so the ftp server has one nic connected to the DMZ and one connected to the internal network? if so, this is very wrong.
YOU SHOULD NOT HAVE THIS !! the whole idea of placing web-facing servers in the DMZ is so that if they get hacked, they then cannot use that server to attack internal machines, and thus internal data.
The FTP server should only be connected to the DMZ, and the fortinet does the routing for any internal hosts wanting to access the FTP server, via the fortinet.
ie;
Internal Lan
|
|
Fortinet ------------ DMZ (FTP/Web servers etc)
|
|
Internet via ISP
if a server is placed between the DMZ AND the Lan, it is absolutley pointless it being in the DMZ in the first place, as if it got hacked, they would still have access to the internal network. so either move it within the lan (not recommended though) or only have it connected to the DMZ.
UK Based Technical Consultant
FCSE v2.5
FCSE v2.8
FCNSP v3
Specialising in Systems, Apps, SAN Storage and Networks, with over 25 Yrs IT experience.