You can probably make this work, but you are going "against the grain" of normal IP routing.
1) First off, under Global Properties, NAT verify that "translate destination on the client side" is checked for both automatic and manual NAT (this the default). DO NOT EVEN THINK ABOUT UNCHECKING ANY BOXES ON THIS SCREEN.
2) Next, add a static route on the firewall for 172.20.112.80/32 to a next hop router reachable through the eth2-02.611 interface. You cannot just specify the interface name, you must specify a nexthop router address leading to eth2-02.611. This /32 is more specific and will override your existing directly attached /24 route to 172.20.112.0/24. Note that the "real" 172.20.112.80/32 reachable through eth2-02.628 will no longer be accessible by any traffic traversing the firewall.
3) Check the topology of your firewall/cluster for interface for eth2-02.611, if not using "network defined by routes" you will need to add 172.20.112.80/32 to the anti-spoofing definition for this interface. You do NOT need to remove 172.20.112.80/32 from the topology of interface eth2-02.628.
4) You will need to ensure that your surrounding network will deliver traffic bound to 172.20.112.80/32 to the firewall on eth2-01; the firewall cannot force/spoof this with proxy ARP or somesuch in your scenario. This may involve static 172.20.112.80/32 routes added directly on user workstations, or adding a static 172.20.112.80/32 route on a router(s) in your network. If the firewall is already the default route for these user workstations you should not need to deal with this.
5) Next step will be a manual NAT rule. Because you are attempting to pluck the 172.20.112.80/32 address from an existing, real /24 subnet and send it somewhere else, there is a danger of asymmetric routing breaking things. For this reason I'd suggest both a source Hide NAT behind the egress firewall interface eth2-02.611 as well as the destination static NAT, to ensure replies come back symmetrically to the firewall. Keep in mind that if you do this connections can only be initiated outbound by the workstations and not the other way around; also this Hide NAT part may not be necessary depending on your network.
Manual NAT rule will look something like this:
Osrc=(initiating workstation subnet)
ODst=172.20.112.80/32
OSrv = Any
Tsrc=Firewall Object (Force Hide)
TDst=163.116.128.80/32 (Static)
Tsrc=Original
GW=(relevant gateway)
6) In your Access Control policy ensure you have a rule accepting the traffic, keep in mind you should always reference the pre-NAT IP addresses here, so:
src= (initiating workstation subnets)
Dst = 172.20.112.80/32
Service=whatever
Action=Accept
Track=Log (make sure "Connection" logging is set in advanced properties so you get proper NAT logging)
Gateway Performance Optimization R81.20 Course
now available at maxpowerfirewalls.com