Hello!
I have a Fortinet 60D on a multi-VLAN network environment. Is it possible to make the bellow settings, where port 1 is for all VLANs trunk, and the others ports I can choose what vlan to assign?
PORT 2 (vlan 10)-----DESKTOPS | | PORT 3 (vlan 20) ------SECURITY CAMERA | | | | PORT 4 (vlan 20)------SECURITY CAMERA | | | | | | PORT 5 (vlan 50) ------WIFI | | | | ::::::::::::::::::::::::::::::::::::::::::::::::::::: :::::::::: FORTINET FIREWALL :::::::::: ::::::::::::::::::::::::::::::::::::::::::::::::::::: | PORT 1 of Fortinet (TRUNK PORT) | | | <<< TRUNK CHANNEL (with all vlans passing throught 10,20,50) | | SWITCH (L3, ROUTING ENABLED) | | ...rest of the network...
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
I highly doubt that, the device is not a real l2 802.1q switch. You can terminate vlans 10,20,30,40,50 etc... on a sub-interface bound to a port, but to pass all vlan collectively out a trunk port is not plausible
is this firewall running transparent mode?
PCNSE
NSE
StrongSwan
emnoc wrote:I highly doubt that, the device is not a real l2 802.1q switch. You can terminate vlans 10,20,30,40,50 etc... on a sub-interface bound to a port, but to pass all vlan collectively out a trunk port is not plausible
is this firewall running transparent mode?
Yes it is in Transparent Mode since the switch is doing the vlan Routing.
I am able to create on interface1 multiple subinterfaces and assign IPs like 192.168.10.254 / 192.168.20.254 /192.168.50.254. Then I changed the switch port to trunk mode and connected to the interface1 with that subinterfaces. It worked well for those machines connected to switch who are in the same vlan, they can ping the subinterfaces. But I don´t know what a have to set on interface2 to interface7 to place the end devices on any of the 3 VLANs created before.
From your topology. You may try to setup like below:
Enable VDOM and create VDOM, same number as your VLAN number.
For example,
Create Vdom1 , change to TP mode , Create VLAN 10 interface on port1 (trunk port ), assign to Vdom1
assign port2 to Vdom1. Create policy on Vdom1 , permit traffic port2->VLAN10.
Thanks.
Trying to make the thing more simple, I followed this tutorial from Fortinet for at last the diferente vlans can access the internet: http://docs-legacy.fortinet.com/fos50hlp/50/index.html#page/FortiOS%205.0%20Help/VLANs.103.17.html
But even making the procedures it is not possible to go out to internet. I took some prints of my Fortigate and my HP switch that has the VLANs and the routes pointing to Fortigate.
(I made a more simple lab with just Vlan 10 and Vlan 20)
Suggestion
Try drawing a topology sheet with the ports and vlans that you are using between the in/out members. This might give use a better example of what your doing or trying to do.
PCNSE
NSE
StrongSwan
emnoc wrote:Suggestion
Try drawing a topology sheet with the ports and vlans that you are using between the in/out members. This might give use a better example of what your doing or trying to do.
First objective:
- PCs on VLAN 10 and 20 use the ISP A
ON HP SWITCH:
- I created VLAN 10 with IP 192.168.10.1 - I created VLAN 20 with IP 192.168.20.1 - Assigned port 10,14 to VLAN 10 - Assigned port 20,24 to VLAN 20 - Assigned port 1 to trunk, tagged VLAN 10 and 20
[The switch created the vlans routes itself after that]
- Then I created two default routes, poiting to fortigate subinterfaces, one for each VLAN: 0.0.0.0 0.0.0.0 192.168.10.254 0.0.0.0 0.0.0.0 192.168.20.254
[For some reason the route 0.0.0.0 0.0.0.0 192.168.20.254 does not appear in the routing page..but is really set on it]
ON FORTIGATE:
- Created two subinterfaces vlan: Vlan 10 = 192.168.10.254 and Vlan 20 = 192.168.20.254 - Created the address for 192.168.10.0/24 and 192.168.20.0/24 - Set the WAN1 with ISP A PPPoE settings - I did´t touch at the Static Routes options - Created Policy for VLAN 10 and 20 go out to internet by ISP A with NAT enabled
Try to set up VLAN interface on FGT's DMZ port, it should works.
