Solved! Go to Solution.
Basically it changes the source address that the traffic comes from. When traversing the Internet, you need to use this so the traffic appears to come from the public IP address as opposed to the inside address. You could also choose another address if you define it in the IP Pool section. With NAT turned off, the native address is used for the originating traffic to the end point.
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
Enable slource or destination nat depending on if you nave nat pool and|or a vip in the name firewall policy or just plain egress nat if your doing snat. Alternative a centralize nat table can be used similar to other fw vendors like checkpoint, forcepoint, ciscoASA, juniperSRX, etc........
Ken Felix
PCNSE
NSE
StrongSwan
Basically it changes the source address that the traffic comes from. When traversing the Internet, you need to use this so the traffic appears to come from the public IP address as opposed to the inside address. You could also choose another address if you define it in the IP Pool section. With NAT turned off, the native address is used for the originating traffic to the end point.
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
Enable slource or destination nat depending on if you nave nat pool and|or a vip in the name firewall policy or just plain egress nat if your doing snat. Alternative a centralize nat table can be used similar to other fw vendors like checkpoint, forcepoint, ciscoASA, juniperSRX, etc........
Ken Felix
PCNSE
NSE
StrongSwan
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1735 | |
1107 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.