In the middle policy above, did you mean to say VIP instead of MIP? Otherwise I don't see any use of the VIP in the Juniper config.
Anyway, I'm not familiar with Juniper personally, but it looks to me like VIPs are VIPs in both worlds (though of course there may be subtle differences). MIPs appear to be IP Pools in the FortiGate world. However, unless you're doing central NAT you don't specify the internal address at all. On the FortiGate IP Pool you would just define the external IP, and then use that IP Pool when programming what NAT to use for the specific outbound policy.
Hope this helps. There is tons of documentation on FortiGate's site, especially their cookbooks that might be helpful to you. https://cookbook.fortinet.com/
What is the alternative for MIP and VIP of Juniper in Fortigate? Following is one of our configuration in juniper
and for the same public IP there is a VIP configuration
In the Fortigate world, all of this is configured in the Virtual IP definition. An inbound policy would simply allow/deny access to the internal server in one step. You simply use the VIP definition as the target of the policy with the associated service(s) of course. The example you provided would be referred to as a 'Port Forwarding' Virtual IP. You may also map all ports to an IP address if you have the availability. This option will send ICMP traffic to the internal host as well, while a port forward will not.
Thank you everyone for your responses. Ok let me just explain our requirement:
We have MDaemon (Email Server) running in our environment which has local IP and that IP is mapped to the public IP which I have mentioned above. The email server uses a DomainPOP mechanism to fetch emails from hosted pop server which means we'll be needing POP service to open. The email server also has webmail which will be accessed locally and externally for that we need http/https to be open.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.