Hi all,
I have a large LAN ReDesign Project. I will Change all Aruba Switches, which are EOL to new FortiSwitches. With this Change I will Change the IP-Subnets, too. My Concept is, that all FortiSwitches get a own VLAN. For CoreSwitch I choosed a FortiSwitch 1048E, which I connected to the free 10 GBit/s X2 Port on the Fortigate. So I configured the X2 Port with the following IP-Config:
10.100.99.1 / 24
Receive LLDP: Enable
Transmit LLDP: Enable
Administrative Access: HTTPS, SSH, PING, FMG-Access, FTM, Security Fabric Connection
I configured the FS1048E with the IP-Adress 10.100.99.2 / 24. I leaved a small Config first time. I connected the FS1048E on the X2 Port of Fortigate, but I can´t reach the FS1048E. Administrative Access on the FS is HTTPS, SSH, PING. I tried to ping the Fortigate from CLI of FS1048E but I can´t reach it. I tried to ping the FS1048E from Fortigate CLI and can´t reach the FS1048E, too. Normally it is an easy job, but in this time I don´t understand an I don´t find the problem. I only configured the IP-Config on the FortiSwitch for the first time to check the network connectivity, there is nothing else configured on the switch. I resetted the Switch for 5 times but no affect.
For your Information: I don´t want to use Fortilink and manage all switches over the Fortigate. This is no solution for me. We want to manage all switches as Standalone and configure them over their own internal interface.
Can you help me please? Do you need more / detailed information?
Thanks a lot
Kurt
Hello,
Thank you for using the Community Forum. I will seek to get you an answer or help. We will reply to this thread with an update as soon as possible.
If anyone knows anything about this topic, please feel free to contribute!
Thanks,
Hi,
We're still looking for an answers or help. In the meantime, if anyone has any input on the topic, it's very welcome!
Hi Kurt,
I am assuming that you have given IP of 10.100.99.2 to the FortiSwitch's internal interface and not the SVI.
In that case, when we connect 10.100.99.2 to FGT X2 interface 10.100.99.1, the traffic will flow as untagged vlan.
Usually this should work, but on the FortiSwitch, we have below config (assuming FSW on latest version):
config switch auto-network
set mgmt-vlan 4094 ---> change this to 1
set status enable --> disable this (as FSW is in standalone mode)
end
Now, check the internal interface config:-
FSW# config switch interface
FSW(interface) # edit internal
FSW(internal) # sh full-configuration
set native-vlan 4094 --> if you see this, change this to native vlan 1 (by default its 4094 reserved for fortilink/Managed FSW, thats the reason reachability issue between FGT-FSW as vlan was 4094)
end
Refer this article: Configure IP parameters on out of box sta... - Fortinet Community
User | Count |
---|---|
2561 | |
1357 | |
796 | |
650 | |
455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.