Nat/Route Mode With Multiple External Network Connections; Transparent Mode - Fortinet FortiGate FortiGate-800 Installation And Configuration Manual

Fortinet network device installation and configuration guide
Hide thumbs Also See for FortiGate FortiGate-800:
Table of Contents

Advertisement

Getting started

NAT/Route mode with multiple external network connections

Transparent mode

FortiGate-800 Installation and Configuration Guide
In NAT/Route mode, you can configure the FortiGate unit with multiple redundant
connections to the external network (usually the Internet). For example, you could
create the following configuration:
External is the default interface to the external network (usually the Internet).
Interface 1 is the redundant interface to the external network.
Internal is the interface to the internal network.
DMZ is the interface to the DMZ network.
You must configure routing to support redundant Internet connections. Routing can be
used to automatically redirect connections from an interface if its connection to the
external network fails.
Otherwise, security policy configuration is similar to a NAT/Route mode configuration
with a single Internet connection. You would create NAT mode policies to control traffic
flowing between the internal, private network and the external, public network (usually
the Internet).
If you have multiple internal networks, such as a DMZ network in addition to the
internal, private network, you could create route mode policies for traffic flowing
between them.
Figure 5: Example NAT/Route multiple internet connection configuration
External
204.23.1.5
Internet
Port 1
64.83.32.45
In Transparent mode, the FortiGate unit is invisible to the network. Similar to a
network bridge, all FortiGate interfaces must be on the same subnet. You only have to
configure a management IP address so that you can make configuration changes.
The management IP address is also used for antivirus and attack definition updates.
You typically use the FortiGate unit in Transparent mode on a private network behind
an existing firewall or behind a router. The FortiGate unit performs firewall functions as
well as antivirus and content scanning but not VPN.
FortiGate-800 Unit
in NAT/Route mode
I N T E R N A L
E X T E R N A L
D M Z
HA
1
2
Esc
Enter
P W R
8
NAT mode policies controlling
traffic between internal and
external networks.
Planning the FortiGate configuration
Internal network
192.168.1.3
Internal
192.168.1.1
Route mode policies
3
4
CONSOLE
USB
controlling traffic between
internal networks.
DMZ
DMZ network
10.10.10.2
10.10.10.23
37

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the FortiGate FortiGate-800 and is the answer not in the manual?

Table of Contents

Save PDF