1. Home
  2. Docs
  3. Inbound Shield™
  4. Inbound Relay integration – Google Workspace
  5. Configuration

Configuration

Step 1 – Navigating to “Email Relay Integration”
First, you will need to log into the Trustifi web portal using your admin credentials. Once logged in, click on “Inbound Management” on the left side navigation bar and then click on the “Plan Settings” page. Make sure the selected architecture is “via Email Relay“. If you want to create the inbound mail flow integration using an MX record, please see our MX integration guide
Step 2 – Adding your domain, MTA, and port
Under the “Email Relay Integration” section you will need to enter your domain, Mail Transfer Agent (MTA) and port. If you are not sure what your MTA is, you can click “resolve host” to auto-fill the “MTA” field. The port number will usually be 25.
Note: If you have several domains which should be protected you can add multiple domains with their corresponding MTAs. For each domain, up to 3 MTAs can be added – the first MTA will be used by default and the other 2 will be used as a fallback in case the first MTA fails.
Step 3 – Enabling the Inbound Email Relay
After your domain, MTA, and port have been added, simply click the “Enable” toggle and confirm in the pop-up window After the Inbound Email Relay has been enabled, your Email Relay key will be generated. You can copy this key now to use it later in configuration.
Note: This action will not yet change anything in your server’s inbound mail flow. Mail traffic will only be routed through Trustifi after the mail-flow rule and connectors have been set up.
rst, you will need to log into the Trustifi web portal using your admin credentials. Once logged in, click on “Inbound Management” on the left side navigation bar and then click on the “Plan Settings” page.
Make sure the selected architecture is “via Email Relay”. If you want to create the inbound mail flow integration using an MX record, please see our MX integration guide
Step 2 – Adding your domain, MTA, and port
Under the “Email Relay Integration” section you will need to enter your domain, Mail Transfer Agent (MTA) and port. If you are not sure what your MTA is, you can click “resolve host” to auto-fill the “MTA” field.
The port number will usually be 25.
Note: If you have several domains which should be protected you can add multiple domains with their corresponding MTAs. For each domain, up to 3 MTAs can be added – the first MTA will be used by default and the other 2 will be used as a fallback in case the first MTA fails.
Step 3 – Enabling the Inbound Email Relay
After your domain, MTA, and port have been added, simply click the “Enable” toggle and confirm in the pop-up window
After the Inbound Email Relay has been enabled, your Email Relay key will be generated. You can copy this key now to use it later in configuration.
Note: This action will not yet change anything in your server’s inbound mail flow. Mail traffic will only be routed through Trustifi after the mail-flow rule and connectors have been set up.
Google Admin Center
Step 4 – Navigating to the Google Admin Center – Mail flow
Navigate to the “Google Admin Center” via the following link – https://admin.google.com/ After you have logged in, input “hosts” in the search bar and select the first option.
Navigating to "Hosts"

Step 5 – Adding a new route
Click on “ADD ROUTE” under “Hosts“.
Adding a new route

Step 6 – Creating the host
Configure the following:
  • Name your host
  • Select “Single host
  • In the “Host name” field enter “inbound-smtp.trustifi.com” (without the quotes) with port 25.
  • Check these boxes: “Require mail to be transmitted via a secure (TLS) connection“, “Require CA signed certificate” , “Validate certificate hostname
  • Click “SaveConfiguring the host
Step 7 – Validate the host
Make sure your host’s address and port are correct.
Validating the host

Step 8 – Navigating to “Settings for Gmail”
In the navigation bar at the top of the screen, click on “Settings for Gmail“.
Navigating to "Settings for Gmail"
Step 9 – Navigating to “Compliance”
Scroll down to the bottom of the page and click on “Compliance“.
Navigating to "Compliance"

Step 10 – Adding a new route
Now we will need to configure a set of rules to guide mail flow to our new host. In the “Compliance” page, scroll down to the “Content compliance” section and click on “Add another rule“. Note: if there are no existing rules under “Content compliance“, you will need to click on “Configure“.
Creating a new routing rule

Step 11 – Configuring the route
Name your routing rule, check the “Inbound” and “Internal – receiving” boxes.
Naming the settings and selecting route type
Step 12 – Adding a routing condition
In section 2, select “If ALL of the following match the message” and click “Add“.
Creating a rule condition
Step 13 – Configuring the IP routing condition
This condition is made to skip emails that have already been sent by Trustifi’s inbound IPs, which can result in email loops. Set the following configurations:
  • Select “Advanced content match
  • Under “Location“, select “Full headers
  • Under “Match type“, select “Not matches regex
  • Add this regex (without the quote marks) – “^Received[:].+(3[.]93[.]139[.]220|3[.]93[.]243[.]176|3[.]251[.]32[.]127|54[.]195[.]145[.]1)”
  • Click “Save
Step 14 – Modifying the message
In section 3, check the boxes for “Add X-Gm-Spam and X-Gm-Phishy headers” and “Add custom headers“. Then, click on “Add” to add the custom header.
Modifying the message

Step 15 – Setting the custom header
For the header key, enter “trustifi-creds“. Note: the full header value is “x-trustifi-creds”. However, since Google add the initial “X” by default, it’s important to only add the value “trustifi-creds” here to avoid a malformed header. For the header value, use the Inbound Relay secret key you copied from the Trustifi portal under “Inbound Management” > “Plan Settings” > “Email Relay Integration“.
Setting the custom header

Step 16 – Setting the route
Under “Route“, check the boxes for “Change route” and “Also reroute spam“. Set the routing host to “Trustifi Inbound Shield” (which was created earlier).
Setting the route

Step 17 – Bypass spam and require TLS
Check the boxes for “Bypass spam filter for this message” and “Require secure transport (TLS)“.
https://trustifi.com/wp-content/w3-webp/uploads/2022/05/bypassAndTls.pngw3.webp
Step 18 – Saving the routing rule
Click on “Save” at the bottom right corner to save the routing rule.
Saving the routing rule

Step 19 – Verifying the routing rule
After the routing rule is saved, verify it was saved correctly and that the status is showing “Enabled“.
Verifying the routing rule

Step 20 – Adding the Trustifi IP set to your SPF record
To make sure incoming emails will not be tagged as spam/phishing by Google after being routed through the Trustifi relay, it is highly recommended to add the following IPs to your domain’s SPF record:
  • 3.93.243.176
  • 3.93.139.220
  • 3.251.32.127
  • 54.195.145.1
Note: This step is not strictly mandatory, but we recommend it to avoid disruption of mail flow.
Step 21 – Bypassing default google protections
After finishing the deployment of Trustifi’s inbound relay in Google, we highly recommend disabling or modifying some of Google’s default protection policies. To bypass these settings and policies, view our guide here:
Bypassing Default Google Protections

How can we help?