Created on 05-13-2009 06:45 AM Edited on 06-09-2022 03:11 PM By Anonymous
Purpose
This article describes how to setup a FortiGate unit in Transparent mode, in the presence of trunks containing multiple VLANs (802.1q tagged interfaces).
Scope
FortiGate units or VDOMs, configured in Transparent mode.
Diagram
The following diagram illustrates this example:
It is assumed that the trunk is a single physical interface with VLANs 102 and 103.
Expectations, Requirements
The FortiGate unit must filter traffic from port2 to port3 and vice versa.
This article does not cover any aspects of content inspection (no protection profile).
Configuration
Step 1: Create VLANs and forwarding domains
In order to avoid any L2 issue due to broadcast domain overlap and packets looping back on the trunk, assign each pair of VLAN interfaces into a unique forwarding domain. This will, for each VLAN, create independent broadcast domains on the FortiGate unit and confine all broadcasts and multicast traffic between the interfaces belonging to a same forward-domain.
Note that the forward-domain ID can be different to the VLAN ID, but it is recommend for troubleshooting and readability to keep them the same.
Step 2: Create the appropriate Firewall Policies
Notes:
Verification
Troubleshooting
To verify if traffic flows or troubleshoot any issue, please refer to any of the methods described in the related articles at the end of this page.
Related Articles
Troubleshooting Tip : How to use the FortiGate sniffer and debug flow in presence of NP2 ports
Technical Tip : Troubleshoot and verify if traffic is hitting a Firewall Policy
Troubleshooting Tool: Using the FortiOS built-in packet sniffer
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.