Would like to set up Fortigate 40F to manage two independent (not interconnected) switches.
One switch located in home office space.
Other switch located near printers and entertainment devices.
There is little traffic between the switches. Occasionally traffic between office and printers;
Have already re-allocated lan3 from the hardware switch to the fortilink 802.3ad interface; and disabled the split link interface on fortilink.
Even so, only one switch shows as online at a time.
hardware / OS:
1 FortiGate 40F FortiOS v7.0.5
1 FortiSwitch 108E v7.0.3
1 FortiSwitch 108F v7.0.3
FG40F port lan3 - FS108E port 8
FG40F port a - FS108F port 8
current fortilink configuration:
config system interface
set vdom "root"
set fortilink enable
set ip 192.168.4.1 255.255.255.0
set allowaccess ping fabric
set type aggregate
set member "a" "lan3"
set lldp-reception enable
set lldp-transmission enable
set snmp-index 6
set auto-auth-extension-device enable
set fortilink-split-interface disable
set switch-controller-nac "fortilink"
set switch-controller-dynamic "fortilink"
set swc-first-create 255
Can this be done using a single fortilink interface? If so, what configuration changes are needed?
Does a second independent 802.3ad aggregate and/or fortilink interface need to be added? Is this even possible? (I'm not afraid of the CLI interface; but I need to know what to enter.)
What relevant documentation exists to address this specific question?
Bob a home office user