close

Eset Endpoint Security Mega

As a service provider you want to ensure that your will not be blacklisted. Unfortunately, sometimes subscribers will send out spam, either on purpose, or accidentally, which will result in your IP being blacklisted. Thankfully, your FortiMail unit can help you avoid being blacklisted.

This recipe covers how to minimize the risk of innocent blacklisting.

Initiating transparent mode Navigate to Monitor > System Status > Status.  2.  Select Transparent from the Operation mode dropdown menu.  3.  Run the Quick Start Wizard by selecting the Wizard button.   Selecting the Quick Start Wizard button. Configure the connection with the RADIUS server Your FortiMail unit uses accounting records to combat spam and viruses originating from your network and reduces the likelihood that your public IP addresses will be blacklisted. To configure your RADIUS server Configure the FortiMail unit as an auxiliary RADIUS server on your RADIUS server.   2.  Ensure it sends the Calling-Station-Id and Framed-IP-Address attributes to the FortiMail unit.  3.  Determine whether your RADIUS server sends the Framed-IP-Address attribute’s value in network order (192.168.1.10) or host order (10.1.168.192).  4.  Verify that routing and firewall policies permit RADIUS accounting records to reach the FortiMail unit. Testing to see if the FortiMail unit is receivingRADIUS records Once you are connected with the RADIUS server, you’ll need to make sure the FortiMail unit is receiving the RADIUS records. Connect to the . NOTE: You cannot connect to the CLI through the web interface. For more information on how to connect to the CLI, see “Connecting to the Web UI or CLI” (LINK).  2.  Enter the following command to enable the FortiMail unit to receive RADIUS records by starting the endpoint reputation daemon: config antispam settings    set carrier-endpoint-status enableend 3.  Enter the following command to configure the RADIUS secret:config antispam settings     set carrier-endpoint-acc-secret end  4.  Enter the following command to configure whether to enable or disable the FortiMail unit to validate RADIUS requests using the RADIUS secret:config antispam settings      set carrier-endpoint-acc-validate end  5.  Enter the following command to configure whether or not the FortiMail unit will acknowledge accounting records:config antispam settings    set carrier-endpoint-acc-response {enable | disable} end 6.  Enter the following command to indicate that the RADIUS server will send the value of the Framed-IP-Address attribute in network order:config antispam settings     set carrier-endpoint-framed-ip-order {host-order | network-order} end Removing the network interfaces from the bridge To remove port2 and port3 from the bridge repeat the following steps for each individual port.  1.  Go to System > Network > Interface in the advanced mode of the web interface.  2.  Double-click on port2 to edit it.  3.  Select Do not associate with management IP. The network interface will be removed from the bridge and may be configured with its own IP address.  4.  In IP/, type the IP address and netmask of the network interface.  5.  Disable all administrative access protocols, including , , and .  6.  Select UP and then select OK. Configuring the session profiles To configure the profile for connections from external SMTP clients Note: For amore detailed look at configuration settings, see your FortiMail Administrator guide. Navigate to Profile > Session in the advanced mode of the web interface.  2.  Select New.   3.  Type a name in the Profile name textbox (external_session_profile).   4.  Enable Hide this box from the mail server in the Connection Settings section to preserve the IP address or domain name of the SMTP client.  5.  Select the Enable sender reputation checkbox in the Sender Reputation Note: The rest of the settings under Sender Reputation can be left to their default value. For an explanation of each settings see the FortiMail Administrator guide (LINK).  6.  Enable the block STARTTLS/MD5 commands in the Session Settings section so that email connections cannot be TLS-encrypted.  7.  Enable Prevent open relaying in the Unauthenticated Session Settings.  8.  Select Create. You will need to repeat the same steps to configure the session profile for connections from internal SMT clients. Configuring IP-basedpolicies   To configure the IP-based policy for connections from internal SMTP clients.  1.  Navigate to Policy > Policies > IP Policies in the advanced mode of the web interface.  2.  Select New.  3.  Type the IP address and netmask of your subscriber network in the Source.  4.  Select internal_session_profile from the Session dropdown menu in the Profiles.  5.  Select the antispam profile from the AntiSpam dropdown menu.  6.  Select an antivirus profile from the AntiVirus dropdown menu.  7.  Select Create. To configure the IP-based policy for connection from external SMTP clients Navigate to Policy > Policies > IP Policies in the advanced mode of the web interface. Select Edit for the default policy whose Match column contains 0.0.0.0/0 –> 0.0.0.0/0 Select external_session_profile from Session. Select OK. Configuring the outgoing proxy   When operating in transparent mode, the FortiMail unit can use either transparent proxies or an implicit relay to inspect SMTP connections. Ifconnection pick-up is enabled for connections on that network interface, the FortiMail unit can scan and process the connection. If not enabled, the FortiMail unit can either block or permit the connection to pass through unmodified. To configure outgoing proxy pick-up To configure outgoing proxy pick-up  1.  Navigate to Mail Settings > Proxies in the advanced mode of the web interface.  2.  Enable Use client-specified SMTP server to send email.  3.  Navigate to System > Network.  4.  Edit SMTP proxy settings on both port 2 and port 3: Port 2 and 3Incoming connections: Drop Outgoing connections: Proxy Local connections: Disallow   To configure the IP-based policy for connections from internal SMTP clients.  1.  Navigate to Policy > Policies > IP Policies in the advanced mode of the web interface.  2.  Select New.  3.  Type the IP address and netmask of your subscriber network in the Source.  4.  Select internal_session_profile from the Session dropdown menu in the Profiles.  5.  Selectthe antispam profile from the AntiSpam dropdown menu.  6.  Select an antivirus profile from the AntiVirus dropdown menu.  7.  Select Create. To configure the IP-based policy for connection from external SMTP clients Navigate to Policy > Policies > IP Policies in the advanced mode of the web interface. Select Edit for the default policy whose Match column contains 0.0.0.0/0 –> 0.0.0.0/0 Select external_session_profile from Session. Select OK. Configuring policy-based routes on the router   After you have configured the FortiMail settings, you must create policy routes on the router to redirect the SMTP traffic (from and to the subscribers) to the FortiMail unit for scanning. For example, you use a FortiGate unit as the router/firewall, you can go to Router > Policy Route to create two routes: one for the external-to-subscribers SMTP traffic and one for the subscribers-to-external SMTP traffic. For details, see the FortiGate Handbook on.
Technical Writer at Latest posts by Mike Mielke () - April 6, 2016 - March 24, 2016 - March 24, 2016
Related posts:

Share this recipe:


endpoint security devices     endpoint security by bitdefender cannot be successfully repaired

TAGS

CATEGORIES