Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
1) i have a fortigate & a core switch 2) they are having several vlan configured on the core switch included vlan for voice 3) right now intervlan routing if being done on the core switch 4) if we need to install fortigate as firewall how we can simply the config to the best way 5) i have several server on a specific vlan and also some server web server will need to access from outside on the internet. 6) i have also some vpn users who will need to access the internal resources from outside the network 7) The important thing also if i want to block certain users from a specific vlan not to access other vlan if it will be possible.item #1 what your asking is all simple. for vpn access you want to probably use SSLvpn and define user-groups. You could control someone the same thing with ipsec to some degree Do you want the firewall to have a downlink to the core ? and keep inter-vlan routing on the core? Remember with any RA-access, once a end users get' s access on that server, he/she has access to everything that server would have access , as-if a lcoal user on the console. So police and organize the fwpolicies fo lacp that' s no problem, just grab your 2 links and set them as a virtualinterface and and apply the fwpolocies to that virtual link. Do a search here with me as author, numeours examples has been posed for virtual-link that are LACP and the cfg is simple.
PCNSE
NSE
StrongSwan
1) i have a fortigate & a core switch 2) they are having several vlan configured on the core switch included vlan for voice 3) right now intervlan routing if being done on the core switch 4) if we need to install fortigate as firewall how we can simply the config to the best way 5) i have several server on a specific vlan and also some server web server will need to access from outside on the internet. 6) i have also some vpn users who will need to access the internal resources from outside the network 7) The important thing also if i want to block certain users from a specific vlan not to access other vlan if it will be possible.ad. 4 & 7 You should be more specific about which internetwork segments need to be firewalled. If vlan 10, vlan 20, vlan 30 represent intranet logical segments and if they are to be separated with a firewall, then you have two distinct options: 1- core switch as a L3-L4 FW In point 3) you specify that inter-vlan routing is performed in the core switch. Keeping that fair design, just create access-lists in that switch and bind them to respective vlan interfaces (SVIs). Your intranet traffic will then avoid the inefficiencies of router-on-the-stick. The downside may be poor managability of multiple access lists with multiple access entries and lack of L7 firewall if you care. 2- Fortigate as intranet firewall This design basically reverses the pros and cons of the option 1 but suffers some scalability issues due to router-on-the-stick. Consider that to divert local traffic away from current inter-vlan routing, you need to delete SVIs on your core switch actually relocating them onto your FortiGate, set up a 801.1q between the core and FortiGate and use FortiGate vlan interfaces as default gateways for your segments. Best practice in scalable designs is to keep UTM (Fortigate) for Internet/DMZ/LAN only and a separate FW for intranet. What brand/model is your core switch device?
But i think you did not get me what i want exactly to achieve. And for the question 7 no answer for that.I know actually what you want. The topology diagram makes it even more clearier. I think RafaIS , summed up your dilema quite well. Your asking the wrong question in regards to using the firewall as a controlling devices for inter-vlan routing on the core switch. If you want todo it on the FGT; than that' s fine enable L3 interfaces for the clans and a 802.1q trunk and even better yet, a LACP 802.1q trunk back to the core and more are L3 SVI from the core switch into the FGT. Keep in mind; packets that travel the wire twice , is probably not good for performance. Managing L3 ACLs is probably not idea, either and I' m not sure of what switch you have but a ZBFW ( zone base firewall ) might not be doable. If you have let' s a 6500 with a FWSM ( firewall service module ) you could do your internal firewall within the core and the FGT would handle traffic destine outbound to the internet. You have so many options and choices, but you would have to determine where and how you want to go about. another choice might be one of the Fortinet Switches, I think they have a means for some type of firewall policies deploy iirc. But to be quite frank have sued enough of them and not overly impressed with them to begin with.
PCNSE
NSE
StrongSwan
PCNSE
NSE
StrongSwan
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1660 | |
1077 | |
752 | |
443 | |
220 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.