- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Fortinet 40F basic setup / connecting to the Internet
Hi -
New to FortiGate and a firewall newbie as well.
Current layout
Verizon FIOS G3100 router
- 3 SSIDs
- 1 with WPA2 @ 2.4 GHZ (legacy)
- 1 with WPA2 @ 5 GHZ (legacy)
- 1 with WPA3 # 5 GHZ
- WAN IP 98.113.x.x (obviously not providing my WAN IP to the public - no offense)
- Internal IP 192.168.1.1/24 internal network
Forti40F
- I created 3 SSIDs to match what the G3100 currently has
- SSID_1 - 10.1.10.1/255.255.255.0
SSID_2 - 10.1.20.1/255.255.255.0
SSID_1 - 10.1.30.1/255.255.255.0 - LAN 1 on the Forti still has the factory IP 192.168.1.99
I tested connectivity to each SSID successfully from a laptop but with no WAN connection just to verify security and connectivity to the wifi.
I unplugged the G3100 and plugged in the WAN connection to the FortiNet
The FortiNet leased a 98.113.x.x address.
I tried getting to the Internet with no success.
So questions because I am doing something wrong.
- Does it make sense to to change the IP for the LAN 1 interface to 192.168.1.1 /24?
- Do I need to setup static routes from the 10.1.x.x/24 networks and if so what would be the default route?
Sorry to be a noob but you have to learn somewhere :)
- Labels:
-
FortiGate
-
FortiGuard
-
Wireless Controller
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Update.
I changed the IP for the internal software switch to 192.168.1.1
I setup static default routes from each 10.1.x.x subnet to my WAN interface. Same for the 192.168.x.x subnet.
We'll see if this works.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Try one step at a time.
1) When you swapped the router to the 40F, make sure you can get to the inter net from the 40F itself (ping something from CLI). If works, the default route is fine.
2) Connect your laptop or desk top directly to one of available lan ports or a switch behind. Make sure it pulled a lan IP over DHCP, then try reaching the internet. If that works, the NAT policy is fine.
3) then finally test from a WiFi client. You said you configured on the 40F. That means either you have a FortiAP(s) connected to it. And those must be tunnel mode SSIDs. Traceroute toward the internet from the client to see it at least shows the 40F's IP.
One thing you're misunderstanding is the default route is not per lan/wifi subnet. 40F needs only one. Each client needs to know only the GW IP 10.1.x.1 on the 40F. Then, the 40F needs to know where to send the traffic from the clients if the destination of the packet is not local, which is the default route/default gateway. If the WAN circuit is DHCP or PPPoE, the 40F would pull it automatically from the ISP. Only if it's static, you have to configure static default route on the 40F under Network->Static Routes in GUI. This part should be exactly the same with the FiOS router.
Toshi
Created on ‎11-05-2023 11:02 AM Edited on ‎11-05-2023 11:02 AM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Toshi -
First, thanks for responding.
1) When you swapped the router to the 40F, make sure you can get to the inter net from the 40F itself (ping something from CLI). If works, the default route is fine.
Successfully pinged GOOGLE.COM from the 40WF using the CLI
2) Connect your laptop or desk top directly to one of available lan ports or a switch behind. Make sure it pulled a lan IP over DHCP, then try reaching the internet. If that works, the NAT policy is fine.
Connected my laptop to the 40F on port 1. Verified the laptop leased an IP from the 40F. Successfully pinged the gateway. Unsuccessful pinging GOOGLE.COM.
I know to set the NAT policy I need to go into Firewall Policy / Create New and I believe for my purposes, create Static SNAT. I don't have a pool of IPs from my ISP so I don't need a dynamic snat and for the sake of simplicity for now I don't think I need a central SNAT.
So I'm doing something wrong in my NAT policy.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
It's called "overload" with the interface IP. GUI setting in the policy is below (this is 7.0.13).
When you test it, ping like 8.8.8.8, not Google.com. It could be your machine's DNS setting issue if you ping host name/FQDN and can't get to.
Toshi
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Toshi -
Making progress. Never heard of "overload". I figured pinging by name would prove DNS works as well as connectivity. I did repeat successfully with pinging by IP so ICMP works.
I created policies for all 3 SSIDs and was successfully able to connect to each and reach websites from my laptop connected to each SSID.
I created a policy for the "internal" interface and I was able to access the Internet from ports 1 and 2 using my laptop connection. Need to test 3 and 4 but ran out of time.
Am I correct that my policy should use the internal interface for the switch connection to the Internet?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Are you sure it's really FortiGate 40F? If so, the default hard-switch interface on the 40F should be "lan". Did you rebuild the hard-switch interface with the name "internal"? Or did you crate a new software switch and included all lan and SSID1-3?
Either way, all 4 LAN ports are under "internal" so you don't have to test indivitual ports. If one port works, the rest should work as well. And your policy should be fine.
Toshi
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
It''s a WiFi40F.
I did not rebuild the hard-switch interface. I reset the FW to factory defaults once to start new.
The reference I see to a LAN interface is when I go into the policy and choose my incoming interface. I can choose INTERNAL or LAN.
Interface options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
If it's FWF40F, as in the datasheet, it supports only one/single RADIO. So either 2.4GHz or 5GHz, not both.
https://www.fortinet.com/content/dam/fortinet/assets/data-sheets/fortigate-fortiwifi-40f-series.pdf
Toshi
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
And the Address:internal (which is a separate object, different from interface) was automatically set (probably by default) with 192.168.1.0/24. Unless you change the interface:internal" config, you can't change it.
Those physical "lan1", "lan2", "lan3" and "lan4" interface are combined in "lan" hard-switch, which you might not be able to see in GUI but under "config system virtual-switch" in CLI.
Then there should have been a default wifi interface like "wifi" after a factory reset, which you might have removed. Those "wifi" and "lan" interface should be combined into the "internal" software switch interface by default.
Toshi
