Fortinet black logo

Configuring IP mapping in HA mode

Configuring IP mapping in HA mode

Prerequisites:

Please follow High Availability to make sure native HA mode works before configuring IP Mapping in HA mode.

Configuring IP Mapping in HA mode includes the following steps:

  1. FortiIsolator configuration
  2. FortiGate configuration
  3. Client system configuration

Single-node setting (one-primary only)

To configure IP mapping of FortiIsolator in HA mode with one single primary node:
  1. Configure port forwarding mappings using the following commands in the FortiIsolator CLI:
    • set fis-ipmap <port_map_to_443> <external_IP_address>

      For example, set fis-ipmap 12443 172.30.147.207

    • set fis-ipmap-vip <external IP> <vip_port_map_to_443>

      For example, set fis-ipmap-vip 172.30.147.207 14443

    • set fis-ipmap-ha <priority> <external_IP_address> <internal_IP_address:primary> <port_map_to_443>

      For example, set fis-ipmap-ha 19 172.30.147.207 172.30.157.148 12443

  2. Make sure HA is Enabled in Fortilsolator.

FortiGate configuration

Complete the following steps in the FortiGate UI.

  1. Go to Policy & Objects > Virtual IPs.
  2. Create an IPv4 virtual IP with the following information:
    • IP-Mapping-HA-443: external_IP_address -> FIS_IP (TCP: 12443 > 443)

      For example, 172.30.147.207 -> 172.30.157.96 (TCP: 12443 > 443).

    Note

    In this example, we are using:

    • External_IP_address: 172.30.147.207
    • FIS HA Virtual IP: 172.30.157.96
    • FIS_IP: 172.30.157.148

    Settings of IP-Mapping-443:

    Settings of IP-Mapping-HA-443:

  3. Go to Policy & Objects > IPv4 Policy > Create New.
  4. Create an IPv4 policy that includes the virtual IP that you created.

Client system configuration

Complete the following steps on the client system (for example, Windows 10).

  1. In Windows 10, launch CMD as administrator.
  2. Use the following commands to add the FortiGate IP address to the routing table on the client system:
    1. At the command prompt, type route -p ADD <external_IP_address> Mask 255.255.255.255 <FGT_IP_address>.

      For example, route –p ADD 172.30.147.207 MASK 255.255.255.255 172.30.157.90

    2. To confirm the setup, type route print.

  3. Check the Client IPv4 setting. Make sure default gateway is the FortiGate IP.

  4. Configure your browser by following the steps in IP Forwarding mode, depending on your browser type.
  5. Verify that it works by browsing to the following address:

    https://<external_IP_address>:<port_map_to_HA_443>/isolator/https://www.fortinet.com

    e.g.:

    https://172.30.147.207:14443/isolator/https://www.fortinet.com

    (It will now redirect to: https://172.30.147.207:12443/isolator/https://www.fortinet.com)

Multiple-nodes setting (one-primary-one-secondary)

To configure IP mapping of FortiIsolator in HA mode with one primary node and one secondary node:
  1. In the primary node, configure port forwarding mappings using the following commands in the FortiIsolator CLI:
    • set fis-ipmap <port_map_to_443> <external_IP_address>

      For example, set fis-ipmap 12443 172.30.147.207

    • set fis-ipmap-vip <external IP> <vip_port_map_to_443>

      For example, set fis-ipmap-vip 172.30.147.207 14443

    • set fis-ipmap-ha <priority> <external_IP_address> <internal_IP_address:primary> <port_map_to_443>

      For example, set fis-ipmap-ha 19 172.30.147.207 172.30.157.148 12443

    • set fis-ipmap-ha <priority> <external_IP_address> <internal_IP_address:secondary1> <port_map_to_443>

      For example, set fis-ipmap-ha 20 172.30.147.207 172.30.157.149 13443

  2. In the secondary node, configure port forwarding mappings using the following commands in the FortiIsolator CLI:
    • set fis-ipmap <port_map_to_443> <external_IP_address>

      For example, set fis-ipmap 13443 172.30.147.207

  3. Make sure the primary and secondary nodes have different HA priority but the same group id.

Below is a summary of the example:

  • Primary: 172.30.156.148
    • set fis-ipmap 12443 172.30.147.207
    • set fis-ipmap-vip 172.30.147.207 14443
    • set fis-ipmap-ha 19 172.30.147.207 172.30.157.148 12443
    • set fis-ipmap-ha 20 172.30.147.207 172.30.157.149 13443
  • Secondary: 172.30.156.149
    • set fis-ipmap 13443 172.30.147.207
FortiGate configuration

Complete the following steps in the FortiGate UI.

