I know that am not the first asking a similar question, but I' ve gone through the posts and still don' t fully get it. So here is our situation. On our primary WAN interface (we have dual-ISP connections) we have a " standard" /26 public IP block with the FG' s and ISP' s upstream router' s IP addresses being the part of this block. We are contemplating idea now to switch primary WAN connection to a different ISP. The " new" ISP provides public IP addresses differently. Instead of assigning one single IP block to a client they provide main IP block (/30) strictly for client' s and IPS' s routers communication and then forward the second IP block containing the bulk of IP addresses to the client' s firewall/router. What would be the right way of configuring a FG to handle this second IP block? Would it be sufficient to configure just VIPs on that WAN interface or we have to explicitly assign the second IP block to it as well? Some expert members (ede-pfau here, emnoc there, ...) do not recommend setting secondary IPs on a FG' s interface. In what circumstances we have to use secondary IP addresses then? Also if I need to ensure that some outbound traffic flows through/from specific IP addresses - I use IP pools for that purpose, right? Do I require to assign a secondary IP block in this case or could " get away" without it? Thank you,
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Agree - you should create VIPs (and VIPgroups if you like) to make the additional IP addresses active. As long as there' s a route to the FGT for these you should not have any problem.So if you create one or more VIPs on the wan interface the FGT will act as a proxy arp for them, i.e. answer any request to these addresses and in fact make these addresses usable. But don' t forget to actually use the VIP or VIP group in a policy to make them active.
Setting up secondary addresses invalidates the FGT' s anti-spoof check which is a drawback security-wise. So I' d always go for VIPs.That is a bit naive I think (now). It' s totally true if the secondary address is within the range of the primary address. Then you would have to disable the antispoof feature. But in your case I assume that the second address block is non-overlapping, and then you would not have to do that. Anyways, go with the VIP setup. Better visibility and easy to handle, especially for a greater number of addresses. Use a VIP group to economize on policies.
With secondary IPs you don' t have the option to forward and/or translate ports. And, with additional public IPs from the same subnet as the primary address you almost always would prefer VIPs over secondary addresses because of the address overlap. As long as you don' t use IP pools together with VIPs the VIP will sourceNAT the server' s address for server initiated traffic as well. So to speak, ' intelligent NAT' . There' s been a recent thread on exactly this topic, you might read up on it here: https://forum.fortinet.com/FindPost/112623 And no, you can use IP pools with addresses from your imagination, without any ' real' assignment first. IP pools just exchange the source address of traffic passing, and you can change it to whatever you like. Of course, traffic will only come back if the routing is correct, so NATting to 192.168.1.1 will work but will not be routed back to you.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1688 | |
1087 | |
752 | |
446 | |
227 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.