Add interface for NAT46 and NAT64 to simplify policy and routing configurations
This update simplifies the policy and routing of NAT46 and NAT64 policies by adding the NAT tunnel interface and options in firewall vip
/vip6
and firewall policy
settings. The policy46
and policy64
settings have been merged into policy
, and vip46
and vip64
into vip
and vip6
. Most firewall policy options can now be used in policies with NAT46 and NAT64 options enabled.
Upgrading
When upgrading from FortiOS 6.4.x or 7.0.0 to 7.0.1 and later, the old configurations for vip46
, vip64
, policy46
, policy64
, nat64
, and gui-nat46-64
will be removed. All objects in them will be removed.
The following CLI commands have been removed:
config firewall vip46
config firewall vip64
config firewall policy46
config firewall policy64
config system nat64
-
set gui-nat46-64 {enable | disable}
(underconfig system settings
)
The following GUI pages have been removed:
-
Policy & Objects > NAT46 Policy
-
Policy & Objects > NAT64 Policy
-
NAT46 and NAT64 VIP category options on Policy & Objects > Virtual IPs related pages
During the upgrade process after the FortiGate reboots, the following message is displayed: The config file may contain errors, Please see details by the command 'diagnose debug config-error-log read' The following output is displayed after running the diagnose command: # diagnose debug config-error-log read >>> "config" "firewall" "policy64" @ root:command parse error (error -61) >>> "config" "firewall" "policy46" @ root:command parse error (error -61) |
Creating new policies
After upgrading FortiOS 6.4.x or 7.0.0 to 7.0.1 and later, you will need to manually create new vip46
and vip64
policies.
-
Create a
vip46
fromconfig firewall vip
and enable thenat46
option. -
Create a
vip64
fromconfig firewall vip6
and enable thenat64
option. -
Create or modify
ippool
andippool6
, and enable thenat64
ornat46
option. -
Create a policy and enable the
nat46
option, apply thevip46
andippool6
in a policy. -
Create a policy and enable the
nat64
option, apply thevip64
andippool
in policy. -
Ensure the routing on the client and server matches the new
vip
/vip6
andippool
/ippool6
.
Example configurations
vip46
object:
Old configuration |
New configuration |
---|---|
config firewall vip46 edit "test-vip46-1" set extip 10.1.100.155 set mappedip 2000:172:16:200::55 next end |
config firewall vip edit "test-vip46-1" set extip 10.1.100.150 set nat44 disable set nat46 enable set extintf "port24" set ipv6-mappedip 2000:172:16:200::55 next end |
ippool6
object:
Old configuration |
New configuration |
---|---|
config firewall ippool6 edit "test-ippool6-1" set startip 2000:172:16:201::155 set endip 2000:172:16:201::155 next end |
config firewall ippool6 edit "test-ippool6-1" set startip 2000:172:16:201::155 set endip 2000:172:16:201::155 set nat46 enable next end |
NAT46 policy:
Old configuration |
New configuration |
---|---|
config firewall policy46 edit 1 set srcintf "port24" set dstintf "port17" set srcaddr "all" set dstaddr "test-vip46-1" set action accept set schedule "always" set service "ALL" set logtraffic enable set ippool enable set poolname "test-ippool6-1" next end |
config firewall policy edit 2 set srcintf "port24" set dstintf "port17" set action accept set nat46 enable set srcaddr "all" set dstaddr "test-vip46-1" set srcaddr6 "all" set dstaddr6 "all" set schedule "always" set service "ALL" set logtraffic all set ippool enable set poolname6 "test-ippool6-1" next end |
vip64
object
Old configuration |
New configuration |
---|---|
config firewall vip64 edit "test-vip64-1" set extip 2000:10:1:100::155 set mappedip 172.16.200.155 next end |
config firewall vip6 edit "test-vip64-1" set extip 2000:10:1:100::155 set nat66 disable set nat64 enable set ipv4-mappedip 172.16.200.155 next end |
ippool
object
Old configuration |
New configuration |
---|---|
config firewall ippool edit "test-ippool4-1" set startip 172.16.201.155 set endip 172.16.201.155 next end |
config firewall ippool edit "test-ippool4-1" set startip 172.16.201.155 set endip 172.16.201.155 set nat64 enable next end |
NAT64 policy:
Old configuration |
New configuration |
---|---|
config firewall policy64 edit 1 set srcintf "wan2" set dstintf "wan1" set srcaddr "all" set dstaddr "test-vip64-1" set action accept set schedule "always" set service "ALL" set ippool enable set poolname "test-ippool4-1" next end |
config firewall policy edit 1 set srcintf "port24" set dstintf "port17" set action accept set nat64 enable set srcaddr "all" set dstaddr "all" set srcaddr6 "all" set dstaddr6 "test-vip64-1" set schedule "always" set service "ALL" set logtraffic all set ippool enable set poolname "test-ippool4-1" next end |