4
Most read
5
Most read
FORTIGATE FIREWALL HOW TO
DMZ

www.ipmax.it
INTRODUCTION
Almost every network needs to expose some systems to the public Internet. These
systems should be reachable from the outside and, in the meanwhile, be protected
against external attacks.
This kind of configuration is obtained through the use of DMZs, which allow the access
to only explicitly allowed services and hide the real server IP address.
In the following slides we will show you how to create a DMZ using the FortiGate
Firewall.
In our configuration, we will use a single IP address (Internet side) and only the
http/https service will be permitted.
Keep in mind that you need a static IP address on the Internet facing interface in order
to implement a DMZ always reachable from the outside!
CONFIGURING A DMZ
To configure a DMZ you should configure an interface to be connected to your DMZ
network.
Go to System > Network > Interfaces and choose the DMZ facing interface. Only a
static IP address should be configured, the remaining part of the configuration will be
implemented elsewhere.
A DMZ on the FortiGate firewall uses the concept of
virtual IP addresses. These objects are a static NAT
association between the public IP address and the
internal server.
Go to Firewall Objects > Virtual IPs > Virtual IPs and
create your first Virtual IP (we will need two objects,
one for the http service and the other one for the
https).
CONFIGURING A DMZ - CONTINUED
In the configuration menu give a Name to the virtual IP object and select the
Internet facing interface (External Interface). Two more configurations will be
needed, there is where the static NAT happens.
In our example we have the
Internet facing interface with an IP
address of 172.29.130.86 and a
web server with a private IP
address of 192.168.254.2.
Checking the Port Forwarding box,
we can map the TCP port for the
internal service to the TCP port we
will expose to the Internet.
The same configuration will be needed for the https service: create a new virtual IP
object for the new mapping using port 443 instead of 80.
CONFIGURING LOGGING – CONTINUED
Now we have to configure a new rule to allow traffic from the outside going to the
DMZ.
This time the communication session will go from the outside to the inside, so a
reverse rule will be needed.
Follow the example onto the right in order
to configure the policy for the DMZ.
As you could see, the incoming interface is
the Internet facing one and the source
address is “all” (everyone could connect to
our server).
The destination address is the Virtual IP
object we have just configured for http
and the service allowed is the same.
Add the Virtual IP object and the https
service to this rule (using the green plus
buttons) in order to allow https also.
MORE NEEDS?
See hints on www.ipmax.it
Or email us your questions to info_ipmax@ipmax.it
IPMAX
IPMAX is a Fortinet Partner in Italy.
IPMAX is the ideal partner for companies seeking quality in products and
services. IPMAX guarantees method and professionalism to support its
customers in selecting technologies with the best quality / price ratio, in the
design, installation, commissioning and operation.

IPMAX srl
Via Ponchielli, 4
20063 Cernusco sul Naviglio (MI) – Italy
+39 02 9290 9171

More Related Content

PPTX
Fortinet
PPTX
Cisco Identity Services Engine (ISE)
PPT
Fortinet FortiOS 5 Presentation
PDF
Cisco Trustsec & Security Group Tagging
PPT
PDF
Understanding Cisco’ Next Generation SD-WAN Technology
PDF
OpenStack Swift
PDF
20 palo alto site to site
Fortinet
Cisco Identity Services Engine (ISE)
Fortinet FortiOS 5 Presentation
Cisco Trustsec & Security Group Tagging
Understanding Cisco’ Next Generation SD-WAN Technology
OpenStack Swift
20 palo alto site to site

What's hot (20)

DOCX
Mikrotik basic configuration
PPTX
Fortinet Tanıtım
DOCX
Content Delivery Network – CDN
PDF
Deploiement du controleur virtuel de point d’acces cisco
PPTX
Transform your enterprise branch with secure sd-wan
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 6
PDF
CheckPoint Firewall Presentation CCSA.pdf
PPTX
Network Security - Fortinet, Dublin June 2017
PDF
Palo Alto Virtual firewall deployment guide on OpenStack Cloud
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 11
PDF
Palo alto outline course | Mostafa El Lathy
PDF
Brkarc 3454 - in-depth and personal with the cisco nexus 2000 fabric extender...
PDF
FortiGate Firewall How-To: WEB Filtering
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 4
PDF
CCNAv5 - S4: Chapter 9 troubleshooting the network
PPTX
PPTX
[OpenStack 하반기 스터디] Interoperability with ML2: LinuxBridge, OVS and SDN
PPTX
PPTX
Secure AWS with Fortinet Security Fabric.pptx
PPTX
The Elastic Stack as a SIEM
Mikrotik basic configuration
Fortinet Tanıtım
Content Delivery Network – CDN
Deploiement du controleur virtuel de point d’acces cisco
Transform your enterprise branch with secure sd-wan
CCNA 2 Routing and Switching v5.0 Chapter 6
CheckPoint Firewall Presentation CCSA.pdf
Network Security - Fortinet, Dublin June 2017
Palo Alto Virtual firewall deployment guide on OpenStack Cloud
CCNA 1 Routing and Switching v5.0 Chapter 11
Palo alto outline course | Mostafa El Lathy
Brkarc 3454 - in-depth and personal with the cisco nexus 2000 fabric extender...
FortiGate Firewall How-To: WEB Filtering
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNAv5 - S4: Chapter 9 troubleshooting the network
[OpenStack 하반기 스터디] Interoperability with ML2: LinuxBridge, OVS and SDN
Secure AWS with Fortinet Security Fabric.pptx
The Elastic Stack as a SIEM
Ad

