Nat/Route Mode With Multiple External Network Connections - Fortinet FortiGate FortiGate-500 Installation Manual

Fortinet fortigate fortigate-500: install guide
Hide thumbs Also See for FortiGate FortiGate-500:
Table of Contents

Advertisement

Planning the FortiGate configuration

NAT/Route mode with multiple external network connections

22
You can add firewall policies to control whether communications through the
FortiGate unit operate in NAT or Route mode. Firewall policies control the flow of
traffic based on the source address, destination address, and service of each packet.
In NAT mode, the FortiGate unit performs network address translation before it sends
the packet to the destination network. In Route mode, there is no address translation.
You typically use NAT/Route mode when the FortiGate unit is operating as a gateway
between private and public networks. In this configuration, you would create NAT
mode firewall policies to control traffic flowing between the internal, private network
and the external, public network (usually the Internet).
If you have multiple internal networks, such as a DMZ network in addition to the
internal, private network, you could create route mode firewall policies for traffic
flowing between them.
Figure 5: Example NAT/Route mode network configuration
External
204.23.1.5
Internet
In NAT/Route mode, you can configure the FortiGate unit with multiple redundant
connections to the external network (usually the Internet). For example, you could
create the following configuration:
External is the default interface to the external network (usually the Internet).
Port 1 is the redundant interface to the external network.
Internal is the interface to the internal network.
DMZ is the interface to the DMZ network.
You must configure routing to support redundant Internet connections. Routing can be
used to automatically redirect connections from an interface if its connection to the
external network fails.
Otherwise, security policy configuration is similar to a NAT/Route mode configuration
with a single Internet connection. You would create NAT mode firewall policies to
control traffic flowing between the internal, private network and the external, public
network (usually the Internet).
If you have multiple internal networks, such as a DMZ network in addition to the
internal, private network, you could create route mode firewall policies for traffic
flowing between them.
01-28004-0023-20040830
FortiGate-500 Unit
in NAT/Route mode
INTERNAL EXTERNAL
DMZ
HA
1
2
3
4
5
6
Esc
Enter
NAT mode policies controlling
traffic between internal and
external networks.
Getting started
Internal network
192.168.1.3
Internal
192.168.1.99
Route mode policies
controlling traffic between
7
8
internal networks.
DMZ
DMZ network
10.10.10.1
10.10.10.2
Fortinet Inc.

Advertisement

Table of Contents
loading

Table of Contents