Purpose
Scope
All FortiGate running in NAT and VDOM mode
Diagram
B* 0.0.0.0/0 [20/0] via 10.1.1.101, wan1, 00:25:03 C 10.1.1.0/24 is directly connected, wan1 C 10.2.2.0/24 is directly connected, wan2 C 10.160.0.0/23 is directly connected, internal C 172.16.1.0/24 is directly connected, dmz |
1.612126 dmz in 172.16.1.254 -> 172.16.2.254: icmp: echo request 1.612170 wan1 out 172.16.1.254 -> 172.16.2.254: icmp: echo request 1.615987 wan2 in 172.16.2.254 -> 172.16.1.254: icmp: echo reply 2.616253 dmz in 172.16.1.254 -> 172.16.2.254: icmp: echo request 2.616317 wan1 out 172.16.1.254 -> 172.16.2.254: icmp: echo request 2.616987 wan2 in 172.16.2.254 -> 172.16.1.254: icmp: echo reply |
Expectations, Requirements
Configuration
config system interface
edit "wan1" set vdom "root" set ip 10.1.1.100 255.255.255.0 set allowaccess ping https ssh http telnet set type physical next edit "wan2" set vdom "root" set ip 10.2.2.200 255.255.255.0 set allowaccess ping set type physical next edit "dmz" set vdom "VDOM_Users" set ip 172.16.1.1 255.255.255.0 set allowaccess ping https ssh http telnet set type physical next edit "internal" set vdom "VDOM_Users" set ip 10.160.1.26 255.255.254.0 set allowaccess ping https ssh snmp http telnet set type physical set alias "Management" next edit "VDOM_link0" set vdom "root" set type vdom-link next edit "VDOM_link1" set vdom "VDOM_Users" set type vdom-link next end |
config system settings
set asymroute enable end config router static
edit 1 set device "VDOM_link0" set dst 172.16.1.0 255.255.255.0 set weight 50 next end config firewall policy edit 1 set srcintf "VDOM_link0" set dstintf "wan1" set srcaddr "all" set dstaddr "all" set action accept set schedule "always" set service "ANY" next edit 2 set srcintf "VDOM_link0" set dstintf "wan2" set srcaddr "all" set dstaddr "all" set action accept set schedule "always" set service "ANY" next end |
config router static edit 1 set device "VDOM_link1" set weight 50 next end config firewall policy edit 1 set srcintf "dmz" set dstintf "VDOM_link1" set srcaddr "all" set dstaddr "all" set action accept set schedule "always" set service "ANY" next end |
Verification
B* 0.0.0.0/0 [20/0] via 10.1.1.101, wan1, 00:03:27 C 10.1.1.0/24 is directly connected, wan1 C 10.2.2.0/24 is directly connected, wan2 S 172.16.1.0/24 [10/0] is directly connected, VDOM_link0, [0/50] |
0.641377 dmz in 172.16.1.254 -> 172.16.2.254: icmp: echo request 0.641377 VDOM_link0 in 172.16.1.254 -> 172.16.2.254: icmp: echo request 0.641493 wan1 out 172.16.1.254 -> 172.16.2.254: icmp: echo request 0.642139 wan2 in 172.16.2.254 -> 172.16.1.254: icmp: echo reply 0.642139 VDOM_link1 in 172.16.2.254 -> 172.16.1.254: icmp: echo reply 0.642203 dmz out 172.16.2.254 -> 172.16.1.254: icmp: echo reply |
Related Articles
Technical Note: Details about FortiOS RPF (Reverse Path Forwarding), also called Anti-Spoofing