Description
This article describes how to configure firewall policies for a VIP when Central NAT is enabled.
Scope
FortiGate.
Solution
When Central NAT is enabled, it is not necessary to add the VIP object into the firewall policy as the destination address.
This is normal behavior due to the fact that, in a Central NAT status, the DNAT is injected into the kernel since the object is created into the Policy & Objects -> DNAT & Virtual IPs. VIP matches for local-out traffic as well, if you want to restrict local-out traffic to do not match the VIP, it is possible to use 'srcintf-filter' .
The only thing needed is to create the VIP as usual:
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.