I would focus on physical paths to get to each group of devices you listed. Then let the switches do switching and cable management as much as possible. Since an 100E has enough ports, you could separate all to individual ports if you want, but I prefer combining them into fewer ports with vlans and connect them to switches then break them up using access ports before going out. Vlans are logical interfaces in a FGT so you can apply policy independently just like a physical port.
What I wouldn't do is secondary ips, which would mix up broadcast domains and create problems with DHCP servers and other issues.
Dear Toshi,
Thank you for your response and advise, I will certainly run the CCTV on it's own physical interface with access ports as I know cctv can put strain on the other networks. One more thing that I would like to clarify, if I have subnet 10.1.0.x/24 with a vlan 10.3.0.x/24 and I configure these with a policy route to see each other, will their dhcp servers hand out IP's to all clients or only clients on the matching subnet. Thank you for the assistance.
First, you don't need any additional routes to route between directly connected subnets. You just need a policy. Not a policy route.
DHCP server works on each broadcast domain. Vlans separate them.
Just to show you - this is how I do this here.
I run Fortigates (also 100Es mainly) here at HQ and in our shops all over germany. Each shop has several subnets for different purposes (cash desks, wlan, ...) just like at your side.
I always have one main net that is used for clients and for some servers that need to be in the same subnet (like DCs e.g.) and the rest are just vlans on the port where the main net is.
Since vlans are logical interfaces they behave like any other port on a FGT.
I then just do policies to let them have internet over the WLLB or access something in some other subnet. Also I run redundant IPSec Tunnels fro HQ to the shops to be able to transfer data and do maintenance.
In this case all routes I need is at shop side: a default route for internet and a route to the HQ SUbnet(s) that goes over the IPSec. The rest on this side does have interfaces (Logical or physical) and with that autmagically does have a net route the FGT knows. So for these no route need to be set up manually.
HQ then needs routes to the shop subnets that go over the ipsec and a default route for internet.
Additionally you of course need a bunch of policies on both side to rule who should get where :)
With that all subets a physically divided and cannot basically not affect each other (but they can affect the internet lines ;) ). The disadvantage of this is that you need vlan capable switches to be able to tag a vlan to a specific client or you would have to have the client do the tagging (which not every client is able to).
Maybe this helps you making you decision :)
cheers
Sebastian
--
"It is a mistake to think you can solve any major problems just with potatoes." - Douglas Adams
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1740 | |
1108 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.