In This Section: |
You can enable the Security Gateway as an MTA (Mail Transfer Agent) to manage SMTP traffic. The MTA works with these blades: Threat Emulation, Threat Extraction, and Anti-Spam and Mail Security.
When a gateway scans SMTP traffic, sometimes the email client is not able to keep the connection open for the time that is necessary to handle the email. In such cases, there is a timeout for the email. An MTA deployment prevents this problem. The MTA first accepts the email from the previous hop, does the necessary actions on the email and then relays the email to the next hop. The MTA is able to scan SMTP encrypted traffic for the supported blades.
Note - MTA is also supported on VSX gateways. The MTA configuration is the same for VSX and non-VSX gateways.
To use the Security Gateway as an MTA:
When selected, the Security Gateway is an MTA for SMTP traffic. For a topology that uses TLS between the previous hop and the Security Gateway, you must import the mail server certificate to the Security Gateway.
To enable the Security Gateway as an MTA:
The Mail Transfer Agent page opens.
Note - From R80.20, you can define a domain object as the Next Hop. This lets you use multiple mail servers based on a DNS name. This DNS configuration allows load balancing and high-availability capabilities based on DNS configuration.
You can also configure the MTA to only scan the emails and not forward them to the mail server.
The Import Outbound Certificate window opens.
By default, when you enable a gateway as an MTA, an implied rule is created at the top of the Access Control Policy, which opens port 25 for connections destined to the gateway. The default source in the implied rule is any source IP. You can configure the source column to allow traffic from specific sources.
To disable this implied rule, clear Create an implied rule at the top of the Access Control Policy
An MTA rule is created at the top of the Threat Prevention Rule Base.
The MTA Advanced Settings window lets you configure which interfaces on the Security Gateway are listening to SMTP traffic that is sent to Threat Emulation.
Use the Mail Settings section to define these settings:
Emails that are in the MTA longer than the Maximum delayed time are blocked or allowed without processing. The Troubleshooting setting lets you receive a log or alert when one of the limits is exceeded.
To configure the MTA advanced settings:
The Mail Transfer Agent page opens.
The MTA Advanced Settings window opens.
To disable the MTA:
The MTA address can be saved in the cache. If the MTA queue is not empty, or you disable the MTA first, it is possible to lose emails that are sent to the network.
To disable MTA for email that is sent to the internal mail server:
To disable MTA for email that is sent to a different MTA:
After you configure the Security Gateway as an MTA, change the settings to send SMTP traffic from external networks to the Security Gateway. Each organization has an MX record that points to the internal mail server, or a different MTA. The MX record defines the next hop for SMTP traffic that is sent to the organization. These procedures explain how to change the network settings to send SMTP to the Check Point MTA.
Important - If it is necessary to disable the MTA on the Security Gateway, change the SMTP settings or MX records first. Failure to do so can result in lost emails. |
To configure an MTA for email that is sent to the internal mail server:
To configure an MTA for email that is sent to a different MTA:
You can use the Check Point MTA to only monitor SMTP traffic.
Configure the MTA to only scan the emails, but not to forward them to the mail server.
Note - Make sure that the mail relay in the network can send a copy of the emails to the Check Point MTA.
To configure the MTA not to forward emails:
No_Forward
0.0.0.0
The Mail Transfer Agent page opens.
The Mail Transfer Agent Engine Update is an accumulation of new features and bug fixes to the MTA engine. MTA updates are available to users of R80.10 with Jumbo HFA take 142 and up, and users of R80.20 GA.
It is delivered in the form of a CPUSE Hotfix and can be installed and upgraded manually through the CPUSE User Interface and CLISH commands. cpstop/cpstart
or reboots are not required.
The updates do not conflict with the regular Jumbo HFAs (for example, R80_10_jumbo_hf) and can be updated independently.
To update the MTA engine:
Open the Gaia Portal > upgrades (CPUSE) > Status and Actions > MTA Engine Updates
For more information on the MTA engine updates, see sk123174.
To check the current version of Mail Transfer Agent Update, run this command:
cat $FWDIR/conf/mta_ver
There are 3 new views for MTA monitoring in SmartView available for R80.10 gateways with Jumbo Hotfix take 142 or R80.20 gateways:
To see these views:
SmartView opens.
The views are based on logs that are updated with each email status change. You can change the time frame of the views in the upper left corner of the MTA Live Monitoring page. You can customize the views, create new widgets and export the views to Excel/PDF.
Here is a description of each one of the new views:
The left side shows the distribution of the emails in queue in a graph and a table. If you right-click the Action column in the table, you can do these actions on the email:
The right side shows these views for the selected time frame:
When you click a column in the diagram, a window opens with a list of the logs that the column is based on.
You can use compare the 3 timelines to identify trends in email traffic and analyze the root cause for all kinds of situations. For example, if the emails in queue timeline shows many emails in the queue at a certain point in time, you can look at the other timelines to check the possible reasons for this. If the content timeline shows many emails with links and attachments at the same point in time, this could explain it, because they take longer to scan.
This view shows the causes of failure and the number of failures for each cause. For example: too many parallel requests for scanning or exceeded operation timeout.
The most common failure timeline shows the X top failures. The default is 5.
The Email Failure timeline shows all failures.