Hi,
and welcome to the forums!
ItotallyunderstandthatyouarenewtoFortinetbutthatdoesntmatterweallstartedasnewbies! </humor, German kind>
Yes, there is a small mistake in your config. If you define a secondary IP address then the interface will respond to queries to it, e.g. via arp. The VIP construct in FortiOS does exactly the same but combines that with destination NAT. So you have 2 interfaces/hosts responding, the FGT and the internal server, which leads to confusion.
For security reasons the use of secondary IPs is disencouraged whenever there is a better way.
So your setup will do with VIPs only, for all public IP addresses except the principal WAN IP.
As you do have enough public addresses for your internal server(s) there is no need to configure them as port forwarding - use just the address translation without port forwarding. Added benefit: the VIP' ed server will respond to ping now (if the policy permits).
You protect the internal hosts via policies and UTM as usual.
" Best practice" would be to put the servers on a physical port of their own (i.e. into a DMZ) and not allow traffic from DMZ to internal LAN. This way, if a server get hijacked the damage would be limited to the hosts in the DMZ. For your setup this would mean near to nothing effort.
You' re welcome if you have more questions.
Ede Kernel panic: Aiee, killing interrupt handler!