits
email to its destination email server for delivery. External MTAs connect through the
FortiMail unit to the protected email server.
Transparency at both the network and application layers is configurable, but not required.
When hiding, the FortiMail unit preserves the IP address and domain name of the SMTP
client in IP headers and the SMTP envelope and message headers, rather than replacing
them with its own.
FortiMail™ Secure Messaging Platform Version 4.0 Patch 1 Install Guide
http://docs.fortinet.com/ • Feedback
Page 73
Choosing the operation mode Characteristics of server mode
FortiMail units operating in transparent mode provide a web-based user interface from
which email users can access personal preferences and email quarantined to their perrecipient quarantine. However, FortiMail units operating in transparent mode do not locally
host mailboxes such as each email user’s inbox, which are instead stored on protected
email servers.
By default, FortiMail units operating in transparent mode are configured as a bridge, with
all network interfaces on the same subnet. You can configure out-of-bridge network
interfaces if you require them, such as if you have some protected email servers that are
not located on the same subnet.
Transparent mode usually requires no changes to an existing network. Requirements
include that the FortiMail unit must be physically inline between the protected email server
and all SMTP clients — unlike gateway mode, because FortiMail units operating in
transparent mode are invisible, clients cannot be configured to route email directly to the
FortiMail unit, and so it must be physically placed where it can intercept the connection.
Figure 25: Example transparent mode topology
Local Email Users
External
Email Server
Protected Domain:
@example.com
Transparent Mode
port1
Internal Email Server
172.16.1.10
Email Domain:
@example.com
port2
example.com IN MX 10 mail.example.com
Router
Private DNS Server
mail IN A 172.16.1.10
10.10.10.1
Internet
Remote Email Users
Public DNS Server
example.com IN MX 10 mail.example.com
mail IN A 10.10.10.1
Caution: Do not connect two ports to the same VLAN on a switch or the same hub. Some
Layer 2 switches become unstable when they detect the same media access control (MAC)
address originating on more than one network interface on the switch, or from more than
one VLAN.
For example, a school might want to install a FortiMail unit to protect its mail server, but
does not want to make any changes to its existing DNS and SMTP client configurations or
other network topology. Therefore, the school installs the FortiMail unit in transparent
mode.
For sample deployment scenarios, see the chapter “Transparent mode deployment” on
page 119.
Characteristics of server mode
When operating in server mode, the FortiMail is a stand-alone email server. The FortiMail
unit receives email messages, scans for viruses and spam, then delivers email to its email
users’ mailboxes. External MTAs connect to the FortiMail unit, which itself is also the
protected email server.
Configuring the operation modeChoosing the operation mode
External
Em ail Server
Local Em ail Users
Rem ote Em ail Users
Public DNS Server
Internet
dm z
192.168.1.1
wan1
10.10.10.1
port1
192.168.1.5
internal
172 .16.1.1
(v irtual IP:
172 .16.1.2)
Em ail Dom ain:
@exam ple.com
exam p le.co m IN MX 10 fortimail.exam p le.co m
fortimail IN A 10.10.10.1
Server Mode
Private DNS Server
FortiMail units operating in server mode provide a web-based user interface from which
email users can access not only personal preferences and email quarantined to their perrecipient quarantine, but also their locally host mailboxes such as each email user’s inbox.
In addition, email users can retrieve email using POP3 or IMAP.
Server mode requires some changes to an existing network. Requirements include MX
records on public DNS servers for each protected domain, which must refer to the
FortiMail unit. You may also need to configure firewalls or routers to direct SMTP traffic to
the FortiMail unit.
Figure 26: Example server mode topology
For example, a company might be creating a network, and does not have an existing
email server. The company wants the convenience of managing both their email server
and email security on one network device. Therefore, the company deploys the FortiMail
unit in server mode.
For sample deployment scenarios, see the chapter “Server mode deployment” on
page 139.
Configuring the operation mode
74Revision 2
By default, FortiMail units operate in gateway mode. If you do not want your FortiMail unit
to operate in gateway mode, before configuring the FortiMail unit or using the Quick Start
Wizard, select the operation mode.
To select the operation mode
1 Go to Management > Status > Status.
If this menu path is not available, first select Basic >> to switch to the basic mode of the
web-based manager.
2 In the System Information widget, in the Operation Mode row, select Change.
3 From Operation Mode, select either Gateway, Server, or Transparent.
FortiMail™ Secure Messaging Platform Version 4.0 Patch 1 Install Guide
http://docs.fortinet.com/ • Feedback
Page 75
Choosing the operation mode Configuring the operation mode
4 Select OK.
A confirmation dialog appears, warning you that many settings will revert to their
default value for the version of your FortiMail unit’s firmware.
5 Select OK.
The FortiMail unit changes the operation mode and restarts. When it has completely
restarted, reconnect to the web-based manager of the FortiMail unit to continue the
installation.
Configuring the operation modeChoosing the operation mode
FortiMail™ Secure Messaging Platform Version 4.0 Patch 1 Install Guide
76Revision 2
http://docs.fortinet.com/ • Feedback
Page 77
Quick Start Wizard Step 1: Changing the “admin” password
Quick Start Wizard
The Quick Start Wizard leads you through required configuration steps, helping you to
quickly set up your FortiMail unit.
All settings configured by the Quick Start Wizard can also be configured through the basic
and advanced modes of the web-based manager. However, the Quick Start Wizard
presents each setting in the necessary order, and contains descriptions to assist you in
configuring each setting. These descriptions are not available in either the basic mode or
advanced mode of the web-based manager.
In addition to required setup, the Quick Start Wizard creates two report profiles:
• predefined_report_yesterday
• predefined_report_last_week
These reports are not regularly scheduled reports, and will be generated only when you
manually initiate them in Log & Report > Reports > Config by selecting Run Now.
Caution: Before running the Quick Start Wizard, select the operation mode of the FortiMail
unit, such as gateway mode, transparent mode, or server mode. Failure to select the
operation mode before running the Quick Start Wizard may require you to run the Quick
Start Wizard again after changing the operation mode, as changing the operation mode
may reset or change part of the configuration performed by the Quick Start Wizard. For
more information on selecting the operation mode, see “Choosing the operation mode” on
page 71.
