Description |
This article describes how to forward the traffic from one VDOM to another one using the inter VDOM link connection. |
Scope |
Requirements and prerequisites: Make sure VDOMs are enabled refer to the following guide Enable multi VDOM mode.
Diagram:
Internet===========[port2]===========interVDOM-Links========[port3]=============[WindowsServer10.222.3.251/20]
|
Solution |
Step 1: Configure the inter-VDOM link. Configure the Inter-VDOM link from GLOBAL using the web based manager or the CLI:
Step 2: Configure the IP addresses for each VDOM:
Step 3: Verify connectivity between these two points:
config vdom edit SERVERS execute ping 192.168.100.1 <- The IP of the root VDOM.
The presence of virtual interfaces is one of the key differences between inter-VDOM links and regular interfaces.
Note: Half or full-numbered interfaces are required for NAT. Either SNAT or DNAT as an IP number is needed on both ends to translate between. Running the tracer route will not show the interface in the list of hops. However, the interface is visible when sniffing packets, which is useful for troubleshooting.
Step 3: Define the Inter-VDOM routing and firewall policies on each VDOM to allow the traffic. The default gateway for the Internal VDOM communication will be the External VDOM (VDOM root in this example).
Configure the static route by using the following command:
config vdom edit SERVERS config router static edit 1 set gateway 192.168.100.1 set device "VDOM_link1" set dst 0.0.0.0/0 next end
Configure the policy using the following command:
edit SERVERS config firewall policy edit 1 set name "SRV2INT" next end
External VDOM (root):
Configure the static route using the following command:
config vdom edit root config router static edit 2 set dst 10.222.0.0/20 <- Servers subnet. set device VDOM_link0 set gateway 192.168.100.2 end
Configure the Policy using the following command:
config vdom edit root config firewall policy edit 1 set name "SRV_SUB" next end
Step 4: Verify connectivity from the Windows Server:
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.