Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
johnlloyd13
New Contributor III

Fortigate NAT and ACL

hi,

i'm converting cisco ASA NAT and ACL config to FGT.

can someone confirm if items below are correct?

note i also used forticonverter, but it's not 100% accurate so doing this manually by hand.

 

1. if ACL has "ip" does it mean i allow "ALL_TCP" and "ALL_UDP" on the allowed services?

 

access-list acl_outside extended permit ip any host 172.16.8.4

 

2. for static identity NAT, do i use the vip config "arp-reply disable" and "set type load-balance"?

refer to link/recommendation.

these are used to "un-NAT" or exclude NAT for  the public IP on the ASA. these are for downstream customer device/CPE configured with pubic IP/WAN.

 

https://community.fortinet.com/t5/FortiGate/Technical-Tip-VIP-creation-with-same-external-IP-and-map...

 

nat (inside,outside) source static 200.1.1.1 200.1.1.1

 

edit "nat_vip"
set extip 200.1.1.1
set mappedip 200.1.1.1
set extintf "any"
set arp-reply disable
set type load-balance

 

3.for DNAT FW policy, do i use "LAN" for source interface and "WAN" for destination interface?

this FW policy worked for me when i had moved an ASA with "twice NAT" config

 

nat (inside,outside) source static any any destination static obj_outside-ip obj_inside-ip net-to-net

 

edit DNAT 1
set srcintf "port 2"   <<<< INSIDE/LAN
set dstintf "port 1"   <<< OUTSIDE/WAN
set srcaddr "all"
set dstaddr "nat_vip"
set service "ALL"
set schedule "always"
set action accept
set nat disable

 

3 REPLIES 3
Anthony_E
Community Manager
Community Manager

Hello John,


Thank you for using the Community Forum. I will seek to get you an answer or help. We will reply to this thread with an update as soon as possible.


Thanks,

Anthony-Fortinet Community Team.
sjoshi
Staff
Staff

ACL with “ip” — In ASA, permit ip means all protocols, not just TCP and UDP. On FortiGate, that’s equivalent to using the ALL service (which covers TCP, UDP, ICMP, GRE, etc.), not ALL_TCP and ALL_UDP alone. If you only choose those two, you’ll drop non-TCP/UDP traffic.

Your VIP config is correct you can also refer below article to setup virtual IP in FortiGate
https://community.fortinet.com/t5/FortiGate/Technical-Tip-Virtual-IP-VIP-port-forwarding-configurati...
https://docs.fortinet.com/document/fortigate/6.2.0/cookbook/70978/configuring-the-vip-to-access-the-...

If you have found a solution, please like and accept it to make it easily accessible to others.
Fortinet Certified Expert (FCX) | #NSE8-003459
Salon Raj Joshi
johnlloyd13
New Contributor III

hi,

 

i'll update my config to allow SERVICE: ALL.

thanks for confirming my NAT config.

one last question, can FGT support DNAT (static NAT) and SNAT (PAT) on the same public IP address?

the ASA had a static NAT and PAT referenced to the same IP and just wondering if the same is supported in a FGT?

Announcements
Check out our Community Chatter Blog! Click here to get involved
Labels
Top Kudoed Authors