Fortinet Firewall Live!
Fortinet Firewall Live!
Starts 20th SEP @9 AM IST | Hands-On Lab Access | By Amar
Day
Hr
Min
Sec
Register for Free!
USD ($)
$
United States Dollar
India Rupee

Configure Static NAT

Lesson 8/25 | Study Time: 60 Min
Configure Static NAT

Objective

Allow an external user (from the internet) to access a DMZ web server (e.g., DMZ Server) hosted inside the firewall using Static NAT (VIP). This is also known as publishing a service.

For example: Allow internet users to access a web application running on DMZ Server (192.168.2.10) through the firewall's public IP (192.168.100.1) on port 80/443.

Scenario Overview:

● DMZ Server IP: 192.168.2.10

● Fortinet WAN IP: 192.168.100.1

We want to publish DMZ Server’s web service to the internet on http://192.168.100.1

Step 1: Create a Virtual IP (VIP) Object for Port Forwarding

From GUI:

1. Go to Policy & Objects > Virtual IPs

2. Click Create New

● Select Virtual IP

● Name: DMZ-Web-VIP

● Interface: port1 (Untrust)

● External IP Address: 192.168.100.1

● Mapped IP Address: 192.168.2.10

● Port Forwarding: Enable

● External Service Port: 80

● Map to Port: 80

3. Click OK

From CLI:

!

config firewall vip

    edit "DMZ-Web-VIP"

        set extintf "port1"

        set extip 192.168.100.1

        set mappedip "192.168.2.10"

        set portforward enable

        set extport 80

        set mappedport 80

    next

end

!

Step 2: Create a Firewall Policy to Allow Incoming Traffic

From GUI:

1. Go to Policy & Objects > Firewall Policy

2. Click Create New

● Name: Untrust-to-DMZ-Web

● Incoming Interface: port1 (Untrust-Zone)

● Outgoing Interface: port3 (DMZ-Zone)

● Source: all

● Destination: DMZ-Web-VIP

● Schedule: always

● Service: HTTP

● Action: ACCEPT

3. Enable Log Allowed Traffic

4. Click OK

From CLI:

!

config firewall policy

    edit 4

        set name "Untrust-to-DMZ-Web"

        set srcintf "port1"

        set dstintf "port3"

        set srcaddr "all"

        set dstaddr "DMZ-Web-VIP"

        set action accept

        set schedule "always"

        set service "HTTP"

        set logtraffic all

    next

end

!

Step 3: Verification:

From an external client (Assume that workstation interface E1 is the external client):

Open a browser and go to http://192.168.100.1

If a web server is running on the DMZ Server, you should see its content (*** UniNets Server01 Default Page ***)

On FortiGate:

1. Go to Log & Report > Forward Traffic

2. Look for incoming sessions to 192.168.100.1:80 being translated to 192.168.2.10:80