FortiOS 5.4 Online Help Link FortiOS 5.2 Online Help Link FortiOS 5.0 Online Help Link FortiOS 4.3 Online Help Link

Home > Online Help

> Chapter 9 - Firewall > Building firewall objects and policies > Example: IP Pool

Example: IP pool

Your company has an application server on the internal network that sends out regular data updates to an offsite service. In order to make the service site more secure, they only accept connections from predefined IP address. If the external IP address of the FortiGate firewall interface were used that would mean that the service would be accepting sessions from just about any user in the network so a separate IP address need so be assigned for the Network Address Translation.

  • The external address that will be used is one that has been assigned to the company by the ISP on WAN2
  • The address is (for example use only. Not a valid IP address)
The ARP interface cannot be set in the Web-based Manager but as this is the only path that the traffic will be coming from the outside this should not be an issue. The setting has been included in the CLI instructions so that you will now how to set it in a situation where you want the ARP replies to be answered only on a specific interface.
  1. Go to Policy & Objects > Objects > IP Pools.
  2. Fill out the fields with the following information:
IP Pool Type IPv4 Pool
Name App_Server1
Comments Addresses assignment for this server only.
Type One-to-One
External IP Range
ARP Reply <enabled>
  1. Select OK.
  2. Enter the following CLI command:

config firewall ippool

edit App_Server1

set comments ''Addresses assignment for this server only."

set type one-to-one

set arp-reply enable

set arp-intf wan2

set startip

set endip


To verify that the category was added correctly:
  1. Go to Policy & Objects > Objects > IP Pools.
  2. Check that the IP Pool has been added to the list of IP Pools and that the listed settings are correct.
  3. Enter the following CLI command:

config firewall ippool

edit <the name of the IP Pool you wish to verify>

show full-configuration