  1. Go to Policy & Objects > Virtual IPs.
  2. Create an IPv4 virtual IP for the secondary node with the following information:
    • IP-Mapping-HA-443: <external_IP_address> -> FIS_IP (TCP: 14443 > 443)

      For example, 172.30.147.207 -> 172.30.157.96 (TCP: 14443 > 443)

    Note

    This example uses the following:

    • External_IP_address: 172.30.147.207
    • FIS HA Virtual IP: 172.30.157.96

    • FIS_IP_Primary: 172.30.157.148
    • FIS_IP_Secondary: 172.30.157.149

    Settings of second ip-mapping-443:

  3. Go to Policy & Objects > IPv4 Policy > Create New.
  4. Create an IPv4 policy that includes the virtual IP that you created.

Client system configuration

Complete the following steps on the client system (for example, Windows 10).

  1. In Windows 10, launch CMD as administrator.
  2. Use the following commands to add the FortiGate IP address to the routing table on the client system:
    • At the command prompt, type

      route –p ADD <external_IP_address> Mask 255.255.255.255 <FGT_IP_address>

      For example,

      route –p ADD 172.30.147.207 MASK 255.255.255.255 172.30.157.90

    • To confirm the setup, type route print.

  3. Check the Client IPv4 setting. Make sure default gateway is the FortiGate IP.

  4. Configure your browser by following the steps in IP Forwarding mode, depending on your browser type.
  5. Verify that it works by browsing to the following address:

    https://<external_IP_address>:<port_map_to_HA_443>/isolator/https://www.fortinet.com

    e.g.:

    https://172.30.147.207:14443/isolator/https://www.fortinet.com

    The address will now redirect to the primary node:

    https://172.30.147.207:12443/isolator/https://www.fortinet.com

    or the secondary node:

    https://172.30.147.207:13443/isolator/https://www.fortinet.com

Configuring IP mapping in HA mode

Prerequisites:

Please follow High Availability to make sure native HA mode works before configuring IP Mapping in HA mode.

Configuring IP Mapping in HA mode includes the following steps:

  1. FortiIsolator configuration
  2. FortiGate configuration
  3. Client system configuration

Single-node setting (one-primary only)

To configure IP mapping of FortiIsolator in HA mode with one single primary node:
  1. Configure port forwarding mappings using the following commands in the FortiIsolator CLI:
    • set fis-ipmap <port_map_to_443> <external_IP_address>

      For example, set fis-ipmap 12443 172.30.147.207

    • set fis-ipmap-vip <external IP> <vip_port_map_to_443>

      For example, set fis-ipmap-vip 172.30.147.207 14443

    • set fis-ipmap-ha <priority> <external_IP_address> <internal_IP_address:primary> <port_map_to_443>

      For example, set fis-ipmap-ha 19 172.30.147.207 172.30.157.148 12443

  2. Make sure HA is Enabled in Fortilsolator.

FortiGate configuration

Complete the following steps in the FortiGate UI.

  1. Go to Policy & Objects > Virtual IPs.
  2. Create an IPv4 virtual IP with the following information:
    • IP-Mapping-HA-443: external_IP_address -> FIS_IP (TCP: 12443 > 443)

      For example, 172.30.147.207 -> 172.30.157.96 (TCP: 12443 > 443).

    Note

    In this example, we are using:

    • External_IP_address: 172.30.147.207
    • FIS HA Virtual IP: 172.30.157.96
    • FIS_IP: 172.30.157.148

    Settings of IP-Mapping-443:

    Settings of IP-Mapping-HA-443:

  3. Go to Policy & Objects > IPv4 Policy > Create New.
  4. Create an IPv4 policy that includes the virtual IP that you created.

Client system configuration

Complete the following steps on the client system (for example, Windows 10).

  1. In Windows 10, launch CMD as administrator.
  2. Use the following commands to add the FortiGate IP address to the routing table on the client system:
    1. At the command prompt, type route -p ADD <external_IP_address> Mask 255.255.255.255 <FGT_IP_address>.

