Hi all,
We have a small problem getting email alerts working on our SSG5's.
We have an SSG140 in our Head Office and a number of VPN's linking our Branch offices using SSG5's.
The branches are all on various Class C subnets and we have no issue with the flow of traffic between the locations.
Our issue is that when we configure our SSG5's with our email server based in Head Office (using our email servers class C address), we get a "cannot connect..." message in the log and hence no alerting. No such problem on the SSG140 where the email server is on the same internal subnet.
Branch configs are:
set admin mail alert
set admin mail server-name "<our email server ip>"
set admin mail mail-addr1 "<email@oursite.com>"
set admin mail traffic-log
We realise this likely a routing and/or policy issue but all our afforts to date would suggest that this SMTP traffic is not traversing the device and is not being blocked by a policy rule. If we use a valid internet based address for a mail server the service appears to connect ok. We can't work out why the device cannot route the traffic through the VPN to Head Office.
Our question is, effectively what interface/zone is the alerting bound to on the SSG5? i.e. if we need to setup a policy which zone or interface does the alerting come from by default?
We have enabled our email server with the SSG5 addresses to relay mail from these devices. From our faultfinding to date, It would seem the request is not making it to the server.
Any help gratefully received.
Thanks