Viewers also liked (18)

PPT
Fortigate Training
PPT
Basic configuration fortigate v4.0 mr2
PDF
Fortinet Fortigate 60D 中文安裝手冊 ( Ver 5.2.3)
PPTX
Fortinet sandboxing
PPTX
Forti cloud
PPTX
Forti presence
PPTX
PDF
【FORTINET様】第3回SoftLayer勉強会資料
PDF
Utm (unified threat management) security solutions
PDF
Atrae visitas a tu wordpress: el email márqueting, tu gran aliado 12%2 f1%2f1...
PDF
Viruses on mobile platforms why we don't/don't we have viruses on android_
PDF
Attacking IPv6 Implementation Using Fragmentation
PDF
Radware DefensePipe: Cloud-Based Attack Mitigation Solution
PDF
Anti evasion and evader - klaus majewski
PPT
XSS Primer - Noob to Pro in 1 hour
Fortigate Training
Basic configuration fortigate v4.0 mr2
Fortinet Fortigate 60D 中文安裝手冊 ( Ver 5.2.3)
Fortinet sandboxing
Forti cloud
Forti presence
【FORTINET様】第3回SoftLayer勉強会資料
Utm (unified threat management) security solutions
Atrae visitas a tu wordpress: el email márqueting, tu gran aliado 12%2 f1%2f1...
Viruses on mobile platforms why we don't/don't we have viruses on android_
Attacking IPv6 Implementation Using Fragmentation
Radware DefensePipe: Cloud-Based Attack Mitigation Solution
Anti evasion and evader - klaus majewski
XSS Primer - Noob to Pro in 1 hour
Ad

Similar to FortiGate Firewall HOW-TO - DMZ (20)

PDF
How to -_configure_port_forwarding_using_virtual_host_to_access_devices_on_in...
PPTX
Basic Cisco ASA 5506-x Configuration (Firepower)
PPT
Network and security concepts
DOCX
FORTIGATE FIREWALL BASIC KNOWELEDGE TO CONFIGURE ROUTER
PDF
class12_Networking2
DOCX
Packet Tracer: Nat protocol
DOCX
Mikrotik pcq
PPT
PPT
Firewall
PDF
Smart (3 files merged)
PDF
Network And Network Address Translation
PDF
Cognex In-Sight - Network Settings.pdf
PPS
Ip address
PPTX
IP fundamentals
PPT
Lecture11
PDF
Dns rebinding
DOCX
How to configure static nat on cisco routers
PDF
Tutorial mikrotik step by step
PPTX
Cyber security and ethical hacking 3
How to -_configure_port_forwarding_using_virtual_host_to_access_devices_on_in...
Basic Cisco ASA 5506-x Configuration (Firepower)
Network and security concepts
FORTIGATE FIREWALL BASIC KNOWELEDGE TO CONFIGURE ROUTER
class12_Networking2
Packet Tracer: Nat protocol
Mikrotik pcq
Firewall
Smart (3 files merged)
Network And Network Address Translation
Cognex In-Sight - Network Settings.pdf
Ip address
IP fundamentals
Lecture11
Dns rebinding
How to configure static nat on cisco routers
Tutorial mikrotik step by step
Cyber security and ethical hacking 3

More from IPMAX s.r.l. (10)

PDF
Cisco Switch How To - Secure a Switch Port
PDF
Huawei ARG3 Router How To - Troubleshooting OSPF: Netmask mismatch
PDF
Huawei ARG3 Router How To - Troubleshooting OSPF: Router ID Confusion
PDF
Huawei Switch S5700 How To - Configuring single-tag vlan mapping
PDF
Huawei SAN Storage How To - Configuring the i-SCSI Communication Protocol
PDF
Huawei SAN Storage How To - ISM management application setup
PDF
Huawei SAN Storage How To - Assigning Management IP Address
PDF
Huawei Switch How To - Configuring a basic DHCP server
PDF
Fortigate Firewall How to - DLP
PDF
HUAWEI Switch HOW-TO - Configuring link aggregation in static LACP mode
Cisco Switch How To - Secure a Switch Port
Huawei ARG3 Router How To - Troubleshooting OSPF: Netmask mismatch
Huawei ARG3 Router How To - Troubleshooting OSPF: Router ID Confusion
Huawei Switch S5700 How To - Configuring single-tag vlan mapping
Huawei SAN Storage How To - Configuring the i-SCSI Communication Protocol
Huawei SAN Storage How To - ISM management application setup
Huawei SAN Storage How To - Assigning Management IP Address
Huawei Switch How To - Configuring a basic DHCP server
Fortigate Firewall How to - DLP
HUAWEI Switch HOW-TO - Configuring link aggregation in static LACP mode