To begin the Quick Start Wizard, go to Quick Start >>. If this menu path is not available,
first select Basic >> to switch to the basic mode of the web-based manager.
The following topics describe steps when using in the Quick Start Wizard:
•Step 1: Changing the “admin” password
•Step 2: Configuring the network settings and system time
•Step 3: Configuring local host settings
•Step 4: Adding protected domains
•Step 5: Configuring incoming antispam and antivirus settings
•Step 6: Configuring access control rules and outgoing antispam and antivirus settings
•Step 7: Reviewing and saving the configuration
•Continuing the installation
Step 1: Changing the “admin” password
Step 1 of the Quick Start Wizard configures the password of the default and most
privileged administrator account, admin, which, by default, has no password. For security
reasons, you should provide a password for the admin administrator account.
Caution: Failure to configure a strong administrator password could compromise the
security of your FortiMail unit.
To proceed to Step 2: Configuring the network settings and system time, select Next >.
Step 2: Configuring the network settings and system timeQuick Start Wizard
Figure 27: Quick Start Wizard: Step 1
Step 2: Configuring the network settings and system time
Step 2 of the Quick Start Wizard configures basic system time and network settings.
Available settings vary by whether or not the FortiMail unit is operating in transparent
mode.
To proceed to Step 3: Configuring local host settings, select Next >.
Figure 28: Quick Start Wizard: Step 2 (gateway mode or server mode)
FortiMail™ Secure Messaging Platform Version 4.0 Patch 1 Install Guide
78Revision 2
http://docs.fortinet.com/ • Feedback
Page 79
Quick Start Wizard Step 2: Configuring the network settings and system time
IP AddressEnter the IP address of the port1 network
interface, such as 192.168.1.99.
This option does not appear if the FortiMail
unit is operating in transparent mode.
NetmaskEnter the netmask of the port1 network
interface, such as 255.255.255.0.
This option does not appear if the FortiMail
unit is operating in transparent mode.
IP AddressEnter the IP address which FortiMail
administrators will use to access the webbased manager and CLI through port1 and
other bridging network interfaces, and which
the FortiMail unit will use when connecting to
the Fortinet Distribution Network (FDN),
such as 192.168.1.99. For details on the
management IP, see the FortiMail
Administration Guide.
This option appears only if the FortiMail unit
is operating in transparent mode.
NetmaskEnter the netmask of the management IP
address, such as 255.255.255.0.
This option appears only if the FortiMail unit
is operating in transparent mode.
Primary DNSEnter the IP address of the primary server to
which the FortiMail unit will make DNS
queries.
Caution: Verify connectivity with the DNS
servers. Failure to verify connectivity could
result in many issues, including the inability
of the FortiMail unit to process email.
Step 3: Configuring local host settingsQuick Start Wizard
Default Gateway
Time Settings
Secondary DNSEnter the IP address of the secondary server
IP AddressEnter the IP address of the default gateway
Time ZoneSelect the time zone of the FortiMail unit.
Set TimeSelect to manually set the system time, then
Automatically
synchronize system
time using the Network
Time Protocol (NTP)
server
NTP Server Name/IPIf you have selected to automatically
to which the FortiMail unit will make DNS
queries.
router.
select the:
•Second
•Minute
•Hour
•Day
•Month
•Year
Select to automatically set the system time
by periodically synchronizing with an NTP
server, then configure the NTP Server Name/IP.
synchronize the system time with an NTP
server, enter the domain name or IP address
of an NTP server. For a list of public NTP
servers, see http://www.ntp.org/.
Note: Verify connectivity with the NTP
server. Failure to set the correct time could
result in issues such as inaccurate log
message times and inability to make secure
connections, including downloading
FortiGuard Antivirus updates from the FDN.
Step 3: Configuring local host settings
Step 3 of the Quick Start Wizard configures the fully qualified domain name (FQDN) of the
FortiMail unit, its listening port numbers, and whether to use SSL/TLS with SMTP clients
that request secure connections.
You usually should configure the FortiMail unit with a local domain name that is different
from that of protected email servers, such as mail.example.com for the FortiMail unit and
server.mail.example.com for the protected email server. The local domain name of the
FortiMail unit will be used in many features such as email quarantine, Bayesian database
training, spam report, and delivery status notification (DSN) email messages, and if the
FortiMail unit uses the same domain name as your mail server, it may become difficult to
distinguish email messages that originate from the FortiMail unit.
Note: The local domain name should be globally DNS-resolvable only if the FortiMail unit is
used as a relay server for outgoing email.
To proceed to Step 4: Adding protected domains, select Next >.
FortiMail™ Secure Messaging Platform Version 4.0 Patch 1 Install Guide
80Revision 2
http://docs.fortinet.com/ • Feedback
Page 81
Quick Start Wizard Step 3: Configuring local host settings
Figure 30: Quick Start Wizard: Step 3
Local Host
Host NameEnter the host name of the FortiMail unit.
Local Domain Name Enter the local domain name to which the FortiMail unit
POP3 Server Port
Number
SMTP Server Port
Number
You should use a different host name for each FortiMail
unit, especially when you are managing multiple FortiMail
units of the same model, or when configuring a FortiMail
high availability (HA) cluster. This will enable you to
distinguish between different members of the cluster. If
the FortiMail unit is in HA mode:
•when you connect to the web-based manager, your
web browser will display the host name of that cluster
member in its status bar.
•the FortiMail unit will add the host name to the subject
line of alert email messages.
belongs.The FortiMail unit’s fully qualified domain name
(FQDN) is in the format:
<Host Name>.<Local Domain Name>
This option does not appear if the FortiMail unit is
operating in server mode.
Note: The Local Domain Name can be a subdomain of an
internal domain if the MX record for the domain on the
DNS server can direct the mail destined for the
subdomain to the intended FortiMail unit.
Enter the port number on which the FortiMail unit’s POP3
server will listen for POP3 connections. The default port
number is 110.
This option is available only if the FortiMail unit is
operating in server mode.
Enter the port number on which the FortiMail unit’s SMTP
server will listen for SMTP connections. The default port
number is 25.
SMTP over SSL/TLS Enable to allow SSL- and TLS-secured connections from
SMTPS Server Port
Number
servers and clients requesting SSL/TLS.
