Planning the FortiGate configuration | Configuring the FortiGate unit |
You typically use NAT/Route mode when the FortiGate unit is operating as a gateway between private and public networks. In this configuration, you create NAT mode firewall policies to control traffic flowing between the internal, private network and the external, public network (usually the Internet).
Figure 8: Example NAT/Route mode network configuration for a FortiGate-50A.
.
External | Internal | Internal network |
| ||
204.23.1.5 | 192.168.1.99 |
|
Internet
Router
192.168.1.3
NAT mode policies controlling traffic between internal and external networks.
NAT/Route mode with multiple external network connections
In NAT/Route mode, you can configure the FortiGate unit with multiple redundant connections to the external network (usually the Internet).
For example, you could create the following configuration:
•External or WAN1 is the default interface to the external network (usually the Internet)
•Modem is the redundant interface to the external network for the
•WAN2 is the redundant interface to the external network on the
•DMZ is the redundant interface to the external network on the
•Internal is the interface to the internal network
You must configure routing to support redundant Internet connections. Routing can automatically redirect connections from an interface if its connection to the external network fails.
Otherwise, security policy configuration is similar to a NAT/Route mode configuration with a single Internet connection. You would create NAT mode firewall policies to control traffic flowing between the internal, private network and the external, public network (usually the Internet).
Figure 9: NAT/Route multiple internet connection configuration for a FortiGate-50A
.
External | Internal | Internal network | |
204.23.1.5 | |||
192.168.1.1 |
| ||
|
| ||
Internet |
|
| |
| 192.168.1.3 | ||
MODEM |
|
NAT mode policies controlling traffic between internal and external networks.
34 | |