Gateway mode deployment
Example 3: FortiMail unit in DMZ
FortiMail™ Secure Messaging Platform Version 4.0 Patch 1 Install Guide
Revision 2
113
•
4
Select
OK
.
Configuring the service groups
In order to create firewall policies that govern only email and FortiMail-related traffic, you
must first create groups of services that define protocols and port numbers used in that
traffic.
Because FortiGuard-related services for FortiMail units are not predefined, you must
define them before you can create a service group that contains those services.
To add a custom service for FortiGuard Antivirus push updates
1
Go to
Firewall > Service > Custom
.
2
Select
Create New
.
3
Configure the following:
4
Select
OK
.
To add a custom service for FortiGuard Antispam rating queries
1
Go to
Firewall > Service > Custom
.
2
Select
Create New
.
3
Configure the following:
4
Select
OK
.
To add a service group for remote incoming FortiMail traffic
1
Go to
Firewall > Service > Group
.
2
Select
Create New
.
Subnet /IP Range
Enter
192.168.1.5/32
.
Interface
Select
dmz
.
Note:
For more information on protocols and port numbers used by FortiMail units, see the
Fortinet Knowledge Center article
FortiMail Traffic Types and TCP/UDP Ports
.
Name
Enter a name to identify the custom service entry,
such as
FortiMail_antivirus_push_updates
.
Protocol Type
Select
TCP/UDP
.
Protocol
Select
UDP
.
Destination Port
Low
Enter
9443
.
High
Enter
9443
.
Name
Enter a name to identify the custom service entry,
such as
FortiMail_antispam_rating_queries
.
Protocol Type
Select
TCP/UDP
.
Protocol
Select
UDP
.
Destination Port
Low
Enter
8889
.
High
Enter
8889
.
Summary of Contents for FortiMail-100
Page 1: ...FortiMail Secure Messaging Platform Version 4 0 Patch 1 Install Guide...
Page 173: ...www fortinet com...
Page 174: ...www fortinet com...