When disabled, SMTP connections with the FortiMail
unit’s SMTP server will occur as clear text, unencrypted.
This option must be enabled to use SMTPS.
Enter the port number on which the FortiMail unit’s SMTP
server listens for secure SMTP connections. The default
port number is 465.
This option is unavailable if SMTP over SSL/TLS is
disabled.
Step 4: Adding protected domains
Step 4 of the Quick Start Wizard configures the protected domains.
Protected domains define connections and email messages for which the FortiMail unit
can performs protective email processing by describing both:
•the IP address of an SMTP server
•the domain name portion (the portion which follows the “@” symbol) of recipient email
addresses in the envelope
both of which the FortiMail unit compares to connections and email messages when
looking for traffic that involves the protected domain.
For example, if you wanted to scan email fro email addresses such as
user.one@example.com that are hosted on the SMTP server 10.10.10.10, you would
configure a protected domain of example.com whose SMTP server is 10.10.10.10.
You usually must configure at least one protected domain. FortiMail units can be
configured to protect one or more email domains that are hosted on one or more email
servers.
Exceptions include if you will not apply recipient-based policies or authentication profiles,
such as in “Example 3: FortiMail unit for an ISP or carrier” on page 128.
To proceed to Step 5: Configuring incoming antispam and antivirus settings, select Next >.
Domain FQDNEnter the fully qualified domain name (FQDN) of the protected domain.
For example, if you want to protect email addresses such as
user1@example.com, you would enter the protected domain name
example.com.
Use MX Record
(transparent mode and
gateway mode only)
Select to enable the FortiMail unit to query the DNS server’s MX record
for the FQDN or IP address of the SMTP server for this domain name,
instead of manually defining the SMTP server in the fields SMTP Server
and Fallback MX Host.
Note: If enabled, you may also be required to configure the FortiMail
unit to use a private DNS server whose MX and/or A records differ from
that of a public DNS server. Requirements vary by the topology of your
network and by the operating mode of the FortiMail unit. For details, see
“Configuring DNS records” on page 95 (gateway mode) or “Configuring
DNS records” on page 119 (transparent mode).
Step 5: Configuring incoming antispam and antivirus settingsQuick Start Wizard
SMTP Server
(transparent mode and
gateway mode only)
Port
(transparent
mode and
gateway mode
only)
Use smtps
(transparent
mode and
gateway mode
only)
Fallback MX Host
(transparent mode and
gateway mode only)
Port
(transparent
mode and
gateway mode
only)
Use smtps
(transparent
mode and
gateway mode
only)
Enter the fully qualified domain name (FQDN) or IP address of the
primary SMTP server for this protected domain, then also configure Use smtps and Port.
If you have an internal mail relay that is located on a physically separate
server from your internal mail server, this could be your internal mail
relay, instead of your internal mail server. Consider your network
topology, directionality of the mail flow, and the operation mode of the
FortiMail unit. For more information, see the FortiMail Administration
Guide.
Enter the port number on which the SMTP server listens.
If you enable Use smtps, Port automatically changes to the default port
number for SMTPS, but can still be customized.
The default SMTP port number is 25; the default SMTPS port number is
465.
Select to enable SMTPS for connections originating from or destined for
this protected domain.
Enter the FQDN or IP address of the secondary SMTP server for this
protected domain, then also configure Use smtps and Port.
This SMTP server will be used if the primary SMTP server is
unreachable.
Enter the port number on which the failover SMTP server listens.
If you enable Use smtps, Port automatically changes to the default port
number for SMTPS, but can still be customized.
The default SMTP port number is 25; the default SMTPS port number is
465.
Select to enable SMTPS for connections originating from or destined for
this protected domain.
3 Repeat the previous step for each mail domain that the FortiMail unit will be configured
to protect.
Step 5: Configuring incoming antispam and antivirus settings
Step 5 of the Quick Start Wizard enables or disables antivirus scanning and configures the
intensity level of antispam scanning for email incoming to protected domains.
Each antispam level (Off, Low, Medium, and High) is a default antispam profile that groups
settings for many antispam features. After completing the Quick Start Wizard, if you want
to enable, disable, or differently configure those features, you can use the advanced mode
of the web-based manager to create and/or modify the antispam profiles.
To proceed to Step 6: Configuring access control rules and outgoing antispam and
antivirus settings, select Next >.
Figure 35: Quick Start Wizard: Step 5
FortiMail™ Secure Messaging Platform Version 4.0 Patch 1 Install Guide
84Revision 2
http://docs.fortinet.com/ • Feedback
Page 85
Quick Start Wizard Step 6: Configuring access control rules and outgoing antispam and antivirus settings
Step 6: Configuring access control rules and outgoing antispam
and antivirus settings
Step 6 of the Quick Start Wizard configures enables or disables antivirus scanning and
configures the intensity level of antispam scanning for email outgoing from protected
domains.
Each antispam level (Off, Low, Medium, and High) is a default antispam profile that groups
settings for many antispam features. After completing the Quick Start Wizard, if you want
to enable, disable, or differently configure those features, you can use the advanced mode
of the web-based manager to create and/or modify the antispam profiles.
Step 6 also configures access control rules. Access control rules specify whether the
FortiMail unit will process and relay, reject, or discard email messages for SMTP sessions
that are initiated by SMTP clients.
Without any configured access control rules, the FortiMail unit’s access control prevents
SMTP clients from using your protected server or FortiMail unit as an open relay: senders
can deliver email incoming to protected domains, but cannot deliver email outgoing to
unprotected domains. For details, see the FortiMail Administration Guide.
Usually, you must configure at least one access control rule to allow SMTP clients such as
your email users or email servers to send email to unprotected domains.
Exceptions include if you have not configured any protected domains, such as in
“Example 3: FortiMail unit for an ISP or carrier” on page 128.
For example, if your protected domain, example.com, contains email addresses in the
format of user1@example.com, user2@example.com, etc., and you want to allow those
email addresses to send email to any external domain as long as they authenticate their
identities, you might configure the following access control rule:
Note: Access control rules can also match SMTP sessions based upon the use of TLS. To
configure access control rules with TLS, after using the Quick Start Wizard, use the
advanced mode of the web-based manager to create TLS profiles and select them in
access control rules. For details, see the FortiMail Administration Guide.
