Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
FXLEWIS
New Contributor II

Fortinet 40F basic setup / connecting to the Internet

Hi -

New to FortiGate and a firewall newbie as well.

 

Current layout

 

Verizon FIOS G3100 router

  • 3 SSIDs
  • 1 with WPA2 @ 2.4 GHZ (legacy)
  • 1 with WPA2 @ 5 GHZ (legacy)
  • 1 with WPA3 # 5 GHZ
  • WAN IP 98.113.x.x (obviously not providing my WAN IP to the public - no offense) 
  • Internal IP 192.168.1.1/24 internal network

 

Forti40F

  • I created 3 SSIDs to match what the G3100 currently has
  • SSID_1 - 10.1.10.1/255.255.255.0
    SSID_2 - 10.1.20.1/255.255.255.0
    SSID_1 - 10.1.30.1/255.255.255.0
  • LAN 1 on the Forti still has the factory IP 192.168.1.99

 

I tested connectivity to each SSID successfully from a laptop but with no WAN connection just to verify security and connectivity to the wifi.

 

I unplugged the G3100 and plugged in the WAN connection to the FortiNet

 

The FortiNet leased a 98.113.x.x address.

 

I tried getting to the Internet with no success.

 

So questions because I am doing something wrong.

 

  1. Does it make sense to to change the IP for the LAN 1 interface to 192.168.1.1 /24?
  2. Do I need to setup static routes from the 10.1.x.x/24 networks and if so what would be the default route?

Sorry to be a noob but you have to learn somewhere :)

 

11 REPLIES 11
GG-USMC
New Contributor

I am assuming that you have already created a static route to the outside for all unknown traffic and also created a security policy for your wireless subnets from the internal interface to the outside interface and also enabled NAT for the internal subnets on that security policy?

FXLEWIS
New Contributor II

I am assuming that you have already created a static route to the outside for all unknown traffic.

NO.  Would that be destination 0.0.0.0 / 0 going to my WAN IP as the gateway on my WAN interface?

and also created a security policy for your wireless subnets from the internal interface to the outside interface

YES

and also enabled NAT for the internal subnets on that security policy?

YES

Labels
Top Kudoed Authors