Hello All,
I have FGT600Ds(HA) vdom enabled with Fortilink to a Fortiswitch 448D FPOE and fortilinked to other switches (Stacking). I have been able to get this to work but just on one VDOM. I'm needing to be able to create VLANs on other VDOMs using these same stacked switches. Has anyone been able to implement FGT(MUTIPLE VDOMS)--forlink---fortiswitch?
thanks for your help in advance
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Hello Zhunissov4,
I had attempted this before the trend, what I'm finding is that you can't iauthorize the fortiswitches on multiple vdoms.
So i authorized the Fortiswitches on the root vdom then attempted creating VLAN interfaces for other VDOMs, when i attach an interface on that switch to the second vdom, it spins and spins and spins. I have to delete the vlan on second vdom to be able to manage the fortiswitches again. running firmware 5.4.1 and 3.4.2 on Fortigate and Fortiswitch respectively
Hello
I know this is very very old topic but I have to create something similar. The goal is to create infrastructure base on the FGT and many FS with 2 or 3 vdoms and distribute vdoms across this network. On the and I need assign part of the ports on every switches to different vdom, Is it possible on os 7.2 ? How to do this .
Concept
For any help, I'll be appreciated.
Even if it will be confirmation from Fortinet - "no it is not possible" :D
I could be wrong but if you "manage" FSWs from a FGT over fortilink, the FSWs are managed at the vdom the fortilink is terminated at. By default "root" vdom. Then all ports and VLANs you create from the switch-controller at the FGT specifically at root vdom would belong to the root vdom. So I don't think it's possible if "managed".
My recommendation if you have to use FSWs instead of other types of switches like Cisco, Juniper, HPE, or whatever, you configure them as "standalone" then they would work as any other types of switches, except some feature differences. Then you can do whatever you need to do, like setting up multiple VLAN sets and create clusters of ports with those VLAN sets then connect them to FGT's ports per VDOM.
Wait for other comments that deny my claim.
Toshi
It seems this doc says you can.
Created on 04-13-2024 10:17 AM Edited on 04-13-2024 10:19 AM
I see, then you can. Thanks @AEK
It would be much simpler if they're standalone though.
Toshi
Created on 04-14-2024 07:33 AM Edited on 04-14-2024 07:34 AM
from CLI is ok, In theory ports and vlans from different are shared via Fortilink, but I think it is a FGT bug in 7.2.7 because I see switch in vdom2 but I don't see ports in GUI.
this is view from root VDOM
and ports 3 and 5 are exported to other VDOM
but in other VDOM I should see this ports , but list is empty
from CLI config is fine.
Now will go to test policy and traffic
It seems like the resolved issue on 7.2.8.
937065 | On the WiFi & Switch Controller > FortiSwitch Ports page, FortiSwitch ports that are exported to non-root VDOMs are incorrectly shown as down. This is a GUI issue that does not affect the functioning of the exported ports. The correct port status can be seen on the port tooltip, or using the CLI. |
Try update your FSW to the latest patch 7.2.7 as well.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1661 | |
1077 | |
752 | |
443 | |
220 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.