Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
PCNSE
NSE
StrongSwan
By using the above diagram, we also put port forwarding unfortunately we have failed response. Any idea?
On cisco switch we had 2 vlans, our network design is also the same.
Thanks
Hi all,
I have same issue by using the above diagram with fortigate 100D, just internal network can access to internet.
My network:
VLAN1: 192.168.40.0/22 ( management vlan)
VLAN10: 172.16.142.0/24 ( Office vlan)
Could you tell me which steps i need to config on mine fortigate 100D to all of vlan can access to internet.
I had configured but they not work, on Switch Alcatel OS6860E i configured trunk link.
- create interface vlan10 on Lan interface
- create static route from vlan 10 to vlan 1.
- create policy from vlan 10 to all
Open a new thread on this. I speak Alcatel and can help you.
I will say this to you and anyone reading. It is very poor policy to:
* Use the IP segments 192.168.(0-3).x/24 on any gear. Too many manufacturers default their gear in this range and you will run into conflicts down the road. You have literally thousands of private subnets to choose from. (Google "RFC 1918") This one doesn't apply to you here.
* Use VLAN 1 on any network. Never use VLAN 1 for the same reason. Most manufacturers default their gear with this VLAN number and you will probably run into issues down the road.
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
Thanks rwpatterson for your advice.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1633 | |
1063 | |
751 | |
443 | |
210 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.