Hi All,
As per subject above our client is using Fortigate 100D as a router on the stick with multiple sub interface VLAN
Their objective or planning is to block same segment traffic on one of the VLAN, example creates a policy to block all PC communication within the sub interface VLAN1.
Does this policy or method achievable?. Thanks
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
You want to block traffic within a VLAN which is connected to the FortiGate? That's not possible, because the layer 2 traffic is not going to/through the firewall if it's only in the same VLAN. You would need to configure this on the switch where the PCs are connected to. Maybe checkout this link: [link]https://en.wikipedia.org/wiki/Private_VLAN[/link]
I just thought you could force the hosts to use routing, thus involving the FGT as their router.
Specify the host's address as "a.b.c.d/32", and it's default gateway as the FGT VLAN port address. I wonder if that would work...
Of course, oheigl is right in stating that intra-VLAN traffic is on Layer2 and so the FGT is not involved. Controlling connections by application on the switch would be a quite advanced feature for such a device. Maybe you can get away with specifying the ports used (like tcp/135, 137, 138, 139, 445)...
Really interesting view Ede, I wonder if that's going to work, because how can he reach the gateway IP address if it's not in the same subnet (/32 only has the one host, so theoretically he can't access anything other than itself).
I don't mean by application in this case, just that the clients can only access the physical port where the FortiGate is connected to. I saw this configuration once at a customer's site, he did only allow the servers in a VLAN to reach the monitoring server and nothing else, if you want to filter on application basis my suggestion is useless tough
ede_pfau wrote:I just thought you could force the hosts to use routing, thus involving the FGT as their router.
Specify the host's address as "a.b.c.d/32", and it's default gateway as the FGT VLAN port address. I wonder if that would work...
Of course, oheigl is right in stating that intra-VLAN traffic is on Layer2 and so the FGT is not involved. Controlling connections by application on the switch would be a quite advanced feature for such a device. Maybe you can get away with specifying the ports used (like tcp/135, 137, 138, 139, 445)...
If this is a working solution I guess you have to turn on "proxy arp" on the fortigate. Otherwise the traffic will be dropped due to wrong subnet-mask.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1712 | |
1093 | |
752 | |
447 | |
231 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.