hi,
i'm converting cisco ASA NAT and ACL config to FGT.
can someone confirm if items below are correct?
note i also used forticonverter, but it's not 100% accurate so doing this manually by hand.
1. if ACL has "ip" does it mean i allow "ALL_TCP" and "ALL_UDP" on the allowed services?
access-list acl_outside extended permit ip any host 172.16.8.4
2. for static identity NAT, do i use the vip config "arp-reply disable" and "set type load-balance"?
refer to link/recommendation.
these are used to "un-NAT" or exclude NAT for the public IP on the ASA. these are for downstream customer device/CPE configured with pubic IP/WAN.
nat (inside,outside) source static 200.1.1.1 200.1.1.1
edit "nat_vip"
set extip 200.1.1.1
set mappedip 200.1.1.1
set extintf "any"
set arp-reply disable
set type load-balance
3.for DNAT FW policy, do i use "LAN" for source interface and "WAN" for destination interface?
this FW policy worked for me when i had moved an ASA with "twice NAT" config
nat (inside,outside) source static any any destination static obj_outside-ip obj_inside-ip net-to-net
edit DNAT 1
set srcintf "port 2" <<<< INSIDE/LAN
set dstintf "port 1" <<< OUTSIDE/WAN
set srcaddr "all"
set dstaddr "nat_vip"
set service "ALL"
set schedule "always"
set action accept
set nat disable
Hello John,
Thank you for using the Community Forum. I will seek to get you an answer or help. We will reply to this thread with an update as soon as possible.
Thanks,
ACL with “ip” — In ASA, permit ip means all protocols, not just TCP and UDP. On FortiGate, that’s equivalent to using the ALL service (which covers TCP, UDP, ICMP, GRE, etc.), not ALL_TCP and ALL_UDP alone. If you only choose those two, you’ll drop non-TCP/UDP traffic.
Your VIP config is correct you can also refer below article to setup virtual IP in FortiGate
https://community.fortinet.com/t5/FortiGate/Technical-Tip-Virtual-IP-VIP-port-forwarding-configurati...
https://docs.fortinet.com/document/fortigate/6.2.0/cookbook/70978/configuring-the-vip-to-access-the-...
hi,
i'll update my config to allow SERVICE: ALL.
thanks for confirming my NAT config.
one last question, can FGT support DNAT (static NAT) and SNAT (PAT) on the same public IP address?
the ASA had a static NAT and PAT referenced to the same IP and just wondering if the same is supported in a FGT?
User | Count |
---|---|
2574 | |
1373 | |
796 | |
657 | |
455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.