I just setup a Fortigate NGFW in a VM in Azure, but I realized I would be adding 2 additional layers of NAT in front of my load-balaced web servers. Meaning, now (ELP=External Load Balancer;PIP=Public IP; ILB=Internal Load Balancer): ELB PIP --->(NAT)---> VM internal IP with firewall: Firewall PIP --->(NAT)---FW internal IP--->(NAT)---ILB--->(NAT)---VM internal IP
I don't think triple NAT can be considered an optimal setup. Am I just doing this wrong?
It's not ideal but something it's the law of the jungle and you have no other options. Ideally you want NAT simplified but even in AWS with EIP, you have the same issues sometimes.
It make gathering logging and details about session flow harder to track also.
ken
PCNSE
NSE
StrongSwan
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1738 | |
1108 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.