Enabling NAT inbound protection in FortiOS
In this example, you enable the FortiGate-VM to protect inbound RDP traffic. The same concept can be applied to HTTP/HTTPS and other services. This demonstrates how to configure the FortiGate-VM to monitor inbound and outbound traffic.
To enable NAT inbound protection in FortiOS:
- Create the virtual IP address:
- In FortiOS, go to Policy & Objects > Virtual IPs.
- Click Create New.
- From the Interface dropdown list, select port1.
- In the Mapped IP address/range field, enter 192.168.1.36, the ECS IP address.
- Enable Port Forwarding.
- In the External service port and Map to port fields, enter 3389.
- Click OK.
- Configure the inbound policy for the RDP redirection. Go to Policy & Objects > Firewall Policy, then click Create New.
- In the Destination field, select the virtual IP address that you created in step 1.
- Enable the desired security profiles, then log all sessions for demonstration purposes.
- Click OK.
You can now use the FortiGate public address to RDP into the ECS.
You can also view the logs and session information in FortiOS.