To proceed to Step 7: Reviewing and saving the configuration, select Next >.
Step 6: Configuring access control rules and outgoing antispam and antivirus settingsQuick Start Wizard
Figure 36: Quick Start Wizard: Step 6
To add an access control rule
1 Select Add Access.
A dialog appears, enabling you to create an access control rule.
Figure 37: Quick Start Wizard: Step 6 dialog
2 Configure the following, then select OK:
Sender PatternEnter a complete or partial envelope sender (MAIL FROM:) email
Regular
expression
Recipient PatternEnter a complete or partial envelope recipient (RCPT TO:) email
Regular
expression
address to match.
Wildcard characters allow you to enter partial patterns that can
match multiple sender email addresses. The asterisk (*) represents
one or more characters and the question mark (?) represents any
single character.
For example, the sender pattern ??@*.com will match messages
sent by any email user with a two letter email user name from any
“.com” domain name.
Mark this check box to use regular expression syntax instead of
wildcards to specify the sender pattern.
address to match.
Wildcard characters allow you to enter partial patterns that can
match multiple recipient email addresses. The asterisk (*)
represents one or more characters and the question mark (?)
represents any single character.
For example, the recipient pattern *@example.??? will match
messages sent to any email user at example.com, example.net,
example.org, or any other “example” domain ending with a
three-letter top-level domain name.
Mark this check box to use regular expression syntax instead of
wildcards to specify the recipient pattern.
FortiMail™ Secure Messaging Platform Version 4.0 Patch 1 Install Guide
86Revision 2
http://docs.fortinet.com/ • Feedback
Page 87
Quick Start Wizard Step 6: Configuring access control rules and outgoing antispam and antivirus settings
Sender IP/NetmaskEnter the IP address and netmask of the SMTP client attempting to
Reverse DNS PatternEnter a pattern to compare to the result of a reverse DNS look-up of
Regular
expression
Authentication StatusSelect whether or not to match this access control rule based upon
ActionSelect which action the FortiMail unit will perform for SMTP sessions
deliver the email message. Use the netmask, the portion after the
slash (/), to specify the matching subnet.
For example, enter 10.10.10.10/24 to match a 24-bit subnet, or
all addresses starting with 10.10.10. This will appear as
10.10.10.0/24 in the access control rule table, with the 0 indicating
that any value is matched in that position of the address.
Similarly, 10.10.10.10/32 will appear as 10.10.10.10/32 and
match only the 10.10.10.10 address.
To match any address, enter 0.0.0.0/0.
the IP address of the SMTP client delivering the email message.
Because domain names in the SMTP session are self-reported by
the connecting SMTP server and easy to fake, the FortiMail unit
does not trust the domain name that an SMTP server reports.
Instead, the FortiMail does a DNS lookup using the SMTP server’s
IP address. The resulting domain name is compared to the reverse
DNS pattern for a match. If the reverse DNS query fails, the access
control rule match will also fail. If no other access control rule
matches, the connection will be rejected with SMTP reply code 550
(Relaying denied).
Wildcard characters allow you to enter partial patterns that can
match multiple reverse DNS lookup results. An asterisk (*)
represents one or more characters; a question mark (?) represents
any single character.
For example, the recipient pattern mail*.com will match messages
delivered by an SMTP server whose domain name starts with “mail”
and ends with “.com”.
Note: Reverse DNS queries for access control rules require that the
domain name be a valid top level domain (TLD). For example, “.lab”
is not a valid top level domain name, and thus the FortiMail unit
cannot successfully perform a reverse DNS query for it.
Mark this check box to use regular expression syntax instead of
wildcards to specify the reverse DNS pattern.
client authentication.
• any: Match or do not match this access control rule regardless of
whether the client has authenticated with the FortiMail unit.
• authenticated: Match this access control rule only for clients that
have authenticated with the FortiMail unit.
matching this access control rule.
• BYPASS:Relay or proxy and deliver the email, but, if the sender
or recipient belongs to a protected domain, bypass all antispam
profile processing. Antivirus, content and other scans will still
occur.
• DISCARD: Accept the email, but silently delete it and do not
deliver it. Do not inform the SMTP client.
• RELAY: Relay or proxy, process, and deliver the email normally if
it passes all configured scans.
• REJECT: Reject delivery of the email and respond to the SMTP
client with SMTP reply code 550 (Relaying denied).
3 Repeat the previous step for any additional access control rules.
The access control rule appears at the bottom of the list of access control rules. As a
result, the FortiMail unit will evaluate it as a match for the SMTP session only if no
previous access control rule matches. If you want your new rule to be evaluated before
another rule, move your new access control rule to its intended position in the list. For
details, see the FortiMail Administration Guide.
Step 7: Reviewing and saving the configurationQuick Start Wizard
Step 7: Reviewing and saving the configuration
Review the configuration. If it is correct, select OK.
A dialog will appear, enabling you to download a backup copy of the current configuration
before saving the settings that you configured during the Quick Start Wizard.
When saving the new configuration, the FortiMail unit displays a notice that the Quick Start
Wizard is complete.
Continuing the installation
After using the Quick Start Wizard:
1 If you have multiple FortiMail units, and you want to configure them in high availability
(HA) mode, configure the HA settings before physically connecting the FortiMail units
to your network.
For instructions on configuring HA, see the FortiMail Administration Guide.
2 If you have subscribed to FortiGuard Antivirus or FortiGuard Antispam services,
connect the FortiMail unit to the Fortinet Distribution Network (FDN) to update related
packages. For details, see “Connecting to FortiGuard services” on page 89.
3 You may need to configure additional features that may be specific to your operation
mode and network topology, such as configuring your router or firewall, and records on
your public DNS server. For instructions applicable to your operation mode, see:
• “Gateway mode deployment” on page 95
• “Transparent mode deployment” on page 119
• “Server mode deployment” on page 139
4 Verify that email clients can connect to or through the FortiMail unit. For details, see
“Testing the installation” on page 159.
FortiMail™ Secure Messaging Platform Version 4.0 Patch 1 Install Guide
88Revision 2
http://docs.fortinet.com/ • Feedback
Page 89
Connecting to FortiGuard services
Connecting to FortiGuard services
After the FortiMail unit is physically installed and configured to operate in your network, if
you have subscribed to FortiGuard Antivirus and/or FortiGuard Antispam services,
connect the FortiMail unit to the Fortinet Distribution Network (FDN).
