Go Premium for a chance to win a PS4. Enter to Win


Configuring Fortigate 110c

Posted on 2010-08-14
Medium Priority
Last Modified: 2012-06-21

I was having another problem here and opted for a fortigate 110c - you can read the question and my requirements in this question -> http:Q_26394158.html

So, I have the device, and have set it up - can currently browse and do whatever, except I am tearing my hair out trying to understand how it does port forwarding.  I want to forward 25 and 443 to my exchange server.  I also want to figure out what I need to tell it so that it can route traffic between my second link for specific users (per IP address or whatever).


Question by:kieran_b
1 Comment
LVL 25

Accepted Solution

kieran_b earned 0 total points
ID: 33439570
Hot damn this thing is clunky;

To do this, configure a Virtual IP, then use that Virtual IP as the destination of the policies

Note to self kids, when building a firewall OS, don't take all the heroin in the world first.

Featured Post

New Tabletop Appliances Blow Competitors Away!

WatchGuard’s new T15, T35 and T55 tabletop UTMs provide the highest-performing security inspection in their class, allowing users at small offices, home offices and distributed enterprises to experience blazing-fast Internet speeds without sacrificing enterprise-grade security.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

824 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question