Can one use IP Pools for SNAT with the source interfaces as a Zone and the destination as a physical interface? I did read that you can't use zones and IP Pools and was wondering if that is still the case? Or is it only the destination that can't be a zone, that I would understand.
"Internal Trusted" is a Zone containing two interfaces, destination is a vlan interface:
The vlan interface has an ip of 22.214.171.124/30 and next hop is 126.96.36.199.
IP Prefix: 188.8.131.52/30
FW IP: 184.108.40.206
PE IP: 220.127.116.11
So if I need to SNAT the traffic destined to 18.104.22.168 so that it looks like it's coming from 22.214.171.124/32 they would also need to have that (126.96.36.199/32) in their routing table pointing towards the fortigate right?
First, FGT's zone is just an "alias" to represent multiple interfaces with one name in policies. Nothing more than that, which is different from Palo Alto's zone, or Juniper SRX's zone, or some other server vased FWs as far as I know.
Then SNAT with ippool shouldn't be affected if you use interfaces or zones for src/dst interfaces in policies. As a matter of fact we use zone for an outing interface on one of our FGTs while SNAT/ippool is applied to the policies.
Is it not working?
Of course if there is returning traffic toward the SNAT IP from the destination side, there needs to be a route on the other end to point the traffic destined to the SNAT IP to the real interface.
Thanks for the info. It's not working at the moment but suspect the other company hasn't added the route back to me yet. If I remove the SNAT and just NAT it on the interface IP it works fine, so suspect it's the route that's missing on the other side.
Thanks, the flow does show it's changing the the source NAT to the correct IP, did this test over another source interface, can only do the test over the zone later today but suspect the issue is on the other side
Telnet test to 188.8.131.52 on port 7805, so my side looks fine at least.
No, as I said before, zone is just an alias and you can't use it for debugging or doesn't show. A FGT looks/shows flow on interfaces. That's the difference of zone from other vendor devices like Palo Alto, etc.