Connecting your FortiMail unit to the FDN or override server ensures that your FortiMail
unit can:
•download up-to-date FortiGuard Antivirus and FortiGuard Antispam definition and
engine packages
•query the FDN for blacklisted servers and other real-time information during FortiGuard
Antispam scans, if configured
in order to scan email using the most up-to-date protection.
The FDN is a world-wide network of Fortinet Distribution Servers (FDS). When a FortiMail
unit connects to the FDN to download FortiGuard engine and definition updates, by
default, it connects to the nearest FDS based on the current time zone setting. You can
override the FDS to which the FortiMail unit connects.
Your FortiMail unit may be able to connect using the default settings. However, you should
confirm this by verifying connectivity.
Note: FortiMail units use multiple connection types with the FDN. To completely verify
connectivity, you should test each connection type by performing both of the following
procedures.
Note: You must first register the FortiMail unit with the Fortinet Technical Support web site,
https://support.fortinet.com/, to receive service from the FDN. The FortiMail unit must also
have a valid Fortinet Technical Support contract which includes service subscriptions, and
be able to connect to the FDN or the FDS that you will configure to override the default FDS
addresses. For port numbers required for license validation and update connections, see
the Fortinet Knowledge Center article FortiMail Traffic Types and TCP/UDP Ports.
To verify scheduled update connectivity
Before performing this procedure, if your FortiMail unit connects to the Internet using a
proxy, use the CLI command set system autoupdate tunneling to enable the
FortiMail unit to connect to the FDN through the proxy. For more information, see the
FortiMail CLI Reference.
1 Go to Maintenance > FortiGuard > Update in the advanced mode of the web-based
manager.
2 If you want your FortiMail unit to connect to a specific FDS other than the default for its
time zone, enable Use override server address, and enter the fully qualified domain
name (FQDN) or IP address of the FDS.
3 Select Apply.
4 Select Refresh.
A dialog appears, notifying you that the process could take a few minutes.
The FortiMail unit tests the connection to the FDN and, if any, the override server. Time
required varies by the speed of the FortiMail unit’s network connection, and the
number of timeouts that occur before the connection attempt is successful or the
FortiMail unit determines that it cannot connect. When the connection test completes,
the page refreshes. Test results are displayed in the FortiGuard Distribution Network
field.
• available: The FortiMail unit successfully connected to the FDN or override server.
• not available: The FortiMail unit could not connect to the FDN or override server,
and will not be able to download updates from it. For CLI commands that may be
able to assist you in troubleshooting, see “To verify rating query connectivity” on
page 90.
When successful connectivity has been verified, continue by configuring the FortiMail
unit to receive engine and definition updates from the FDN or override server using
one or more of the following methods:
• scheduled updates (see “Configuring scheduled updates” on page 91)
• push updates (see “Configuring push updates” on page 92)
• manually initiated updates (see “Manually requesting updates” on page 94)
To verify rating query connectivity
1 Go to AntiSpam > FortiGuard-AntiSpam > FortiGuard-AntiSpam in the advanced
management mode.
2 Verify that the Enable Service checkbox is selected. If it is not, mark it, then click Apply.
If the FortiMail unit can reach the DNS server, but cannot successfully resolve the
domain name of the FDS, a message appears notifying you that a DNS error has
occurred.
Figure 38: DNS error when resolving the FortiGuard Antispam domain name
Verify that the DNS servers contain A records to resolve antispam.fortigate.com and
other FDN servers. You may be able to obtain additional insight into the cause of the
query failure by manually performing a DNS query from the FortiMail unit using the
following CLI command:
execute nslookup host antispam.fortigate.com
If the FortiMail unit cannot successfully connect, or if your FortiGuard Antispam license
does not exist or is expired, a message appears notifying you that a connection error
has occurred.
FortiMail™ Secure Messaging Platform Version 4.0 Patch 1 Install Guide
90Revision 2
http://docs.fortinet.com/ • Feedback
Page 91
Connecting to FortiGuard services Configuring scheduled updates
• your FortiGuard Antispam license is valid and currently active
• the default route (located in System > Network > Routing) is correctly configured
• the FortiMail unit can connect to the DNS servers you configured during the Quick
Start Wizard (located in System > Network > DNS), and to the FDN servers
• firewalls between the FortiMail unit and the Internet or override server allow FDN
traffic (For configuration examples specific to your operation mode, see “Gateway
mode deployment” on page 95, “Transparent mode deployment” on page 119, or
“Server mode deployment” on page 139.)
You may be able to obtain additional insight into the point of the connection failure by
tracing the connection using the following CLI command:
execute traceroute <address_ipv4>
where <address_ipv4> is the IP address of the DNS server or FDN server.
When query connectivity is successful, antispam profiles can use the FortiGuard-
AntiSpam scan option.
You can use the antispam log to monitor for subsequent query connectivity
interruptions. When sending email through the FortiMail unit that matches a policy and
profile where the FortiGuard-AntiSpam scan option is enabled, if the FortiMail cannot
connect to the FDN and/or its license is not valid, and if Information-level logging is
enabled, the FortiMail unit records a log message in the antispam log (located in Log & Report > Logging > AntiSpam) whose Message field is:
FortiGuard-Antispam: No Answer from server.
Figure 40: Antispam log when FortiGuard Antispam query fails
Verify that the FortiGuard Antispam license is still valid, and that network connectivity
has not been disrupted for UDP port 8889 traffic from the FortiMail unit to the Internet.
Configuring scheduled updates
You can configure the FortiMail unit to periodically request FortiGuard Antivirus and
FortiGuard Antispam engine and definition updates from the FDN or override server.
Configuring push updatesConnecting to FortiGuard services
You can use push updates or manually initiate updates as alternatives or in conjunction
with scheduled updates. If protection from the latest viral threats is a high priority, you
could configure both scheduled updates and push updates, using scheduled updates as a
failover method to increase the likelihood that the FortiMail unit will still periodically
retrieve updates if connectivity is interrupted during a push notification. While using only
scheduled updates could potentially leave your network vulnerable to a new virus, it
minimizes short disruptions to antivirus scans that can occur if the FortiMail unit applies
push updates during peak volume times. For additional/alternative update methods, see
“Configuring push updates” on page 92 and “Manually requesting updates” on page 94.
