thanks for your responses guys.
This might help:
http://www.gliffy.com/pubdoc/2695894/L.png
Here is what' s going to happen:
I have workstations that need to access a resource that' s on the other end of an IPSEC tunnel.
The outgoing IPSEC packets must have the NATed source of 192.168.115.40.
The router in front of the firewall routes by source address... it accepts packets from 192.168.115.40 and routes them all to 144.12.145.10.
Therefore, I need to qualify traffic for a NAT, when it is outgoing on a port, with a given destination. The traffic will not be sourcing from another port, but on the Fortigate itself.
Now, in addition to this, the destination 144.12.145.10 is a VPN, so this will reveal another subnet to be routed to that first hop, where I wish that to also be NATed. This source of this traffic
will be off an port, internal1, destined for the hop on the other side of the VPN.
source workstations>internal1>[IPSEC tunnel on fortigate]>{IPSEC packets NATed to 192.168.115.40}>dmz>router>{{cloud}}>router>[IPSEC endpoint]>destination resource
I need to qualify traffic for a NAT, by destination IP, and destination port on the Fortigate.
So... NAT to 192.168.115.40...
if the traffic is destined for 144.12.145.10,
and it' s leaving the dmz.
Again, the only traffic that is destined for 144.12.145.10 will be the IPSEC packets.
Any ideas? The VIP won' t work, since it is qualified by " incoming traffic," which no traffic will be incoming! It will only be outgoing.
It' s funny, because this is an absolutely trivial thing on Cisco, but seems very complex on FortiOS. Any help is appreciated.
Thanks!
Matt
" …you would also be running into the trap of looking for the answer to a question rather than a solution to a problem." - [link=http://blogs.msdn.com/b/oldnewthing/archive/2013/02/13/10393162.aspx]Raymond Chen[/link]