Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
ratha_chum
New Contributor

Intervlan Routing

I have problem VLAN routing on fortigate 60D. I have create 2 subinterface (vlan100 and 200) in internal interface and cisco catalyst 2960s I have create 2 vlan (vlan100 and 200) with a trunk interface. and configure policy and firewall object for internet access, for vlan 100 can access internet and network is working normally, but vlan 200 cannot communicate with fortigate. I have verify that trunk interface is correctly configure on Cisco Switch. for topology as the image attachment here. Could anyone can recommend me what is missing, while one vlan is working normal and other vlan cannot communicate with fortigate. Thank for support
6 REPLIES 6
hklb
Contributor II

Hello, Could you please post your configuration of cisco switch port FA0/24 ? and port internal of your fortigate ? You probably a vlan mismatch..
emnoc
Esteemed Contributor III

Also include the output of the show mac add dyn int fas 0/24 you should see the same mac_address for vlan100/200 of that of the forttigate Also a show int fas 0/24 trunk would validate you are trunking and spanning the vlans. ut if I had to guess you didn' t allow the other vlan over the trunk. Your cfg should be like this; (cisco) interface fas 0/24 description to fortiagte port XYZ switchport switchport trunk allowed vlan 100.200 switchport mode trunk logging event link-status logging event bundle-status logging event spanning-tree status load-interval 30 spanning-tree link-type point-to-point fortigate config sys interface edit vlan100intf set vdom root set type vlan set vlanid 100 set ip a.a.a.a.a/xx set interface port1 next edit vlan200intf set vdom root set type vlan set vlanid 200 set ip b.b.b.b/xx set interface port1 next

PCNSE 

NSE 

StrongSwan  

PCNSE NSE StrongSwan
cool01
New Contributor

By using the above diagram, we also put port forwarding unfortunately we have failed response. Any idea?

 

On cisco switch we had 2 vlans, our network design is also the same.

 

 

Thanks

hung_hoang

Hi all,

I have same issue by using the above diagram with fortigate 100D, just internal network can access to internet.

My network: 

VLAN1: 192.168.40.0/22 ( management vlan)

VLAN10: 172.16.142.0/24 ( Office vlan)

Could you tell me which steps i need to config on mine fortigate 100D to all of vlan can access to internet.

 

I had configured but they not work, on Switch Alcatel OS6860E i configured trunk link.

- create interface vlan10 on Lan interface

- create static route from vlan 10 to vlan 1.

- create policy from vlan 10 to all

 

 

 

rwpatterson
Valued Contributor III

@hung.hoang@omnitec

 

Open a new thread on this. I speak Alcatel and can help you.

 

I will say this to you and anyone reading. It is very poor policy to:

 * Use the IP segments 192.168.(0-3).x/24 on any gear. Too many manufacturers default their gear in this range and you will run into conflicts down the road. You have literally thousands of private subnets to choose from. (Google "RFC 1918") This one doesn't apply to you here.

 

 * Use VLAN 1 on any network. Never use VLAN 1 for the same reason. Most manufacturers default their gear with this VLAN number and you will probably run into issues down the road.

Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com

Bob - self proclaimed posting junkie!See my Fortigate related scripts at: http://fortigate.camerabob.com
hung_hoang

Thanks rwpatterson for your advice.

Announcements

Select Forum Responses to become Knowledge Articles!

Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.

Labels
Top Kudoed Authors