Hi folks,
We're using the WAN1 interface on our FortiGate only, with IP 72.x.x.1. The internal subnets 10.x.x.x all go through this interface and IP.
However, I've set up a new subnet on interface Dorm1, 192.168.1.x, and I want it to utilize a different WAN IP, 72.x.x.6 (which is in the same subnet as the primary WAN1 IP with the same ISP gateway). How can I accomplish this? I've read about creating VIPs, which we do use to map one external IP to one internal IP, but I'm not sure how to handle an entire subnet, AND ensuring that the outgoing traffic is through the other WAN IP as well.
Thanks for any ideas,
- Eric
Solved! Go to Solution.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Hi,
for outward traffic you would substitute the source address, not the destination address like in a VIP. Source NAT is done via "IP pool" (Firewall > Objects > IP pools). You can define an IP pool with just a single address (a.b.c.d/32) or a whole subnet.
In the LAN to WAN policy, check "NAT" and "specify address" and select the IP pool.
Check with a visit to whatsmyip.org or the like.
You are planning to NAT 2.046 addresses, or is there a typo in your address ranges?
If the mapped-to address is just one, each translation has to be mapped to a different port. There are 64K - 1K ports for this but...this number might be limited by the hardware/FortiOS combination. Have a look at the "Maximum Features matrix" available on docs.fortinet.com .
Hi,
for outward traffic you would substitute the source address, not the destination address like in a VIP. Source NAT is done via "IP pool" (Firewall > Objects > IP pools). You can define an IP pool with just a single address (a.b.c.d/32) or a whole subnet.
In the LAN to WAN policy, check "NAT" and "specify address" and select the IP pool.
Check with a visit to whatsmyip.org or the like.
Perfect, that worked! Thanks for the info. :)
One more question. I went to do the same for a different VLAN on the Inside interface. External IP is 72.x.x.13-72.x.x.13 and the internal IP range is 10.13.0.1-10.13.7.254. However, it says the number of ports for each IP is too small. It works if I shrink the internal range to 10.13.6.254. Thoughts?
You are planning to NAT 2.046 addresses, or is there a typo in your address ranges?
If the mapped-to address is just one, each translation has to be mapped to a different port. There are 64K - 1K ports for this but...this number might be limited by the hardware/FortiOS combination. Have a look at the "Maximum Features matrix" available on docs.fortinet.com .
You may be able to make 8 policies, each with a single class C subnet using the same IP pool. Not sure if it would choke something though...
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
Correct, we're leasing 2,048(-ish) addresses. 10.13.0.5-10.13.7.254. It's our public VLAN that we allow students and guests of the school to use their personal devices on.
Upon further testing, the absolute biggest range that I can use is 10.13.0.1-10.13.7.96. Same error with 97 and up. However, if I allow the pool to use two WAN IPs, it's fine. To me, having the pool stop at 96 is acceptable. We've only leased 1,300 IPs so I'll just change the DHCP scope. We're down to our last WAN IP anyway.
Here are the maximum values for 5.0.8, can't find 5.0.12 like we're using.
Hello Guyz,
Can you please help me with this post: https://forum.fortinet.com/FindPost/158019 Regards,
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1710 | |
1093 | |
752 | |
447 | |
231 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.