Hello all, first time Fortigate user and need a little help. I'm upgrading from a Watchguard Firewall, the feature set on the 300D is impressive to say the least.
Here is an example of a problem I am having trouble solving, and I think it's because I just don't understand how things are done on the Fortigate side:
I have 4 AWS servers (don't have contiguous IPs) that I need to allow authentication over LDAP-SSL to a server inside my network. Here is how I have it set up in Watchguard:
1) I create a 1-1 NAT for the server in question mapping an external IP to the internal IP of the server on my network.
2) I create a rule with those 4 servers mapping to the external IP created in step 1 for port TCP port 636.
3) I create a rule outgoing from the internal IP of my server, going to those 4 servers over the same ports. (reverse of step 2)
4) All other traffic is implicitly denied.
Now, attempting to recreate that in Fortigate:
1) I create an LDAP-SSL Service that is TCP on port 636.
2) I create each server as a destination, I leave them as not listed.
3) I create a destination group, and choose the 4 servers, then I leave that as listed. This allows me to quickly select them all at once (they always are referenced together)
4) Here I get stuck... I am not sure how to do 1:1 NAT or if that is even the best way to do it. For the purposes of this discussion, let's call my internal server IP 192.168.1.125.
I thought I had it working with VIPs, but when I turned the rule on, DNS stopped working. And I honestly couldn't figure out why.
Any help would be greatly appreciated, thanks so much!
FCNSA, FCNSP
---
FortiGate 200A/B, 224B, 110C, 100A/D, 80C/CM/Voice, 60B/C/CX/D, 50B, 40C, 30B
FortiAnalyzer 100B, 100C
FortiMail 100,100C
FortiManager VM
FortiAuthenticator VM
FortiToken
FortiAP 220B/221B, 11C
FCNSA, FCNSP
---
FortiGate 200A/B, 224B, 110C, 100A/D, 80C/CM/Voice, 60B/C/CX/D, 50B, 40C, 30B
FortiAnalyzer 100B, 100C
FortiMail 100,100C
FortiManager VM
FortiAuthenticator VM
FortiToken
FortiAP 220B/221B, 11C
I have this same question. The way I've done it previously was creating a ViP for each server...seems like a lot of work.
There is no way to have four unique servers behind a single IP and port unless they are load balanced either in the firewall on in the server software. That being said, yes four different VIPs are required with the same IP and different ports or four different IPs with the same port (or any combination thereof).
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
BUT....
you should pack all VIPs into a VIP group (aha!) and use that as the destination address in just one policy. As all these VIPs demand the same handling (more or less) it simplifies the policy table a lot when you use VIP groups.
ede_pfau wrote:Touche. Agreed.BUT....
you should pack all VIPs into a VIP group (aha!) and use that as the destination address in just one policy. As all these VIPs demand the same handling (more or less) it simplifies the policy table a lot when you use VIP groups.
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1742 | |
1114 | |
760 | |
447 | |
241 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.