Planning the FortiWiFi configuration | Configuring the FortiWiFi |
You typically use NAT/Route mode when the FortiWiFi unit is operating as a gateway between private and public networks. In this configuration, you would create NAT mode firewall policies to control traffic flowing between the internal, private network and the external, public network (usually the Internet).
Note: If you have multiple internal networks, such as a DMZ network in addition to the internal, private network, you could create route mode firewall policies for traffic flowing between them.
Figure 4: Example NAT/Route mode network configuration.
|
| Internal Network | |
|
| 192.168.1.3 | |
|
| Internal | |
|
| 192.168.1.99 | |
|
| Routing policies controlling | |
|
| traffic between internal | |
|
| networks. | |
| WAN1 | Internal | |
| network | ||
| 204.23.1.5 | ||
|
| ||
Internet |
| DMZ | |
Router | |||
10.10.10.1 | |||
| |||
| in NAT mode |
| |
|
| 10.10.10.2 |
NAT mode policies controlling traffic between internal and external networks.
NAT/Route mode with multiple external network connections
In NAT/Route mode, you can configure the FortiWiFi unit with multiple redundant connections to the Internet.
For example, you could create the following configuration:
•WAN1 is the default interface to the external network (usually the Internet)
•WAN2 is the redundant interface to the external network
•DMZ is interface to the DMZ network
•Internal is the interface to the internal network
You must configure routing to support redundant Internet connections. Routing can automatically redirect connections from an interface if its connection to the external network fails.
Otherwise, security policy configuration is similar to a NAT/Route mode configuration with a single Internet connection. You would create NAT mode firewall policies to control traffic flowing between the internal, private network and the external, public network (usually the Internet).
30 | |