Hello All,
I just bought and put a Fortigate 60e in place with the most current firmware (6.2.2, build 1010GA). I am getting stuck trying to get a port forward solution working for external access to a plex server inside the Fortigate which is only leading me to banging my head against the desk. While I have been doing plenty of google searching and looking at the Fortinet cookbooks online which are great resources. I am wondering if anyone is willing to assist with breaking it down in layman's terms on how to set up the port forwarding.
Thank you for any and all assistance!
-Dan
Sure,
welcome to the forums.
Say you want to forward traffic to public WAN address 1.1.1.1 to your internal server at 192.168.14.1. So this is a destination NAT.
The object you need to create is called "Virtual address" or VIP in FortiOS.
Policy & Object > Virtual Address
create new, then enter
external address: 1.1.1.1
mapped-to address: 192.168.14.1
no port forwarding (at this moment)
To bring a VIP into effect, you use it in an inbound policy:
new policy,
source interface: wan
dest interface: internalX
source address: all (you don't know in advance)
dest address: <your new VIP> !!
service: whatever applies
schedule: always
NAT: nope
and then test it.
Regarding port forwarding:
sometimes, esp. when you plan to allow several services into your LAN/DMZ, you make the VIP a port-forwarding VIP. The port specified should match the (custom) service you specify in the policy.
One caveat: you cannot test a port-forwarding VIP with ping. As ping is neither TCP nor UDP, and doesn't use ports.
The trivial VIP shown above can of course be tested by pinging your WAN address.
And while you do that, you notice why you might need port forwarding. SSL-VPN or IPsec VPN towards your FGT will send traffic to your WAN address as well - which will be forwarded completely to your internal server if you don't port-forward.
I wonder if VIPs (and the other form of NAT, source NAT) is not dealt with in the FortiOS Handbook. You need to have it around until you get the hang to it.
Feel free to post more questions if the need arises.
What I'd recommend is:
[ol]Correct me if I'm wrong but I remember reading somewhere that by filtering out unneeded packets at the VIP level (or IPv4 Access Control List) rather than relying solely on the IPv4 Policy's service filter that the switch controller's packet filter is saving the FortiGate from wasting unnecessary CPU cycles filtering it out during policy inspection.
Russ
We were able to get it working as needed with both of your help on this! Thank you again!!
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1735 | |
1107 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.