Created on 03-17-2021 06:24 AM Edited on 11-04-2024 12:03 AM By Anthony_E
Description
This article provides an example of configuring an interface and policies on a FortiGate.
Scope
FortiGate.
Solution
Basic Topology.
DNS Configuration:
Configuring DNS is necessary for internet access. Users can go to Network -> DNS to set FortiGuard DNS servers or any preferred DNS servers, ensuring name resolution for internal devices.
Adding a default route.
From CLI to change 'distance' and 'priority':
config system interface
edit wan1
set priority 1 <----- Change to desired priority.
set distance 5 <----- Change to desired distance.
end
NAT Settings in Policy:
When creating the policy to allow internet access, it’s important to check that NAT is enabled. In Policy & Objects -> IPv4 Policy, under the policy settings, select NAT to translate private IP addresses to the public IP on the WAN interface.
Security Profile Configuration:
Security profiles (like Antivirus, Web Filter, and Intrusion Prevention) can be added to the policy for internet-bound traffic. This enhances security for outbound traffic by protecting against threats from the internet.
Logging and Monitoring:
Recommend enabling logging for the policy to monitor traffic. Users can enable Log Allowed Traffic under Policy & Objects -> IPv4 Policy and choose to log all sessions or only security events. This will allow users to monitor internet access logs in Log & Report -> Forward Traffic.
Browse the Internet using the PC on the internal network.
Related article:
Technical Tip: PPPoE interface option not available from GUI
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.