|
In this example, each internal server is mapped to a unique public IP using FortiGate Virtual IP (VIP) configured for static 1:1 DNAT.

External users can reach these servers by connecting to the corresponding addresses within the VIP range:
| VIP Address |
Internal IP Address |
| 10.47.21.1 |
10.201.5.11 |
| 10.47.21.2 |
10.201.5.12 |
| 10.47.21.3 |
10.201.5.13 |
DNAT Configuration
Below is the session list
diagnose sys session list
session info: proto=1 proto_state=00 duration=5 expire=54 timeout=0 refresh_dir=both flags=00000000 socktype=0 sockport=0 av_idx=0 use=3 origin-shaper= reply-shaper= per_ip_shaper= class_id=0 ha_id=0 policy_dir=0 tunnel=/ vlan_cos=0/255 state=log may_dirty f00 f02 statistic(bytes/packets/allow_err): org=60/1/1 reply=0/0/0 tuples=2 tx speed(Bps/kbps): 10/0 rx speed(Bps/kbps): 0/0 orgin->sink: org pre->post, reply pre->post dev=3->12/12->3 gwy=0.0.0.0/0.0.0.0 hook=pre dir=org act=dnat 10.111.36.24:1->10.47.21.2:8(10.201.5.12:1) hook=post dir=reply act=snat 10.201.5.12:1->10.111.36.24:0(10.47.21.2:1) misc=0 policy_id=2 pol_uuid_idx=15859 auth_info=0 chk_client_info=0 vd=0 serial=00073541 tos=ff/ff app_list=0 app=0 url_cat=0 rpdb_link_id=00000000 ngfwid=n/a npu_state=0x000100 no_ofld_reason: npu-flag-off
session info: proto=1 proto_state=00 duration=8 expire=51 timeout=0 refresh_dir=both flags=00000000 socktype=0 sockport=0 av_idx=0 use=3 origin-shaper= reply-shaper= per_ip_shaper= class_id=0 ha_id=0 policy_dir=0 tunnel=/ vlan_cos=0/255 state=log may_dirty f00 f02 statistic(bytes/packets/allow_err): org=60/1/1 reply=0/0/0 tuples=2 tx speed(Bps/kbps): 7/0 rx speed(Bps/kbps): 0/0 orgin->sink: org pre->post, reply pre->post dev=3->12/12->3 gwy=0.0.0.0/0.0.0.0 hook=pre dir=org act=dnat 10.111.36.24:1->10.47.21.1:8(10.201.5.11:1) hook=post dir=reply act=snat 10.201.5.11:1->10.111.36.24:0(10.47.21.1:1) misc=0 policy_id=2 pol_uuid_idx=15859 auth_info=0 chk_client_info=0 vd=0 serial=0007353c tos=ff/ff app_list=0 app=0 url_cat=0 rpdb_link_id=00000000 ngfwid=n/a npu_state=0x000100 no_ofld_reason: npu-flag-off
session info: proto=1 proto_state=00 duration=3 expire=56 timeout=0 refresh_dir=both flags=00000000 socktype=0 sockport=0 av_idx=0 use=3 origin-shaper= reply-shaper= per_ip_shaper= class_id=0 ha_id=0 policy_dir=0 tunnel=/ vlan_cos=0/255 state=log may_dirty f00 f02 statistic(bytes/packets/allow_err): org=60/1/1 reply=0/0/0 tuples=2 tx speed(Bps/kbps): 18/0 rx speed(Bps/kbps): 0/0 orgin->sink: org pre->post, reply pre->post dev=3->12/12->3 gwy=0.0.0.0/0.0.0.0 hook=pre dir=org act=dnat 10.111.36.24:1->10.47.21.3:8(10.201.5.13:1) hook=post dir=reply act=snat 10.201.5.13:1->10.111.36.24:0(10.47.21.3:1) misc=0 policy_id=2 pol_uuid_idx=15859 auth_info=0 chk_client_info=0 vd=0 serial=00073549 tos=ff/ff app_list=0 app=0 url_cat=0 rpdb_link_id=00000000 ngfwid=n/a npu_state=0x000100 no_ofld_reason: npu-flag-off total session: 3
|