For example, you might schedule updates every night at 2 AM or weekly on Sunday, when
email traffic volume is light.
Before configuring scheduled updates, first verify that the FortiMail unit can connect to the
FDN or override server. For details, see “To verify scheduled update connectivity” on
page 89.
To configure scheduled updates
1 Go to Maintenance > FortiGuard > Update in the advanced mode of the web-based
manager.
2 Enable Scheduled Update.
3 Select from one of the following:
EverySelect to request updates once per interval, then configure the
DailySelect to request updates once a day, then configure the time of
WeeklySelect to request updates once a week, then configure the day of
Note: Updating FortiGuard Antivirus definitions can cause a short disruption in traffic
currently being scanned while the FortiMail unit applies the new signature database. To
minimize disruptions, update when traffic is light, such as during the night.
4 Select Apply.
The FortiMail unit starts the next scheduled update according to the configured update
schedule. If you have enabled logging, when the FortiMail unit requests a scheduled
update, the event is recorded in the event log.
Configuring push updates
You can configure the FortiMail unit to receive push updates from the FDN or override
server.
When push updates are configured, the FortiMail unit first notifies the FDN of its IP
address, or the IP address and port number override. (If your FortiMail unit’s IP address
changes, including if it is configured with DHCP, the FortiMail unit automatically notifies
the FDN of the new IP address.) As soon as new FortiGuard Antivirus and FortiGuard
Antispam packages become available, the FDN sends an update availability notification to
that IP address and port number. Within 60 seconds, the FortiMail unit then requests the
package update as if it were a scheduled or manually initiated update.
number of hours and minutes between each request.
day.
the week and the time of day.
FortiMail™ Secure Messaging Platform Version 4.0 Patch 1 Install Guide
92Revision 2
http://docs.fortinet.com/ • Feedback
Page 93
Connecting to FortiGuard services Configuring push updates
You can use scheduled updates or manually initiate updates as alternatives or in
conjunction with push updates. If protection from the latest viral threats is a high priority,
you could configure both scheduled updates and push updates, using scheduled updates
as a failover method to increase the likelihood that the FortiMail unit will still periodically
retrieve updates if connectivity is interrupted during a push notification. Using push
updates, however, can potentially cause short disruptions to antivirus scans that can occur
if the FortiMail unit applies push updates during peak volume times. For
additional/alternative update methods, see “Configuring scheduled updates” on page 91
and “Manually requesting updates” on page 94.
Before configuring push updates, first verify that the FortiMail unit can connect to the FDN
or override server. For details, see “To verify scheduled update connectivity” on page 89.
To configure push updates
1 Go to Maintenance > FortiGuard > Update in the advanced mode of the web-based
manager.
2 Enable Allow Push Update.
3 If the FortiMail unit is behind a firewall or router performing NAT, enable Use override
push IP and enter the external IP address and port number of the NAT device.
You must also configure the NAT device with port forwarding or a virtual IP to forward
push notifications (UDP port 9443) to the FortiMail unit.
For example, if the FortiMail unit is behind a FortiGate unit, configure the FortiGate unit
with a virtual IP that forwards push notifications from its external network interface to
the private network IP address of the FortiMail unit. Then, on the FortiMail unit,
configure Use override push IP with the IP address and port number of that virtual IP.
For details on configuring virtual IPs and/or port forwarding, see the documentation for
the NAT device.
Note: Push updates require that the external IP address of the NAT device is not dynamic
(such as an IP address automatically configured using DHCP). If dynamic, when the IP
address changes, the override push IP will become out-of-date, causing subsequent push
updates to fail.
If you do not enable Use override push IP, the FDN will send push notifications to the
IP address of the FortiMail unit, which must be a public network IP address routable
from the Internet.
4 Click Apply.
The FortiMail unit notifies the FDN of its IP address or, if configured, the override push
IP. When an update is available, the FDN will send push notifications to this IP address
and port number.
5 Click Refresh.
A dialog appears, notifying you that the process could take a few minutes.
Manually requesting updatesConnecting to FortiGuard services
6 Click OK.
The FDN tests the connection to the FortiMail unit. Time required varies by the speed
of the FortiMail unit’s network connection, and the number of timeouts that occur
before the connection attempt is successful or the FortiMail unit determines that it
cannot connect. When the connection test completes, the page refreshes. Test results
are displayed in the Push Update field.
• available: The FDN successfully connected to the FortiMail unit.
• not available: The FDN could not connect to the FortiMail unit, and will not be able
to send push notifications to it. Verify that intermediary firewalls and routers do not
block push notification traffic (UDP port 9443). If the FortiMail unit is behind a NAT
device, verify that you have enabled and configured Use override push IP, and that
the NAT device is configured to forward push notifications to the FortiMail unit.
Manually requesting updates
You can manually trigger the FortiMail unit to connect to the FDN or override server to
request available updates for its FortiGuard Antivirus and FortiGuard Antispam packages.
You can manually initiate updates as an alternative or in addition to other update methods.
For details, see “Configuring push updates” on page 92 and “Configuring scheduled
updates” on page 91.
To manually request updates
Before manually initiating an update, first verify that the FortiMail unit can connect to the
FDN or override server. For details, see “To verify scheduled update connectivity” on
page 89.
1 Go to Maintenance > FortiGuard > Update in the advanced mode of the web-based
manager.
2 Click Update Now.
Note: Updating FortiGuard Antivirus definitions can cause a short disruption in traffic
currently being scanned while the FortiMail unit applies the new signature database. To
minimize disruptions, update when traffic is light, such as during the night.
The web-based manager displays a message similar to the following:
Your update request has been sent. Your database will be updated
in a few minutes. Please check your update page for the status
of the update.
3 Select RETURN.
4 After a few minutes, select the Update tab to refresh the page, or go to Monitor >
System Status > Status.
If an update was available, new version numbers appear for the packages that were
updated. If you have enabled logging, messages are recorded to the event log
indicating whether the update was successful or not.