Recently uploaded (20)

PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PPTX
The various Industrial Revolutions .pptx
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
CloudStack 4.21: First Look Webinar slides
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Five Habits of High-Impact Board Members
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PPTX
2018-HIPAA-Renewal-Training for executives
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PDF
Flame analysis and combustion estimation using large language and vision assi...
PDF
Getting started with AI Agents and Multi-Agent Systems
PPT
What is a Computer? Input Devices /output devices
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
Developing a website for English-speaking practice to English as a foreign la...
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Hindi spoken digit analysis for native and non-native speakers
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
The various Industrial Revolutions .pptx
A review of recent deep learning applications in wood surface defect identifi...
CloudStack 4.21: First Look Webinar slides
Enhancing emotion recognition model for a student engagement use case through...
Five Habits of High-Impact Board Members
NewMind AI Weekly Chronicles – August ’25 Week III
sbt 2.0: go big (Scala Days 2025 edition)
2018-HIPAA-Renewal-Training for executives
Benefits of Physical activity for teenagers.pptx
Taming the Chaos: How to Turn Unstructured Data into Decisions
Consumable AI The What, Why & How for Small Teams.pdf
Flame analysis and combustion estimation using large language and vision assi...
Getting started with AI Agents and Multi-Agent Systems
What is a Computer? Input Devices /output devices
Final SEM Unit 1 for mit wpu at pune .pptx

FortiGate Firewall HOW-TO - DMZ

  • 1. FORTIGATE FIREWALL HOW TO DMZ www.ipmax.it
  • 2. INTRODUCTION Almost every network needs to expose some systems to the public Internet. These systems should be reachable from the outside and, in the meanwhile, be protected against external attacks. This kind of configuration is obtained through the use of DMZs, which allow the access to only explicitly allowed services and hide the real server IP address. In the following slides we will show you how to create a DMZ using the FortiGate Firewall. In our configuration, we will use a single IP address (Internet side) and only the http/https service will be permitted. Keep in mind that you need a static IP address on the Internet facing interface in order to implement a DMZ always reachable from the outside!
  • 3. CONFIGURING A DMZ To configure a DMZ you should configure an interface to be connected to your DMZ network. Go to System > Network > Interfaces and choose the DMZ facing interface. Only a static IP address should be configured, the remaining part of the configuration will be implemented elsewhere. A DMZ on the FortiGate firewall uses the concept of virtual IP addresses. These objects are a static NAT association between the public IP address and the internal server. Go to Firewall Objects > Virtual IPs > Virtual IPs and create your first Virtual IP (we will need two objects, one for the http service and the other one for the https).
  • 4. CONFIGURING A DMZ - CONTINUED In the configuration menu give a Name to the virtual IP object and select the Internet facing interface (External Interface). Two more configurations will be needed, there is where the static NAT happens. In our example we have the Internet facing interface with an IP address of 172.29.130.86 and a web server with a private IP address of 192.168.254.2. Checking the Port Forwarding box, we can map the TCP port for the internal service to the TCP port we will expose to the Internet. The same configuration will be needed for the https service: create a new virtual IP object for the new mapping using port 443 instead of 80.
  • 5. CONFIGURING LOGGING – CONTINUED Now we have to configure a new rule to allow traffic from the outside going to the DMZ. This time the communication session will go from the outside to the inside, so a reverse rule will be needed. Follow the example onto the right in order to configure the policy for the DMZ. As you could see, the incoming interface is the Internet facing one and the source address is “all” (everyone could connect to our server). The destination address is the Virtual IP object we have just configured for http and the service allowed is the same. Add the Virtual IP object and the https service to this rule (using the green plus buttons) in order to allow https also.
  • 6. MORE NEEDS? See hints on www.ipmax.it Or email us your questions to [email protected]
  • 7. IPMAX IPMAX is a Fortinet Partner in Italy. IPMAX is the ideal partner for companies seeking quality in products and services. IPMAX guarantees method and professionalism to support its customers in selecting technologies with the best quality / price ratio, in the design, installation, commissioning and operation. IPMAX srl Via Ponchielli, 4 20063 Cernusco sul Naviglio (MI) – Italy +39 02 9290 9171