Configure email protection in MTA mode
You can configure the settings to route and protect emails in MTA mode.
Protect email servers in MTA mode: Network diagram
In MTA mode, Sophos Firewall routes emails between your mail servers and the internet. When you turn on MTA mode, a firewall rule is created automatically to allow SMTP/SMTPS traffic. We recommend that you keep this rule at the top of the firewall rule table.
The mail servers' MX record must point to the WAN interface of Sophos Firewall.
In this example, we do as follows:
- Enforce TLS and other security settings for incoming and outgoing emails.
- Add an address group.
- Allow and protect inbound emails.
- Allow outbound emails.
Configure SMTP security settings
Configure the SMTP and TLS settings.
-
Go to Email > General settings and click Switch to MTA mode.
Note
When you turn on MTA mode, a firewall rule is created automatically to allow SMTP/SMTPS traffic. We recommend you keep this rule at the top of the firewall rule table. You can edit this rule based on your network requirements. If you switch to Legacy mode and back to MTA mode, the firewall rule is recreated.
-
Under SMTP settings, for SMTP hostname, enter your domain name (example: organization.com). Don't enter your mail server's hostname.
The firewall uses the SMTP hostname in HELO and SMTP banner strings.
Note
The SMTP hostname only applies to system-generated notification emails.
-
Select Reject based on IP reputation.
-
Go to Certificates > Certificates > Upload certificate and upload your mail server's certificate.
Tip
We recommend you use a certificate signed by a public CA to ensure remote mail servers accept the certificate.
-
Go to SMTP TLS configuration, for TLS certificate, and select your mail server certificate.
-
Under Advanced SMTP settings, select Scan outgoing mails.
-
Click Apply.
Add an address group
Create an address group for your organization's email domain.
- Go to Email > Address group and click Add.
- Check if Group type is set to Email address/domain.
- Check if Type is set to Manual.
-
For Email address/domain, enter your email domain and click the add button. Here, we use
example.com
.Here's an example:
-
Click Save.
Allow and protect inbound emails
You configure Sophos Firewall to allow inbound emails to the email domain @example.com
.
You allow Sophos Firewall to relay SMTP traffic. You create an SMTP route and scan policy to forward emails to the internal mail servers. This example uses mail servers with static IP addresses in the DMZ. You also specify the basic security settings.
- Go to Email > Policies and exceptions and click Add a policy. Click SMTP route and scan.
- Under Protected domain, select the address group you configured.
- Set Route by to Static host.
-
Under Host list, select the mail servers you've configured.
You can configure IP hosts for mail servers on Hosts and services > IP host.
Here's an example of how to select the protected domains and mail servers:
-
Turn on Spam protection.
-
Turn on Malware protection
-
Click Save.
- Go to Administration > Device access.
-
Under SMTP relay, select WAN to allow mail relay for inbound emails.
-
Click Apply.
Allow outbound emails
Turn on the SMTP relay for the DMZ zone and specify the relay settings for the mail servers. Sophos Firewall then relays outbound mail from your mail servers to the internet.
- Go to Administration > Device access.
-
Under SMTP relay, select DMZ.
-
Go to Email, hover over the more button, and click Relay settings.
-
Go to Host-based relay.
-
Under Allow relay from hosts/networks, select the mail servers.
Here's an example:
-
Click Apply.
More resources