Hey everybody,
Is it possible to add the interfaces from a FortiSwitch FS-108D-POE (3.6.2) to a software switch on a FortiGate-60E (5.6.2)?
I'm assuming no, as I've doing some pretty extensive Googling and came up empty.
Or, does the 60E just not support it?
Thanks in advance for the help!
bks
(Posting in FortiGate forum as well...)
FortiGate-60E, 2 x FortiAP-224D, FortiSwitch FS-108D-POE, FortiRecorder-100D, 3 x FortiCam-FD40
bshimkus wrote:Hey everybody,
Is it possible to add the interfaces from a FortiSwitch FS-108D-POE (3.6.2) to a software switch on a FortiGate-60E (5.6.2)?
I'm assuming no, as I've doing some pretty extensive Googling and came up empty.
Or, does the 60E just not support it?
Thanks in advance for the help!
bks
(Posting in FortiGate forum as well...)
Hi Bshimkus,
I am not sure if that is possible possible, to increase the port density of a FortiGate by using ports from the fortiSwitch.
Why would you like to do it?
Also be aware that software switch might create loops, in case you make wrong cable connections from the FortiGate to the same fortiSwitch.
Thanks & regards,
Prab
The use case was to basically extend my FG60E switch ports to the FS-108D-POE so that I wouldn't have to mess with VLANs, multicast policy, etc.
I had separate broadcast domains for wireless, Fortigate, and Fortiswitch clients, but due to my lack of experience with Fortinet products, it proved to be more complicated than it was worth. Devices that relied on Bonjour (or other multicast requirements) simply didn't work unless I put all devices in the same broadcast domain (hence, the software switch combining wireless and wired interfaces all together). I tried numerous multicast policies allowing traffic between them all, but it just didn't cooperate.
I ended up setting the FortiSwitch as unmanaged (in the aspect of not using FortiLink).
I agree that creating loops could be a possibility in the software switch scenario. Given that the environment is so small, it's a concession I've made.
I'd really like to re-engineer the whole setup, however I doubt the users will give me enough grace to figure it all out. :)
bks
FortiGate-60E, 2 x FortiAP-224D, FortiSwitch FS-108D-POE, FortiRecorder-100D, 3 x FortiCam-FD40
bshimkus wrote:The use case was to basically extend my FG60E switch ports to the FS-108D-POE so that I wouldn't have to mess with VLANs, multicast policy, etc.
I had separate broadcast domains for wireless, Fortigate, and Fortiswitch clients, but due to my lack of experience with Fortinet products, it proved to be more complicated than it was worth. Devices that relied on Bonjour (or other multicast requirements) simply didn't work unless I put all devices in the same broadcast domain (hence, the software switch combining wireless and wired interfaces all together). I tried numerous multicast policies allowing traffic between them all, but it just didn't cooperate.
I ended up setting the FortiSwitch as unmanaged (in the aspect of not using FortiLink).
I agree that creating loops could be a possibility in the software switch scenario. Given that the environment is so small, it's a concession I've made.
I'd really like to re-engineer the whole setup, however I doubt the users will give me enough grace to figure it all out. :)
bks
I am too not a multicast fan, I once had a similar problem. I was not able to pass the multicast traffic between two different VLANs. However in this case the gateway was a sonicwall, although I had a IPv4 policy which allowed everything between two VLANs. :D
I am not sure if you have to play with the frame size etc.
I would open a support case here, to really figure out the cause.
Good luck.
Thanks & regards,
Prab :)
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1740 | |
1108 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.