Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
config system global set internal-switch-mode interface endwill probably not work as long as there is anything associated with internal port (DHCP and Firewall policy it was in the past) Afterwards it will reboot coming back with seperate ports. You can also create a trunk (802.1q tagged valsn on one interface), not sure whther this works with a internal switch so you can use DMZ, WAN1 or WAN2 for that (remember: This are only names). -> System ->interfaces - and hit " create" here you can enter you vlan ID give your FGT IP Adresses in each network, create policys from Network A -> B and B -> A and so on.. Fortigate will route the packets (but you need policys!)
You can do that. You need to create policy where you allow traffic between these networks (interfaces) and check off the NAT. It will create routing rule.
You can even put multiple sources and destinations in the policy so you don't need to create multiple policies for that.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1721 | |
1098 | |
752 | |
447 | |
234 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.