Fortinet black logo

Cookbook

Virtual IPs with port forwarding

Virtual IPs with port forwarding

If you need to hide the internal server port number or need to map several internal servers to the same public IP address, enable port-forwarding for Virtual IP.

This recipe shows how to use virtual IPs to configure port forwarding on a FortiGate unit. This example has one public external IP address. We map TCP ports 8080, 8081, and 8082 to different internal WebServers' TCP port 80. This allows remote connections to communicate with a server behind the firewall.

Sample configuration

To create a virtual IP with port forwarding using the GUI:
  1. In Policy & Objects > Virtual IPs.
  2. Click Create New and select Virtual IP.
  3. For VIP Type, select IPv4.
  4. Enter a unique name for the virtual IP and fill in the other fields.
  5. Configure the fields in the Network section. For example:
    • Set Interface to any.
    • Set External IP Address/Range to 10.1.100.199.
    • Set Mapped IP Address/Range to 172.16.200.55.
  6. Leave Optional Filters disabled.
  7. Enable Port Forwarding.
  8. Configure the fields in the Port Forwarding section. For example:
    • Set Protocol to TCP.
    • Set External Service Port to 8080 - 8080.
    • Set Map to Port to 80 - 80.

  9. Click OK.
  10. Follow the above steps to create two additional virtual IPs.
    1. For one virtual IP:
      • Use a different Mapped IP Address/Range, for example, 172.16.200.56.
      • Set External Service Port to 8081 - 8081.
      • Use the same Map to Port numbers: 80 - 80.
    2. For the other virtual IP:
      • Use a different Mapped IP Address/Range, for example, 172.16.200.57.
      • Set External Service Port to 8082 - 8082.
      • Use the same Map to Port numbers: 80 - 80.
  11. Create a Virtual IP Group and put the above three virtual IPs into that group.

To see the results:
  1. Apply the above virtual IP to the Firewall policy.
  2. The results are:
    • Access 10.1.100.199:8080 from external network and FortiGate maps to 172.16.200.55:80 in internal network.
    • Access 10.1.100.199:8081 from external network and FortiGate maps to 172.16.200.56:80 in internal network.
    • Access 10.1.100.199:8082 from external network and FortiGate maps to 172.16.200.57:80 in internal network

Virtual IPs with port forwarding

Virtual IPs with port forwarding

If you need to hide the internal server port number or need to map several internal servers to the same public IP address, enable port-forwarding for Virtual IP.

This recipe shows how to use virtual IPs to configure port forwarding on a FortiGate unit. This example has one public external IP address. We map TCP ports 8080, 8081, and 8082 to different internal WebServers' TCP port 80. This allows remote connections to communicate with a server behind the firewall.

Sample configuration

To create a virtual IP with port forwarding using the GUI:
  1. In Policy & Objects > Virtual IPs.
  2. Click Create New and select Virtual IP.
  3. For VIP Type, select IPv4.
  4. Enter a unique name for the virtual IP and fill in the other fields.
  5. Configure the fields in the Network section. For example:
    • Set Interface to any.
    • Set External IP Address/Range to 10.1.100.199.
    • Set Mapped IP Address/Range to 172.16.200.55.
  6. Leave Optional Filters disabled.
  7. Enable Port Forwarding.
  8. Configure the fields in the Port Forwarding section. For example:
    • Set Protocol to TCP.
    • Set External Service Port to 8080 - 8080.
    • Set Map to Port to 80 - 80.

  9. Click OK.
  10. Follow the above steps to create two additional virtual IPs.
    1. For one virtual IP:
      • Use a different Mapped IP Address/Range, for example, 172.16.200.56.
      • Set External Service Port to 8081 - 8081.
      • Use the same Map to Port numbers: 80 - 80.
    2. For the other virtual IP:
      • Use a different Mapped IP Address/Range, for example, 172.16.200.57.
      • Set External Service Port to 8082 - 8082.
      • Use the same Map to Port numbers: 80 - 80.
  11. Create a Virtual IP Group and put the above three virtual IPs into that group.

To see the results:
  1. Apply the above virtual IP to the Firewall policy.
  2. The results are:
    • Access 10.1.100.199:8080 from external network and FortiGate maps to 172.16.200.55:80 in internal network.
    • Access 10.1.100.199:8081 from external network and FortiGate maps to 172.16.200.56:80 in internal network.
    • Access 10.1.100.199:8082 from external network and FortiGate maps to 172.16.200.57:80 in internal network