{"id":1905,"date":"2013-07-11T14:20:09","date_gmt":"2013-07-11T07:20:09","guid":{"rendered":"http:\/\/www.jaringankita.com\/blog\/?p=1905"},"modified":"2014-01-07T14:48:43","modified_gmt":"2014-01-07T07:48:43","slug":"fortigate-static-nat-configuration","status":"publish","type":"post","link":"https:\/\/www.jaringankita.com\/blog\/fortigate-static-nat-configuration","title":{"rendered":"Fortigate Static NAT Configuration"},"content":{"rendered":"<p style=\"text-align: left;\"><strong>Fortigate Static NAT Configuration<\/strong><\/p>\n<p style=\"text-align: left;\">\n<p style=\"text-align: left;\">We will give an example on how to configure static NAT in Fortigate. In this example, we use the <strong>WAN 1 Interface<\/strong> of the FortiGate unit is connected to the Internet and\u00a0the <strong>Internal interface<\/strong> is connected to the DMZ network. We need to access one of the DMZ servers which is 10.0.10.100 from the Internet for any services.\u00a0(Please note that this example is using\u00a0<strong>\u00a0v4.0,build0535,120511 (MR3 Patch 7)\u00a0<\/strong>).<!--more--><\/p>\n<p style=\"text-align: left;\">Let say the Internet IP address blocks that we get from the Internet Service Provider are <strong>200.200.100.0\/24\u00a0<\/strong>and we want to NAT the IP Address <strong>200.200.100.100<\/strong> into our web server IP Address <strong>10.0.10.100.\u00a0<\/strong><\/p>\n<div id=\"attachment_1906\" style=\"width: 550px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.jaringankita.com\/blog\/wp-content\/uploads\/2013\/07\/jaringankita_fortigate.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-1906\" class=\"size-full wp-image-1906\" alt=\"jaringankita_fortigate\" src=\"https:\/\/www.jaringankita.com\/blog\/wp-content\/uploads\/2013\/07\/jaringankita_fortigate.png\" width=\"540\" height=\"305\" srcset=\"https:\/\/www.jaringankita.com\/blog\/wp-content\/uploads\/2013\/07\/jaringankita_fortigate.png 540w, https:\/\/www.jaringankita.com\/blog\/wp-content\/uploads\/2013\/07\/jaringankita_fortigate-300x169.png 300w\" sizes=\"auto, (max-width: 540px) 100vw, 540px\" \/><\/a><p id=\"caption-attachment-1906\" class=\"wp-caption-text\">Example Topology<\/p><\/div>\n<p><!--NoAds--><\/p>\n<p style=\"text-align: justify;\">Before we can access the NAT IP Address, we have to create a Virtual IP using the following steps:<\/p>\n<ol>\n<li>Go to <strong>Firewall Objects &gt; Virtual IP &gt; Virtual IP.<\/strong><\/li>\n<li>Select <strong>Create New<\/strong>.<\/li>\n<li>Complete the following and select <strong>OK<\/strong>.<\/li>\n<\/ol>\n<ul>\n<ul>\n<li>Name : <strong>Web_Server_NAT (can be filled with any names)<\/strong><\/li>\n<li>External Interface \u00a0: <strong>wan1<\/strong><\/li>\n<li>Type \u00a0: <strong>Static NAT<\/strong><\/li>\n<li>External IP Address\/Range: <strong>200.200.100.100<\/strong><\/li>\n<li>Mapped IP Address\/Range: <strong>10.0.10.100<\/strong><\/li>\n<li>No Port Forwarding Selected<\/li>\n<\/ul>\n<\/ul>\n<p style=\"text-align: justify;\">After finishing create the Virtual IP then Create the Policy using the following steps:<\/p>\n<ol>\n<li>Go to <strong>Policy&gt; Policy &gt; Policy \u00a0and select \u00a0Create New<\/strong><\/li>\n<li>Complete the following and select <strong>OK<\/strong>.<\/li>\n<li>Here is the form:<\/li>\n<\/ol>\n<ul>\n<ul>\n<li><span style=\"font-size: 13px; line-height: 19px;\">Source Interface\/Zone:\u00a0<\/span><strong style=\"font-size: 13px; line-height: 19px;\">wan1<\/strong><\/li>\n<li><span style=\"font-size: 13px; line-height: 19px;\">Source Address:\u00a0<\/span><strong style=\"font-size: 13px; line-height: 19px;\">All<\/strong><\/li>\n<li><span style=\"font-size: 13px; line-height: 19px;\">Destination\u00a0Interface\/Zone:\u00a0<\/span><strong style=\"font-size: 13px; line-height: 19px;\">Internal<\/strong><\/li>\n<li><span style=\"font-size: 13px; line-height: 19px;\">Destination Address:\u00a0<\/span><strong style=\"font-size: 13px; line-height: 19px;\">Web_Server_NAT (select from the one we have created on above steps)<\/strong><\/li>\n<li><span style=\"font-size: 13px; line-height: 19px;\">Schedule :\u00a0<\/span><strong style=\"font-size: 13px; line-height: 19px;\">always<\/strong><\/li>\n<li><span style=\"font-size: 13px; line-height: 19px;\">Service :\u00a0<\/span><strong style=\"font-size: 13px; line-height: 19px;\">ANY<\/strong><\/li>\n<li><span style=\"font-size: 13px; line-height: 19px;\">Action:\u00a0<\/span><strong style=\"font-size: 13px; line-height: 19px;\">ACCEPT<\/strong><\/li>\n<li>Select the <strong>NAT<\/strong> option<\/li>\n<li>Select <strong>OK<\/strong><\/li>\n<\/ul>\n<\/ul>\n<p>After completing all the steps above then test using ping to 200.200.100.100 from Internet and it should be success.<\/p>\n<p><em>Article\u00a0<strong>Fortigate Static NAT Configuration\u00a0<\/strong>is written by JK.<\/em><\/p>\n<p>(JK)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Fortigate Static NAT Configuration We will give an example on how to configure static NAT in Fortigate. In this example, we use the WAN 1 Interface of the FortiGate unit is connected to the Internet and\u00a0the Internal interface is connected to the DMZ network. We need to access one of the DMZ servers which is [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":1913,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[765],"tags":[836,75,124,1061],"class_list":["post-1905","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledge-base","tag-featured","tag-fortigate","tag-interface","tag-nat-static"],"_links":{"self":[{"href":"https:\/\/www.jaringankita.com\/blog\/wp-json\/wp\/v2\/posts\/1905","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.jaringankita.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.jaringankita.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.jaringankita.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jaringankita.com\/blog\/wp-json\/wp\/v2\/comments?post=1905"}],"version-history":[{"count":13,"href":"https:\/\/www.jaringankita.com\/blog\/wp-json\/wp\/v2\/posts\/1905\/revisions"}],"predecessor-version":[{"id":1968,"href":"https:\/\/www.jaringankita.com\/blog\/wp-json\/wp\/v2\/posts\/1905\/revisions\/1968"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.jaringankita.com\/blog\/wp-json\/wp\/v2\/media\/1913"}],"wp:attachment":[{"href":"https:\/\/www.jaringankita.com\/blog\/wp-json\/wp\/v2\/media?parent=1905"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.jaringankita.com\/blog\/wp-json\/wp\/v2\/categories?post=1905"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.jaringankita.com\/blog\/wp-json\/wp\/v2\/tags?post=1905"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}