Understand and configure Central NAT on Fortinet, which gives you full control over address translation separate from firewall policies. You’ll configure Central NAT for outbound internet access.
By default, FortiGate performs NAT within firewall policies (called Policy NAT). However, for complex networks, it's better to use Central NAT, which separates NAT logic from security policies. This makes NAT easier to manage and troubleshoot.
Central NAT will be enabled.
● We'll define NAT rules for Inside and DMZ traffic to the Untrusted (Internet).
● Source NAT will use the Fortinet Untrusted IP (192.168.100.1) for all outbound traffic.
From GUI:
1. Go to System > Feature Visibility
2. Enable Central NAT under Additional Features
3. Click Apply
From CLI:
! config system settings set central-nat enable end ! |
Note: Now your NAT rules are managed under Policy & Objects > Central NAT instead of being embedded in policies.
From GUI:
1. Go to Policy & Objects > Central NAT
2. Click Create New
● Original Source: Inside-LAN (192.168.1.0/24)
● Original Destination: all
● Original Service: ALL
● Translated Source IP: Use Interface Address
● Outgoing Interface: port1 (WAN)
3. Click OK
From CLI:
! config firewall central-snat-map edit 1 set orig-addr "Inside-LAN" set dst-addr "all" set protocol 0 set srcintf "port2" set dstintf "port1" set nat-ippool "Use Outgoing Interface IP" next end ! |
From GUI:
1. Go to Policy & Objects > Firewall Policy
2. Edit the Inside-to-Internet policy (created in Lab 4)
3. Uncheck "Enable NAT"
4. Click OK
Note: This tells FortiGate not to perform NAT here — NAT will be handled by Central NAT rules.
From Inside PC:
1. Open a browser and try http://google.com or ping 8.8.8.8
2. Traffic should still go through, now using Central NAT rule
On Fortinet:
1. Go to Log & Report > Forward Traffic and inspect sessions
2. You should see traffic being SNAT’d using the Central NAT rule