Description | This article describes how to block intra-VLAN traffic between devices connected to the same VLAN using a FortiSwitch feature managed by FortiGate. It also compares this native capability with traditional switches, such as Cisco, HP, and Dell, which do not support intra-VLAN blocking by default. It outlines workarounds to achieve similar security outcomes. | ||||||||||||
Scope |
FortiGate v7.2.x, 7.4.x, v7.6.x. and FortiSwitch v7.0.x, v7.2.x, v7.4.x, v7.6.x. |
||||||||||||
Solution |
In some network environments, it is necessary to restrict communication between devices within the same VLAN for security or compliance reasons. FortiSwitch introduces a feature that allows administrators to block intra-VLAN traffic easily.
In the example setup:
Network Topology:
In this topology, blocking intra-VLAN traffic ensures that Windows 10 and PC1 cannot communicate directly at the Layer 2 level, even though they are in the same VLAN and subnet.
Configuration Steps.
This setting creates implicit ACL rules on the switch to deny Layer 2 communication between ports assigned to the same VLAN.
Using the CLI configuration with the following commands:
config switch vlan
Before the setting is enabled. Pinging across the two hosts in the same VLAN:
Blocking intravlan Setting is enabled:
Testing and Behaviour:
Limitations and Important Considerations.
No complete Layer 2 isolation unless combined with DHCP Snooping, Dynamic ARP Inspection (DAI), or Private VLANS. IPv6 is not supported between clients when intra-VLAN traffic blocking is enabled. Communication routed through FortiGate (inter-VLAN or L3 routed traffic) is still allowed configuring the following
1. Ability on FortiGate to respond to ARP requests via Proxy-ARP function config system proxy-arp
edit 1
set interface port1
set ip <Initial IP address>
set end-ip <Last IP address>
next
end
2. Regular Firewall Policies with the same Interface as Source and Destination.
Workarounds for Non-FortiSwitch Networks. using Cisco, HP, or Dell switches that lack intra-VLAN blocking, and FortiGate is still used as the firewall, consider these alternatives:
Each of these features could have a different implementation and slight variation in configuration.
E: G, a quick outline of the steps required on a generic Cisco IOS switch:
SWX(config)# vlan 10 SWX(config)# vlan 20 SWX(config)# vlan 30
SWX(config)# vlan 10
Isolated VLAN (VLAN 30) – Ports Fa0/3 and Fa0/4:
SWX(config)# interface fa0/24
Conclusion: FortiSwitch offers powerful native capabilities to segment traffic within the same VLAN. Something not possible by default on most enterprise access switches. Equivalent behaviour can be achieved without using FortiSwitch and FortiGate integration, but with greater complexity and risk.
For compliance-driven environments, FortiSwitch and FortiGate remain the most scalable, manageable, and secure solutions for intra-VLAN isolation. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.