Created on
08-26-2025
11:04 PM
Edited on
09-16-2025
01:04 AM
By
Jean-Philippe_P
Description | This article describes the correct way to create a VIP (DNAT) when WANs are in SD-WAN on FortiGate. |
Scope | FortiGate. |
Solution |
SD-WAN only determines the outgoing path; for incoming traffic, bind the VIP to the physical WAN(s) or use extintf any, not to the SD-WAN zone.
Example:
config firewall vip edit "vip_web_wan1" set extip 203.0.113.10 set mappedip "10.10.10.10" set extintf "wan1" set portforward enable set extport 443 set mappedport 443 next end
config firewall policy edit 100 set name "in_web_wan1" set srcintf "wan1" set dstintf "lan" set srcaddr "all" set dstaddr "vip_web_wan1" set action accept set schedule "always" set service "HTTPS" set nat disable next end
Option B: Two WANs. Create a VIP for each WAN (each with its own public IP) and set up two identical policies by changing the Incoming interface and the Destination (VIP of WAN1 / VIP of WAN2). SD-WAN does not perform inbound load balancing; if it is required public high availability, utilize two DNS records (A/AAAA) with a low TTL or a failover mechanism in the DNS/ISP.
Example:
config firewall vip edit "vip_web_wan2" set extip 198.51.100.20 set mappedip "10.10.10.10" set extintf "wan2" set portforward enable set extport 443 set mappedport 443 next end
config firewall policy edit 101 set name "in_web_wan2" set srcintf "wan2" set dstintf "lan" set srcaddr "all" set dstaddr "vip_web_wan2" set action accept set schedule "always" set service "HTTPS" set nat disable next end
Notes:
Related documents: Technical Tip: VIP not working with SD-WAN reply traffic causing issue |
Great Technical Tip @ramirezc ! Thank you for sharing
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.