FortiMail™ Secure Messaging Platform Version 4.0 Patch 1 Install Guide
94Revision 2
http://docs.fortinet.com/ • Feedback
Page 95
Gateway mode deployment Configuring DNS records
Gateway mode deployment
After completing the Quick Start Wizard, you may be required to configure some items that
are specific to your network topology or the operation mode of your FortiMail unit.
This chapter contains examples of how to deploy a FortiMail unit operating in gateway
mode.
This chapter includes the following sections:
•Configuring DNS records
•Example 1: FortiMail unit behind a firewall
•Example 2: FortiMail unit in front of a firewall
•Example 3: FortiMail unit in DMZ
Configuring DNS records
You must configure public DNS records for the protected domains and for the FortiMail
unit itself.
For performance reasons, and to support some configuration options, you may also want
to provide a private DNS server for use exclusively by the FortiMail unit.
This section includes the following:
•Configuring DNS records for the protected domains
•Configuring DNS records for the FortiMail unit itself
•Configuring a private DNS server
Configuring DNS records for the protected domains
Regardless of your private network topology, in order for external MTAs to deliver email
through the FortiMail unit, you must configure the public MX record for each protected
domain to indicate that the FortiMail unit is its email gateway.
For example, if the fully qualified domain name (FQDN) of the FortiMail unit is
fortimail.example.com, and example.com is a protected domain, the MX record for
example.com would be:
example.com IN MX 10 fortimail.example.com
Caution: If your FortiMail unit will operate in gateway mode or server mode, configure the
MX record to refer to the FortiMail unit, and remove other MX records. If you fail to do so,
external MTAs may not be able to deliver email to or through the FortiMail unit, or may be
able to bypass the FortiMail unit by using the other MX records. If you have configured
secondary MX records for failover reasons, consider configuring FortiMail high availability
(HA) instead. For details, see “FortiMail high availability modes” on page 19.
An A record must also exist to resolve the host name of the FortiMail unit into an IP
address.
For example, if the MX record indicates that fortimail.example.com is the email gateway
for a domain, you must also configure an A record in the example.com zone file to resolve
fortimail.example.com into a public IP address:
where 10.10.10.1 is either the public IP address of the FortiMail unit, or a virtual IP
address on a firewall or router that maps to the private IP address of the FortiMail unit.
Note: For more information on MX and A records, see “The role of DNS in email delivery”
on page 16.
If your FortiMail unit will relay outgoing email, you should also configure the public reverse
DNS record. The public IP address of the FortiMail unit, or the virtual IP address on a
firewall or router that maps to the private IP address of the FortiMail unit, should be
globally resolvable into the FortiMail unit’s FQDN. If it is not, reverse DNS lookups by
external SMTP servers will fail.
For example, if the public network IP address of the FortiMail unit is 10.10.10.1, a public
DNS server’s reverse DNS zone file for the 10.10.10.0/24 subnet might contain:
1 IN PTR fortimail.example.com.
where fortimail.example.com is the FQDN of the FortiMail unit.
Configuring DNS records for the FortiMail unit itself
In addition to that of protected domains, the FortiMail unit must be able to receive web
connections, and send and receive email, for its own domain name. Dependent features
include:
•delivery status notification (DSN) email
•spam reports
•email users’ access to their per-recipient quarantines
•FortiMail administrators’ access to the web-based manager by domain name
•alert email
•report generation notification email
For this reason, you should also configure public DNS records for the FortiMail unit itself.
Appropriate records vary by whether or not Web Release Host Name/IP (located in
AntiSpam > Quarantine > Spam Report in the advanced mode of the web-based
manager) is configured:
•Case 1: Web Release Host Name/IP is empty/default
•Case 2: Web Release Host Name/IP is configured
Case 1: Web Release Host Name/IP is empty/default
By default (that is, if Web Release Host Name/IP is unconfigured), the web release/delete
links that appear in spam reports will use the fully qualified domain name (FQDN) of the
FortiMail unit.
For example, if the FortiMail unit’s host name is fortimail, and its local domain name is example.net, resulting in the FQDN fortimail.example.net, a spam report’s
default web release link might look like (FQDN highlighted in bold):
In the DNS configuration to support this and the other DNS-dependent features, you
would configure the following three records:
example.net IN MX 10 fortimail.example.net
fortimail IN A 10.10.10.1
FortiMail™ Secure Messaging Platform Version 4.0 Patch 1 Install Guide
96Revision 2
http://docs.fortinet.com/ • Feedback
Page 97
Gateway mode deployment Configuring DNS records
1 IN PTR fortimail.example.net.
where:
•example.net is the local domain name to which the FortiMail unit belongs; in the MX
record, it is the local domain for which the FortiMail is the mail gateway
•fortimail.example.net is the FQDN of the FortiMail unit
•fortimail is the host name of the FortiMail unit; in the A record of the zone file for
example.net, it resolves to the IP address of the FortiMail unit for the purpose of
administrators’ access to the web-based manager, email users’ access to their perrecipient quarantines, to resolve the FQDN referenced in the MX record when email
users send Bayesian and quarantine control email to the FortiMail unit, and to resolve
to the IP address of the FortiMail unit for the purpose of the web release/delete
hyperlinks in the spam report
•10.10.10.1 is the public IP address of the FortiMail unit
Case 2: Web Release Host Name/IP is configured
You could configure Web Release Host Name/IP to use an alternative fully qualified
domain name (FQDN) such as webrelease.example.info instead of the configured
FQDN, resulting in the following web release link (web release FQDN highlighted in bold):
Then, in the DNS configuration to support this and the other DNS-dependent features, you
would configure the following MX record, A records, and PTR record (unlike “Case 1: Web
Release Host Name/IP is empty/default” on page 96, in this case, two A records are
required; the difference is highlighted in bold):
example.net IN MX 10 fortimail.example.net
fortimail IN A 10.10.10.1
webrelease IN A 10.10.10.1
1 IN PTR fortimail.example.net.
where:
•example.net is the local domain name to which the FortiMail unit belongs; in the MX
record, it is the local domain for which the FortiMail is the mail gateway
•fortimail.example.net is the FQDN of the FortiMail unit
•fortimail is the host name of the FortiMail unit; in the A record of the zone file for
example.net, it resolves to the IP address of the FortiMail unit for the purpose of
administrators’ access to the web-based manager and to resolve the FQDN referenced
in the MX record when email users send Bayesian and quarantine control email to the
FortiMail unit
•webrelease is the web release host name; in the A record of the zone file for
example.info, it resolves to the IP address of the FortiMail unit for the purpose of the
web release/delete hyperlinks in the spam report
•10.10.10.1 is the public IP address of the FortiMail unit
Configuring a private DNS server
In addition to the public DNS server, consider providing a private DNS server on your local
network to improve performance with features that use DNS queries.
