Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Create an IP Pool with the virtual public IP. On your outbound policy that handles the SMTP traffic, set the NAT to use the IP Pool.I have never had to do this before so can you elaborate on why I would do this. My other mail server behind the same Fortigate is working fine such that the outbound emails have the correct public IP of the sending domain (VIP) and not the fortigate. Also, I have only one outbound policy for all services. Perhaps I need to create service specific outbound policies but this may be outside the scope of my current issue.
To your second question. You mentioned that you " translate internal, non routable IP' s to public IPs." that' s already the answer: When you do not NAT on your outbound policies, your non routable internal IP' s are set as Source Address. The packets from the target will not find it' s way back to you.So if understand what you are saying here...I have to have the NAT checked on my outbound policy. Correct? Thanks again. Your assistance is very much appreciated.
I have never had to do this before so can you elaborate on why I would do this.exactly following Maik´s advice. Within VirtualIP menu, you´ll find IP pool menu; create a new one with just one IP in this range (IP public you want visible for your mailserver), interface, the outbund one. Now, your outbound firewall policies will have an extra dropbox to choose your ip pool.
My other mail server behind the same Fortigate is working fine such that the outbound emails have the correct public IP of the sending domain (VIP) and not the fortigate.this can only happen when your external public address matches mailserver public IP. (and VIP external IP logically)
Also, I have only one outbound policy for all services. Perhaps I need to create service specific outbound policies but this may be outside the scope of my current issue.exactly. Define a new outbound policy just for outgoing email, use it your IP pool as Maik pointed, and put the policy above other with same src/destination and that´s all. regards
regards
/ Abel
I guess since the Fortigate did not recognize the email servers internal IP (that was changed in VIP change), it had to use its own. We had looked at that multiple times so I guess it was a case of just being too close.not exactly; from administration guide: Enable or disable Network Address Translation (NAT) of the source address and port of packets accepted by the policy. When NAT is enabled, you can also configure Dynamic IP Pool and Fixed Port. If this option is not selected, but a virtual IP is selected as the Destination Address, the FortiGate unit performs destination NAT (DNAT) rather than full NAT. Source NAT (SNAT) is not performed. regards
regards
/ Abel
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1633 | |
1063 | |
751 | |
443 | |
210 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.