FortiOS 5.2 Getting Started: Port pairing in Transparent mode

Source: Internet
Author: User
Keywords Port Pairing wan1
Tags forticloud fortios fortigate getting started fortigate transparent mode fortinet security advisory

When you create a port pair, all traffic accepted by one of the paired interfaces can only exit out the other interface. Restricting traffic in this way simplifies your FortiGate configuration because security policies between these interfaces are pre-configured.

In this example you will create a wan1 to Internal port pair to make it easier to allow access to a web server protected by a FortiGate in Transparent mode. In this unusual configuration, the web server is connected to the FortiGate’s wan1 interface and the FortiGate’s Internal interface is connected to an internal network. Users on the internal network access the web server through the FortiGate.

Traffic between port-paired interfaces does not check the bridge table and MAC addresses are not learned. Instead traffic received by one interface in a port pair is forwarded out the other (if allowed by a firewall policy). This makes port pairing useful for unusual topologies where MAC addresses do not behave normally. For example, port paring can be used in a Direct Server Return (DSR) topology where the response MAC address pair may not match the request’s MAC address pair.

1. Switching the FortiGate unit to transparent mode and adding a static route

Go to System > Dashboard > Status.

In the System Information widget, select Change beside Operation Mode.

Change the Operation Mode to Transparent. Add a Management IP/Netmask. Also add a Default Gateway for your network so that the FortiGate unit can connect to the Internet.

2. Creating an internal and wan1 port pair

Go to System > Network > Interfaces.

Select Create New > Port Pair. Create a port pair that includes the internal and wan1 interfaces.

All traffic accepted by the internal interface can only exit out of the wan1 interface.

3. Creating security policies

Go to Policy & Objects > Policy > IPv4.

Create a security policy that allows internal users to access the protected web server using HTTP and HTTPS.

Create a second security policy that allows connections from the web server to the internal network and to the Internet using any service. 

4. Results

Connect to the web server from the internal network and surf the Internet from the server itself.

Go to Log & Report > Traffic Log > Forward Traffic to verify that there is traffic from the internal to wan1 interface.

Select an entry for details.

Go to Policy & Objects > Monitor > Policy Monitor to view the active sessions.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.