Hello Toshi, I dont have device access as of now, but below is what I have configured
config system interface edit "wan2" set vdom "root" set mode ppoe set allowaccess ping https fgfm set type physical set role wan next
edit "wan2.7" set vdom "root" set mode pppoe set allowaccess ping https fgfm set device-identification enable set monitor-bandwidth enable set role wan set username xxxxxxxxx set password xxxxxxxx set interface "wan2" set vlanid 7 next
config router static edit 11 set dst 0.0.0.0 0.0.0.0 set gateway x.x.x.x set device wan2.7
First, remove pppoe from wan2. Only thing you want to configure is changing the default dhcp to static so that it won't pull any IP on the non-tagged interface. Leave the rest unchanged.
VLAN 7 interface seems to be ok.
If it still doesn't work, sniff packets at "wan2.7" if you can see any meaningful traffic. If not, sniff it at "wan2" interface to see if it's actually tagged with VLAN 7. Below is the output on my 40F. All traffic is tagged with VLAN 201 (Lumen).
One more thing. PPPoE generally pulls the default route into routing-table. If you DON'T want it but want to use a static route, you need to set "set defaultgw disable" on "wan2.7" interface. But I would suggest removing the static default route first and let PPPoE pull the default GW.
Once you confirmed it's working, you can change it to manipulate the default route(s) with static ones.
By the way, the current static route is technically illegal or conflicting with your interface config. If PPPoE, there shouldn't be a static gateway because PPPoE pulls it. Instead it needs to have "set dynamic-gateway enable". That's why I'm suggesting removing it.
It seems like there might be an issue with PPPoE configuration on the Fortigate 60F, possibly related to interface settings or credentials. Double-check the configuration to ensure accuracy and try troubleshooting the PPPoE setup.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.