Example 1: FortiMail unit behind a firewallGateway mode deployment
External
Em ail Server
Local Em ail Users
Rem ote Em ail Users
Public DNS Server
Internal Em ail Server
172 .16.1.10
Internet
Sw itch
internal
172 .16.1.1
wan1
10.10.10.1
port1
172 .16.1.5
Protected Domain:
@exam ple.co m
Em ail Dom ain:
@exam ple.co m
exam ple.com IN MX 10 fortimail.exam ple.co m
fortimail IN A 10.10.10.1
Gateway Mode
Private DNS Server
exam ple.com IN MX 10 mail.exam ple.com
mail IN A 17 2 .16.1.10
Figure 41: Public and private DNS servers (gateway mode)
In some situations, a private DNS server may be required. A private DNS server is
required if you enable the Use MX Record option (see “Use MX Record” on page 83).
Because gateway mode requires that public DNS servers have an MX record that routes
mail to the FortiMail unit, but Use MX Record requires an MX record that references the
protected SMTP server, if you enable that option, you must configure the records of the
private DNS server and public DNS server differently.
For example, if both a FortiMail unit (fortimail.example.com) operating in gateway
mode and the SMTP server reside on your private network behind a router or firewall as
illustrated in Figure 41 on page 98, and the Use MX Record option is enabled, Table 6 on
page 98 illustrates differences between the public and private DNS servers for the
authoritative DNS records of example.com.
Example 1: FortiMail unit behind a firewall
98Revision 2
Table 6: Public vs. private DNS records when “Use MX Record” is enabled
Private DNS serverPublic DNS server
example.com IN MX 10
mail.example.com
mail IN A 172.16.1.10fortimail IN A 10.10.10.1
If you choose to add a private DNS server, to configure the FortiMail unit to use it, go to
System > Network > DNS in the advanced mode of the web-based manager.
In this example, a FortiMail unit operating in gateway mode, a protected email server, a
private DNS server, and email users’ computers are all positioned within a private
network, behind a firewall. Remote email users’ computers and external email servers are
located on the Internet, outside of the network protected by the firewall. The FortiMail unit
protects accounts for email addresses ending in “@example.com”, which are hosted on
the local email server.
example.com IN MX 10
fortimail.example.com
1 IN PTR fortimail.example.com
FortiMail™ Secure Messaging Platform Version 4.0 Patch 1 Install Guide
http://docs.fortinet.com/ • Feedback
Page 99
Gateway mode deployment Example 1: FortiMail unit behind a firewall
Figure 42: FortiMail unit behind a NAT device
Local Em ail Users
Private DNS Server
exam p le.co m IN MX 10 mail.exam p le.co m
mail IN A 17 2 .16.1.10
Em ail Dom ain:
@exam ple.co m
Internal Em ail Server
172 .16.1.10
Sw itch
port1
172 .16.1.5
Gatew ay Mode
Protected Domain:
@exam ple.co m
intern al
172 .16.1.1
Rem ote Em ail Users
External
Em ail Server
wan1
10.10.10.1
exam p le.co m IN MX 10 fortimail.exam p le.co m
fortimail IN A 10.10.10.1
Internet
DNS Server
The private DNS server has been configured to locally replicate records from public DNS
servers for most domains, with the exception of records for protected domains, which
instead have been configured differently locally in order to support the Use MX Record
option.
The FortiMail unit has been configured to query the private DNS server, and also been
configured with an access control rule that allows local and remote email users to send
email to unprotected domains if they first authenticate:
Sender Pattern*@example.com
Recipient Pattern*
Sender IP/Netmask 0.0.0.0/0
Reverse DNS
Pattern
Authentication
Status
TLS< none >
ActionRELAY
To deploy the FortiMail unit behind a NAT device such as a firewall or router, you must
complete the following:
•Configuring the firewall
•Configuring the MUAs
•Testing the installation
Note: This example assumes you have already completed the Quick Start Wizard and
configured records on the DNS server for each protected domain. For details, see “Quick
Start Wizard” on page 77 and “Configuring DNS records” on page 95.
Configuring the firewall
With the FortiMail unit behind a FortiGate unit, you must configure firewall policies to allow
traffic between the internal network and the Internet.
To create the required policies, complete the following:
Example 1: FortiMail unit behind a firewallGateway mode deployment
•Configuring the firewall address
•Configuring the service groups
•Configuring the virtual IPs
•Configuring the firewall policies
Note: The following procedures use a FortiGate unit running FortiOS v3.0 MR7. If you are
using a different firewall appliance, consult the appliance’s documentation for completing
similar configurations.
Configuring the firewall address
In order to create the outgoing firewall policy that governs the IP address of the FortiMail
unit, you must first define the IP address of the FortiMail unit by creating a firewall address
entry.
To add a firewall address for the FortiMail unit
1 Go to Firewall > Address > Address.
2 Select Create New.
3 Complete the following:
NameEnter a name to identify the firewall address entry, such as
In order to create firewall policies that govern only email and FortiMail-related traffic, you
must first create groups of services that define protocols and port numbers used in that
traffic.
Because FortiGuard-related services for FortiMail units are not predefined, you must
define them before you can create a service group that contains those services.
Note: For more information on protocols and port numbers used by FortiMail units, see the
Fortinet Knowledge Center article FortiMail Traffic Types and TCP/UDP Ports.
To add a custom service for FortiGuard Antivirus push updates
1 Go to Firewall > Service > Custom.
2 Select Create New.
3 Configure the following:
NameEnter a name to identify the custom service entry,
Protocol TypeSelect TCP/UDP.
ProtocolSelect UDP.
Destination Port
FortiMail™ Secure Messaging Platform Version 4.0 Patch 1 Install Guide
100Revision 2
such as
FortiMail_antivirus_push_updates.
http://docs.fortinet.com/ • Feedback
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.