FortiGate NAT Issues – Common Mistakes

Dec 25, 2025 15 mins read

Introduction

NAT configuration is one of the most common sources of connectivity problems on FortiGate firewalls. Even when firewall policies appear correct, traffic may still fail due to NAT misconfiguration. This often leads administrators to troubleshoot routing or policies, while the real issue lies in how NAT is applied.

This article explains the most common FortiGate NAT mistakes and how to fix them using a clear and structured troubleshooting approach.

Problem Description

Users may not be able to access the internet, external users cannot reach internal servers, or port forwarding does not work as expected. Firewall policies look correct, but traffic either fails silently or behaves inconsistently.

These problems usually appear after enabling NAT, switching to Central NAT, creating VIP objects, or modifying firewall policies.

Common Symptoms

Internet access does not work behind the FortiGate firewall.
Port forwarding is not accessible from outside.
NAT works intermittently.
Firewall policy counters increase but traffic still fails.
Sessions are created but no return traffic is received.

Quick Checks Before Troubleshooting

First, verify whether NAT is enabled in the firewall policy.
Check if Central NAT is enabled on the device.
Confirm the correct outgoing interface is selected.
Review VIP configuration if port forwarding is involved.

These quick checks often reveal the problem immediately.

Common NAT Mistakes and Fixes

Using Policy NAT Instead of Central NAT or the Opposite

FortiGate supports both policy-based NAT and Central NAT. A very common mistake is configuring NAT rules in one mode while the firewall is operating in the other.

Always confirm which NAT mode is enabled in system settings and make sure all NAT rules are created in the correct section.

NAT Not Enabled in the Firewall Policy

For internet access, NAT must be enabled in the firewall policy. If the policy allows traffic but NAT is disabled, outgoing traffic may leave the firewall but reply packets will never return to internal users.

Wrong Outgoing Interface

NAT behavior depends on the outgoing interface. If the wrong WAN interface is selected, NAT will not function correctly. This often happens after ISP changes or interface renaming.

Incorrect VIP Configuration

VIP objects are used for destination NAT and port forwarding. Common mistakes include using the wrong external IP address, mapping traffic to the wrong internal IP, or forgetting to reference the VIP in the firewall policy.

A VIP alone does not allow traffic. A matching firewall policy is always required.

Missing Firewall Policy for Port Forwarding

For inbound traffic, a firewall policy from WAN to LAN is required. Creating a VIP without the correct firewall policy will cause port forwarding to fail silently.

Overlapping Address Objects

Overlapping internal networks or incorrect subnet masks can prevent NAT rules from matching traffic correctly. Always double-check address objects used in policies and NAT rules.

NAT and Routing Conflicts

NAT does not fix routing problems. If the default route is missing or incorrect, traffic may be translated properly but still sent to the wrong gateway.

Step-by-Step Troubleshooting Approach

Start by identifying the active NAT mode and ensure all rules match that mode.
Review the firewall policy and confirm NAT is enabled with the correct interfaces.
If port forwarding is used, verify that VIPs are correct and referenced in policies.
Check the routing table to ensure a valid default route exists.
Use firewall logs and session monitoring to confirm NAT is being applied.

Verification and Testing

After applying fixes, internet access should work reliably. Port forwarding should be reachable from external networks. Firewall logs should show NAT being applied, and sessions should display translated addresses correctly.

Best Practices

Use a single NAT mode consistently.
Comment all NAT-related policies and VIPs.
Keep NAT configuration as simple as possible.
Enable logging during troubleshooting and disable it afterward.
Test changes step by step.

Common Mistakes

Mixing Central NAT with Policy NAT.
Forgetting to enable NAT in firewall policies.
Creating VIPs without corresponding firewall policies.
Assuming NAT can solve routing problems.

Final Thoughts

Most FortiGate NAT issues are caused by simple configuration mistakes rather than complex bugs. Understanding how NAT interacts with firewall policies and routing is essential for fast and reliable troubleshooting. A structured approach saves time and prevents unnecessary changes.

 

Image NewsLetter
Icon primary
Newsletter

Subscribe our newsletter

By clicking the button, you are agreeing with our Term & Conditions

Live Chat Offline

Hi there! How can we help you today?

Powered by FOB Live Chat
Your experience on this site will be improved by allowing cookies Cookie Policy