FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
sbabu
Staff
Staff
Article Id 397873
Description

 

This article describes how to configure NAT46 to allow IPv4 traffic to reach IPv6-only traffic when central SNAT is enabled.

 

Scope

 

FortiOS.

 

Solution

 

Topology:

 

NAT46_With central NAT.png

 

  1. Enable Central SNAT by navigating to System -> Settings -> System Operation Settings -> Enable Central SNAT.

 

NAT46_1.png

 

  1. Configure a VIP to a different IPv4 network address and map it to the actual IPv6 server address, and enable NAT46 through CLI, and then define an IPv6 pool.

     

 

NAT46_2.png

 

CLI:

 

config firewall vip
    edit "VIP46"
        set uuid 4b66f586-50d5-51f0-48c3-b8970c112b2a
        set extip 10.200.0.100
        set nat44 disable
        set nat46 enable  <--- 
        set extintf "port3"
        set ipv6-mappedip 2abc:abc::ab
    next
end

 

NAT46_3.png

 

CLI:


FW1 (Ipv6) # show
config firewall ippool6
    edit "Ipv6"
        set startip 2abc:abc::ac
        set endip 2abc:abc::ad
        set nat46 enable
    next

end

 

  1. Configure a Central NAT policy to translate the IPv4 address of 10.200.0.100 to the IPv6 Pool address range. 

    NAT46_6.png

     

     

  2. Configure a firewall policy to allow this NAT46 traffic.

     


NAT46_5.png

 

CLI:

 

FW1 (2) # show
    config firewall policy
        edit 2
            set name "NAT46 policy"
            set uuid 30598124-50e3-51f0-27a6-36935583fcac
            set srcintf "port3"
            set dstintf "port4"
            set action accept
            set nat46 enable
            set srcaddr "PC1-ipv4"
            set dstaddr "Dnat_IPv6" <----
            set srcaddr6 "all"
            set dstaddr6 "all"
            set schedule "always"
            set service "ALL"
            set logtraffic all
        next

   end

 

Note:

In firewall policy, when Central SNAT is enabled, the user cannot add a VIP object as a destination address. Hence, it is recommended to use actual mapped addresses.

 

Related articles:

Technical Tip: How to Create a NAT64 Firewall Policy for a VIP

Technical Tip: How to configure NAT64 to allow IPv6 traffic to reach IPv4-only traffic domain when c...