FG60D "internal" combined port1/port2... as switch port by default.
Or you can remove default policy/dhcp server /static routes associated with "internal" interface, change to "interface " mode, then set up port1 as you mentions. Thanks.
[The switch created the vlans routes itself after that] - Then I created two default routes, poiting to fortigate subinterfaces, one for each VLAN: 0.0.0.0 0.0.0.0 192.168.10.254 0.0.0.0 0.0.0.0 192.168.20.254
I wouldn't do this but that's your call. I would just pass the vlans 10/20 thru to the HP and use the HP switch as a layer2 switch. The reason why one of the 2 is in your HP route table is probably due to it doesn't have ECMP function and the lower_ip_address gw of 192.168.10.254 is the preferred route.
now back to your diagram, on the wan port to ISPA is your goal is to pass these 2 vlans 10/20 out thru that port?
you answered my 1st question of this is a layer2 transparent firewall?
Yes it is in Transparent Mode since the switch is doing the vlan Routing.
Is this not the case?
Emnoc is really confused ;) If this is a layer2 transparent firewall design, your device would not be using "routing" for carrying customer traffic.
Want I would do if vlans 10/20/40/50 are to being carried, is to
1: trunk them on your HP SWITCH PORT #1
2: Pass these out to WAN1 port
now if your really needing NAT/ROUTED mode, which I think that's what you really need. Than do what you have done already on the HP, terminate your SVI Layer3 interfaces for vlan 10/20/40/50
And then place a /30 or whatever between the HP port1 to FGT PORT1. Assign the FGT a address and the HP will use that as it's next-hop gateway to the ISPA. Than you can perform SNAT and controls from the HP internal LANs out to the internet ( your FGT is the gatekeep per se ).
This will not allow for filtering between VLANs localize to the HP. If you need filtering between vlans defined on the HP
e.g
allow wifi to desktop
allow desktop out to wan
but deny camaras to the wan
and allow wifi to the wan only
than you probably want the Layer3 interfaces nailed down on the FGT. You can do this with subinterfaces and vlans tags
e.g ( using port #1 on the FGT )
config sys int
edit L3-10
set vdom root
set alias DESKTOP
set vanid 10
set ip 192.168.10.254/24
set type vlan
set interface port1
next
edit L3-20
set vdom root
set alias SEC_CAMS
set vanid 20
set ip 192.168.20.254/24
set type vlan
set interface port1
next
edit L3-50
set vdom root
set alias WIFI
set vanid 50
set ip 192.168.50.254/24
set type vlan
set interface port1
next
end
And on the WAN you config your current l3 address that you posted earlier in the diagram. Than apply the correct firewall policies to allow traffic from vlan2vlan or vlan2 wan
Please advise if this makes any sense and what mode your are deploying routed or transparent. I think you really trying todo routed mode
PCNSE
NSE
StrongSwan
Yes, the firewall is in NAT mode, sorry.
First I want to be able to do a really simple thing: just vlan 10 and 20 go to internet. See my tests:
- I set the HP with just one Default Route: 0.0.0.0 / 0.0.0.0 / 192.168.10.3 where this 10.3 is my wireless router that is connected to ISP A. Than I connected the port 10 (is vlan 10 untagged) to the wireless router. What happened? the internet worked perfect for machines on vlan 10 and vlan 20.
So what I did after that result: changed the fortinet interface INTERNAL to 192.168.10.254 and removed all vlans.
Than I connected the firewall to port 10 (vlan 10 untagged) on switch. I removed from HP the previously default route and added a new one pointing to the firewall 192.168.10.254.
I tryed to add a route on Fortigate > 192.168.10.0 /24 to 192.168.10.1, not worked.
Created a policy "any any any any permit NAT", not worked.
Created address 192.168.10.0/24, not worked.
Using the Fortigate CLI and execute ping google.com, it pings normally, so the WAN interface is working good. Using ping from HP Swtch to 8.8.8.8, not works.
Making all this settings don´t works yet :(
I have to be able to at least try to connect t something to internet passing by the firewall to than be able to do the other things that I asked on the first post...
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1712 | |
1093 | |
752 | |
447 | |
231 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.