I currently have 2 vdoms setup. I have not been able to configure both vdoms with the same wan port. Is this possible? The reason I am trying to approach it this way as opposed to having separate external interfaces for each vdom is because i want to setup wan failover to cover both vdoms.
Solved! Go to Solution.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Hi,
You can use the same physically interface, by using VLANs on the interface,
VLAN1(wan1) = VDOM1
VLAN2(wan1) = VDOM2
etc...
If you need the same logical interface, all you can do is create a VDOM-link between the two vdoms and create firewall rules for that.
VDOM1 -> WAN1
VDOM2 -> VDOM-link to VDOM1 -> WAN1
FCNSA, FCNSP
---
FortiGate 200A/B, 224B, 110C, 100A/D, 80C/CM/Voice, 60B/C/CX/D, 50B, 40C, 30B
FortiAnalyzer 100B, 100C
FortiMail 100,100C
FortiManager VM
FortiAuthenticator VM
FortiToken
FortiAP 220B/221B, 11C
A meshed vdom is what you want. Be advise fwpolicies resources are doubled for every meshed-vdom
http://socpuppet.blogspot.com/2014/09/a-stacked-vdom-concept-with-fortigate.html
http://socpuppet.blogspot.com/2014/09/a-meshed-vdom-transparent-using-inter.html
I really wished FTNT would come up a with solution that allows you to share a interface similar to the cisco ASA & across multi-contexts.
PCNSE
NSE
StrongSwan
Hi,
You can use the same physically interface, by using VLANs on the interface,
VLAN1(wan1) = VDOM1
VLAN2(wan1) = VDOM2
etc...
If you need the same logical interface, all you can do is create a VDOM-link between the two vdoms and create firewall rules for that.
VDOM1 -> WAN1
VDOM2 -> VDOM-link to VDOM1 -> WAN1
FCNSA, FCNSP
---
FortiGate 200A/B, 224B, 110C, 100A/D, 80C/CM/Voice, 60B/C/CX/D, 50B, 40C, 30B
FortiAnalyzer 100B, 100C
FortiMail 100,100C
FortiManager VM
FortiAuthenticator VM
FortiToken
FortiAP 220B/221B, 11C
Yeah, it gets a little messy. In situations like that I tend to go the three VDOM route making a pseudo pyramid.
Have VDOM1 be the NAT vdom for the WAN port and have the two other vdoms underneath it that link up to the main one.
Mike Pruett
A meshed vdom is what you want. Be advise fwpolicies resources are doubled for every meshed-vdom
http://socpuppet.blogspot.com/2014/09/a-stacked-vdom-concept-with-fortigate.html
http://socpuppet.blogspot.com/2014/09/a-meshed-vdom-transparent-using-inter.html
I really wished FTNT would come up a with solution that allows you to share a interface similar to the cisco ASA & across multi-contexts.
PCNSE
NSE
StrongSwan
lets hope they have a solution for this kind of situation for FortiOS 5.6 which is scheduled for Q1 2017.
I asked for virtual routing tables when they planned 5.4
FCNSA, FCNSP
---
FortiGate 200A/B, 224B, 110C, 100A/D, 80C/CM/Voice, 60B/C/CX/D, 50B, 40C, 30B
FortiAnalyzer 100B, 100C
FortiMail 100,100C
FortiManager VM
FortiAuthenticator VM
FortiToken
FortiAP 220B/221B, 11C
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1688 | |
1087 | |
752 | |
446 | |
227 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.