| Description |
This article provides technical details about the forwarding domain in FortiGate’s transparent mode and how to implement it. |
| Scope | FortiGate v6.4, v7.2, v7.4, v7.6. |
| Solution |
Once the FortiGate is configured in transparent mode, it starts acting like a layer 2 switch, following 802.1d standards (Ethernet MAC bridging in this case, since it is not running a spanning tree). This means all its ports are sitting in the same Broadcast Domain and traffic received on one port is flooded to all other ports except the one the traffic came in through.
To segment or narrow this broadcast domain scope (like split the big broadcast domain into smaller ones), configure the 'forwarding domain'.
Every port (physical or virtual) which are assigned with the same forwarding domain ID or to the same forwarding domain will start acting as a broadcast domain and creating a new broadcast domain boundary.
The network diagram below will be used to demonstrate this article.
Topology Description:
With the forwarding domain configured, PC100 can communicate with PC300, because it is in the same forwarding domain (broadcast domain). And PC200 can communicate with PC400.
Note. A firewall policy is required for this to work (ensure to configure a firewall policy).
Configuration and verification: Virtual interfaces are created and assigned VLAN100, 200, 300, and 400 on the FortiGate. Then VLAN100 and 300 interfaces are assigned to forwarding domain 100300, so any device sitting in VLAN100 and 300 with the same IP subnet assigned can reach each other. VLAN200 and 400 interfaces are assigned to forwarding domain 200400. The below screenshot shows the configuration and the verification.
diagnose netlink brctl name host <vdom_name.b>
Notes:
Topology:
VLAN configuration on FortiGate in transparent mode:
config system interface
Firewall Policy on the upstream device in NAT mode:
Firewall Policy on the FortiGate device in Transparent mode:
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.