Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
PCNSE
NSE
StrongSwan
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
config system interface edit " internal" set vdom " root" set ip 192.168.1.1 255.255.255.0 set allowaccess ping https ssh snmp telnet set type physical set description " Inside (gateway) interface" next edit " wan1" set vdom " root" set ip 10.10.10.1 255.255.255.0 set allowaccess ping https set type physical set description " Outside (Internet) interface" set alias " ISP1" next edit " wan2" set vdom " root" set ip 10.10.20.1 255.255.255.0 set allowaccess ping https set type physical set description " Outside (Internet) interface" set alias " ISP2" next endPutting WAN1 and WAN2 into the ' Internet' zone, policies would be written ' internal -> Internet' .
config system zone edit " Internet set interface " wan1" " wan2" next endRouting would still need static routes to both ISP' s (with weights and/or fail over configured). The VIP definitions would be:
config firewall vip edit " vIP.wan1 HTTP" set extip 10.10.10.2 set extintf " wan1" set portforward enable set mappedip 192.168.1.2 set extport 80 set mappedport 80 next edit " vIP.wan2 HTTP" set extip 10.10.20.2 set extintf " wan2" set portforward enable set mappedip 192.168.1.2 set extport 80 set mappedport 80 next endNotice, nowhere do you see any reference to the zone. Zones are only for configuring policies. The inward policies for the web server would be:
config firewall policy edit 1 set srcintf " Internet" set dstintf " internal" set srcaddr " all" set dstaddr " vIP.wan1 HTTP" set action accept set comments " Web server traffic" set schedule " always" set service " HTTP" next edit 2 set srcintf " Internet" set dstintf " internal" set srcaddr " all" set dstaddr " vIP.wan2 HTTP" set action accept set comments " Web server traffic" set schedule " always" set service " HTTP" next end
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
PCNSE
NSE
StrongSwan
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1712 | |
1093 | |
752 | |
447 | |
231 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.