Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
PCNSE
NSE
StrongSwan
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
 
 config system interface
     edit " internal" 
         set vdom " root" 
         set ip 192.168.1.1 255.255.255.0
         set allowaccess ping https ssh snmp telnet
         set type physical
         set description " Inside (gateway) interface" 
     next
     edit " wan1" 
         set vdom " root" 
         set ip 10.10.10.1 255.255.255.0
         set allowaccess ping https
         set type physical
         set description " Outside (Internet) interface" 
         set alias " ISP1" 
     next
     edit " wan2" 
         set vdom " root" 
         set ip 10.10.20.1 255.255.255.0
         set allowaccess ping https
         set type physical
         set description " Outside (Internet) interface" 
         set alias " ISP2" 
     next
 end
 
  Putting WAN1 and WAN2 into the ' Internet'  zone, policies would be written ' internal -> Internet' . 
 config system zone
     edit " Internet
             set interface " wan1"  " wan2" 
     next
 end
 
 Routing would still need static routes to both ISP' s (with weights and/or fail over configured). The VIP definitions would be:
 config firewall vip
     edit " vIP.wan1 HTTP" 
         set extip 10.10.10.2
         set extintf " wan1" 
         set portforward enable
         set mappedip 192.168.1.2
         set extport 80
         set mappedport 80
     next
     edit " vIP.wan2 HTTP" 
         set extip 10.10.20.2
         set extintf " wan2" 
         set portforward enable
         set mappedip 192.168.1.2
         set extport 80
         set mappedport 80
     next
 endNotice, nowhere do you see any reference to the zone. Zones are only for configuring policies. The inward policies for the web server would be:
 config firewall policy
     edit 1
         set srcintf " Internet" 
         set dstintf " internal" 
             set srcaddr " all"              
             set dstaddr " vIP.wan1 HTTP"              
         set action accept
         set comments " Web server traffic" 
         set schedule " always" 
             set service " HTTP"              
     next
     edit 2
         set srcintf " Internet" 
         set dstintf " internal" 
             set srcaddr " all"              
             set dstaddr " vIP.wan2 HTTP"              
         set action accept
         set comments " Web server traffic" 
         set schedule " always" 
             set service " HTTP"              
     next
 end
					
				
			
			
				Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
PCNSE
NSE
StrongSwan
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
 
					
				
				
			
		
| User | Count | 
|---|---|
| 2707 | |
| 1416 | |
| 810 | |
| 716 | |
| 455 | 
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.