Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
If you do not using ZONE, Internal to Internal can not work until using Virtual IP.
For example create a VIP for your client or server on your internal network and then create a policy with NAT enabled.
You should call VIP not real address of the server.
The better way is moving your server to another interface of FortiGate.
The answer is 'No' for 99% of all cases.
Usually hosts on your LAN belonging to the same subnet determine that a peer is on the same subnet (by masking the destination address with their netmask) and use the ARP protocol to directly contact it on layer 2. Only if the peer has to be reached by routing, and if the FGT is the default gateway of your subnet, then the FGT "sees" that traffic and can scan it. One example of this given is 2 different subnets on the same physical LAN. You would use an 'internal' > 'internal' policy for this to be allowed.
One workaround would be to create a zone of all internal interfaces, allow 'intra-zone' traffic and create an 'internal' > 'internal' policy. That should see all internal traffic but I haven't tested this yet.
The drawback is that member interfaces of a zone cannot be used as single interfaces in policies. This is to avoid ambiguities when traffic is facing a zone policy and an interface policy for both the same interface.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1712 | |
1093 | |
752 | |
447 | |
231 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.