      For example, route –p ADD 172.30.147.207 MASK 255.255.255.255 172.30.157.90

    2. To confirm the setup, type route print.

  3. Check the Client IPv4 setting. Make sure default gateway is the FortiGate IP.

  4. Configure your browser by following the steps in IP Forwarding mode, depending on your browser type.
  5. Verify that it works by browsing to the following address:

    https://<external_IP_address>:<port_map_to_HA_443>/isolator/https://www.fortinet.com

    e.g.:

    https://172.30.147.207:14443/isolator/https://www.fortinet.com

    (It will now redirect to: https://172.30.147.207:12443/isolator/https://www.fortinet.com)

Multiple-nodes setting (one-primary-one-secondary)

To configure IP mapping of FortiIsolator in HA mode with one primary node and one secondary node:
  1. In the primary node, configure port forwarding mappings using the following commands in the FortiIsolator CLI:
    • set fis-ipmap <port_map_to_443> <external_IP_address>

      For example, set fis-ipmap 12443 172.30.147.207

    • set fis-ipmap-vip <external IP> <vip_port_map_to_443>

      For example, set fis-ipmap-vip 172.30.147.207 14443

    • set fis-ipmap-ha <priority> <external_IP_address> <internal_IP_address:primary> <port_map_to_443>

      For example, set fis-ipmap-ha 19 172.30.147.207 172.30.157.148 12443

    • set fis-ipmap-ha <priority> <external_IP_address> <internal_IP_address:secondary1> <port_map_to_443>

      For example, set fis-ipmap-ha 20 172.30.147.207 172.30.157.149 13443

  2. In the secondary node, configure port forwarding mappings using the following commands in the FortiIsolator CLI:
    • set fis-ipmap <port_map_to_443> <external_IP_address>

      For example, set fis-ipmap 13443 172.30.147.207

  3. Make sure the primary and secondary nodes have different HA priority but the same group id.

Below is a summary of the example:

  • Primary: 172.30.156.148
    • set fis-ipmap 12443 172.30.147.207
    • set fis-ipmap-vip 172.30.147.207 14443
    • set fis-ipmap-ha 19 172.30.147.207 172.30.157.148 12443
    • set fis-ipmap-ha 20 172.30.147.207 172.30.157.149 13443
  • Secondary: 172.30.156.149
    • set fis-ipmap 13443 172.30.147.207
FortiGate configuration

Complete the following steps in the FortiGate UI.

  1. Go to Policy & Objects > Virtual IPs.
  2. Create an IPv4 virtual IP for the secondary node with the following information:
    • IP-Mapping-HA-443: <external_IP_address> -> FIS_IP (TCP: 14443 > 443)

      For example, 172.30.147.207 -> 172.30.157.96 (TCP: 14443 > 443)

    Note

    This example uses the following:

    • External_IP_address: 172.30.147.207
    • FIS HA Virtual IP: 172.30.157.96

    • FIS_IP_Primary: 172.30.157.148
    • FIS_IP_Secondary: 172.30.157.149

    Settings of second ip-mapping-443:

  3. Go to Policy & Objects > IPv4 Policy > Create New.
  4. Create an IPv4 policy that includes the virtual IP that you created.

Client system configuration

Complete the following steps on the client system (for example, Windows 10).

  1. In Windows 10, launch CMD as administrator.
  2. Use the following commands to add the FortiGate IP address to the routing table on the client system:
    • At the command prompt, type

      route –p ADD <external_IP_address> Mask 255.255.255.255 <FGT_IP_address>

      For example,

      route –p ADD 172.30.147.207 MASK 255.255.255.255 172.30.157.90

    • To confirm the setup, type route print.

  3. Check the Client IPv4 setting. Make sure default gateway is the FortiGate IP.

  4. Configure your browser by following the steps in IP Forwarding mode, depending on your browser type.
  5. Verify that it works by browsing to the following address:

    https://<external_IP_address>:<port_map_to_HA_443>/isolator/https://www.fortinet.com

    e.g.:

    https://172.30.147.207:14443/isolator/https://www.fortinet.com

    The address will now redirect to the primary node:

    https://172.30.147.207:12443/isolator/https://www.fortinet.com

    or the secondary node:

    https://172.30.147.207:13443/isolator/https://www.fortinet.com