)
I was wondering though what the best ordering is for the firewall rules.
obviously outgoing NAT rules go above more general rules.
But e.g. should one group all incoming rules going to VIP-address before internal rules going to the nonnatted addresses, or is a grouping by, say, server more appropriate.
something like:
all -> vip-server_one
all -> vip-server_two
all -> vip-server_three
all -> server_one
all -> server_two
all -> server_three
or:
all -> vip-server_one
all -> server_one
all -> vip-server_two
all -> server_two
all -> vip-server_three
all -> server_three
ABB@ProBiblio Fortigate 200D (slave master)
) as I don' t want to set up rules concerning traffic to a server for every interface seperately (I won' t bother you all with the specifics of my infrastructure)
Part has also to do with a split brain DNS problem I have.
Some of our clients connect via an IPSec tunnel and use a DNS server on the inside of our network (to resolve probiblio.nl to internal IP addresses)
Occasionaly the tunnel drops its connection. DNS cache at the client side gets contaminated with an external IP address. After the tunnel is up again the servers no longer can be reached. The external IP address gets NATted and replies are routed back internaly.
Accessing the VIP-addres from the inside interface seems to solve that problem (at least in my lab)
But, it is a learning process.
My major objective now is to do a one in one replacement of the Checkpoint without disrupting the rest of the infrastructure.
In the future we may be able to make adjustments to clear things up.
ABB@ProBiblio Fortigate 200D (slave master)
NSE4/FMG-VM64/FortiAnalyzer-VM/6.0 (FWF30E/FW92D/FGT200D/FGT101E/FGT81E)/ FAP220B/221C
Fortigate however changes the NAT rule into a security rule, leving the server fully exposed to the internet
ABB@ProBiblio Fortigate 200D (slave master)
| User | Count |
|---|---|
| 2712 | |
| 1416 | |
| 810 | |
| 733 | |
| 455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.