Appendix B: Maximum Values Matrix
Appendix B: Maximum Values Matrix
WThis table shows maximum values for FortiMail and is not a promise of performance.
Starting from 5.2.0, a new mechanism (warning limit and hard limit) was introduced to the following three settings: number of protected domains, number of domain associations, and number of mailboxes/mail users in server mode. When the warning limit is reached, FortiMail will display a warning message; when the hard limit is reached, FortiMail will not allow you to add more.
 
Table 56: Maximum values
Feature
60D
VM00
200D,
200E
VM01
400C,
400E
VM02
VM04
2000B
1000D
3000C,
3000D,
5002B,
VM08
Protected domains
2
50
(hard)
20
(warning)
500
(hard)
100
(warning)
1000
(hard)
800
(warning)
1000
(hard)
800
(warning)
1000
(hard)
800
(warning)
3000
(hard)
2000
(warning)
Domain associations
10
100
(hard)
50
(warning)
500
(hard)
200
(warning)
5000
(hard)
4000
(warning)
5000
(hard)
4000
(warning)
5000
(hard)
4000
(warning)
15000
(hard)
10000
(warning)
Email users (server mode) per domain and per system
50
200
(hard)
150
(warning)
1000
(hard)
400
(warning)
2000
(hard)
1500
(warning)
2000
(hard)
1500
(warning)
2000
(hard)
1500
(warning)
3000
Total interfaces
5
10
50
100
100
100
500
Dynamic DNSs per system
2
2
2
2
2
2
2
Hosts/domains per dynamic DNS
5
5
5
5
5
5
5
Routes per system
20
250
250
250
250
250
250
Webmail languages per system
32
32
32
32
32
32
32
Relay host list
5
5
5
5
5
5
5
PKI users
10
100
100
100
100
100
100
SNMP communities per system, including community hosts
2
16
16
16
16
16
16
IP policies
15
60
200
400
400
400
600
Recipient based policies (incoming or outgoing) per domain/system
15/30
60/300
400/1500
800
/3000
800
/3000
800
/3000
1500
/7500
Antispam, antivirus, authentication, and content profiles per domain/system
10/15
50/60
50/200
50/400
50/400
50/400
50/600
User groups per domain
15
20
100
200
200
200
200
User groups per system
30
100
500
1000
1000
1000
1000
Total administrators
10
50
250
350
350
350
500
Admin access control profiles
2
4
12
32
32
32
48
IP pool profile
8
32
64
96
96
96
128
Session profiles
15
60
200
400
400
400
600
Dictionary profiles
5
20
50
75
75
75
100
Dictionary groups
5
10
25
35
35
35
50
Dictionary profiles per dictionary group
2
10
10
10
10
10
10
Entries per dictionary
1024
8192
8192
8192
8192
8192
8192
LDAP profiles
5
20
50
75
75
75
100
TLS profiles
5
20
50
75
75
75
100
Antispam action profiles
20
256
256
256
256
256
256
Encryption profiles
15
60
200
400
400
400
600
Content action profiles
20
256
256
256
256
256
256
DNSBL and SURBL servers in each antispam profile
4
16
16
16
16
16
16
File attachment types in each content profile
16
16
16
16
16
16
16
Content monitor profiles in each content profile
16
16
16
16
16
16
16
Banned words in each antispam profile
256
256
256
256
256
256
256
Safe words in each antispam profile
256
256
256
256
256
256
256
Access control rules (receive)
64
128
512
768
768
768
1024
Access control rules (delivery)
16
64
128
256
256
256
512
Entries in the lists within a session profile, including sender blocklist addresses, sender safelist addresses, recipient blocklist addresses, and recipient safelist addresses
32
128
512
768
768
768
1024
Header removal list entries within a session profile
20
20
20
20
20
20
20
Certificate bindings
5
10
100
600
600
600
2000
Certificates per system, including local, CA, and remote certificates, and certificate revocation lists
10
40
80
150
150
150
256
Email archiving policies
15
60
200
400
400
400
600
Email archiving exempt policies
15
60
200
400
400
400
600
Email archiving accounts
2
5
10
15
15
15
20
Bounce verification keys
16
16
16
16
16
16
16
Bounce verification tagging exempt list (for outbound mail)
10
20
50
100
100
100
200
Bounce verification exempt list (for inbound mail)
10
20
50
100
100
100
200
Trusted MTAs
256
256
256
256
256
256
256
Trusted MTAs performing antispam scans
256
256
256
256
256
256
256
Safe list or block list entries in session profile
32
128
512
768
768
768
1024
Reports
5
20
50
100
100
100
200
Alert email recipients
3
3
3
3
3
3
3
Sensitive data fingerprints
2
4
12
32
32
32
48
Fingerprint documents
10
10
10
10
10
10
10
Fingerprint source
1
2
4
6
6
6
8
DLP scan rules
2
4
12
32
32
32
48
DLP scan rule conditions
10
10
10
10
10
10
10
DLP scan rule exceptions
10
10
10
10
10
10
10
DLP profiles
5
15
30
50
50
50
60
File patterns
32
32
32
32
32
32
32
File signatures
128
258
512
1024
1024
1024
2048