Fortinet Firewall Live!
Fortinet Firewall Live!
Starts 20th SEP @9 AM IST | Hands-On Lab Access | By Amar
Day
Hr
Min
Sec
Register for Free!
USD ($)
$
United States Dollar
India Rupee

Security Policy and Nat For Inside

Lesson 5/25 | Study Time: 60 Min
Security Policy and Nat For Inside

Objective:

Allow Inside users to browse the internet by creating firewall security policies and enabling source NAT (IP masquerading).

Step 1: Create Security Policy (Inside to Untrust)

From the GUI:

1. Go to Policy & Objects > Firewall Policy

2. Click Create New

● Name: Inside-to-Untrust

● Incoming Interface: port2 (Inside-Zone)

● Outgoing Interface: port1 (Untrust-Zone)

● Source: all (or create an address object for Inside subnet: 192.168.1.0/24)

● Destination: all

● Schedule: always

● Service: ALL

● Action: ACCEPT

● NAT: Enable

3. Use Outgoing Interface Address

4. Click OK

From the CLI:

!

config firewall policy

    edit 1

        set name "LAN-to-Internet"

        set srcintf "port2"

        set dstintf "port1"

        set srcaddr "all"

        set dstaddr "all"

        set action accept

        set schedule "always"

        set service "ALL"

        set nat enable

    next

end

!

Step 2: Verification:

1. Test Internet from Inside PC:

Open browser → try http://www.uninets.com

2. Use command prompt:

ping 8.8.8.8

nslookup google.com

3. You should receive replies. If not:

 Double-check the policy’s source/destination interfaces.

 Make sure NAT is enabled.

 Ensure PC is pointing to 192.168.1.1 as default gateway.

4. Optional Logging:

From the GUI, in policy settings, enable:

Log Allowed Traffic → All Sessions

Generate the traffic on Inside PC and check the logs.

Go to Log & Report > Forward Traffic to monitor traffic flow.