Fortinet black logo

AliCloud Administration Guide

Enabling NAT inbound protection in FortiOS

Copy Link
Copy Doc ID e21fd366-a70f-11ec-9fd1-fa163e15d75b:507150
Download PDF

Enabling NAT inbound protection in FortiOS

In this example, you enable the FortiGate-VM to protect inbound RDP traffic. The same concept can be applied to HTTP/HTTPS and other services. This demonstrates how to configure the FortiGate-VM to monitor inbound and outbound traffic.

To enable NAT inbound protection in FortiOS:
  1. Create the virtual IP address:
    1. In FortiOS, go to Policy & Objects > Virtual IPs.
    2. Click Create New.
    3. From the Interface dropdown list, select port1.
    4. In the Mapped IP address/range field, enter 192.168.1.36, the ECS IP address.
    5. Enable Port Forwarding.
    6. In the External service port and Map to port fields, enter 3389.
    7. Click OK.
  2. Configure the inbound policy for the RDP redirection. Go to Policy & Objects > Firewall Policy, then click Create New.
  3. In the Destination field, select the virtual IP address that you created in step 1.
  4. Enable the desired security profiles, then log all sessions for demonstration purposes.
  5. Click OK.

    You can now use the FortiGate public address to RDP into the ECS.

    You can also view the logs and session information in FortiOS.

Enabling NAT inbound protection in FortiOS

In this example, you enable the FortiGate-VM to protect inbound RDP traffic. The same concept can be applied to HTTP/HTTPS and other services. This demonstrates how to configure the FortiGate-VM to monitor inbound and outbound traffic.

To enable NAT inbound protection in FortiOS:
  1. Create the virtual IP address:
    1. In FortiOS, go to Policy & Objects > Virtual IPs.
    2. Click Create New.
    3. From the Interface dropdown list, select port1.
    4. In the Mapped IP address/range field, enter 192.168.1.36, the ECS IP address.
    5. Enable Port Forwarding.
    6. In the External service port and Map to port fields, enter 3389.
    7. Click OK.
  2. Configure the inbound policy for the RDP redirection. Go to Policy & Objects > Firewall Policy, then click Create New.
  3. In the Destination field, select the virtual IP address that you created in step 1.
  4. Enable the desired security profiles, then log all sessions for demonstration purposes.
  5. Click OK.

    You can now use the FortiGate public address to RDP into the ECS.

    You can also view the logs and session information in FortiOS.