Hi,
Our topology is quite simple -
40F Firewall connected to POE FortiSwitch, 5x831F and 2x221F Access points connected to the FortiSwitch.
The FortiSwitch and APs are managed via the 40F Controller.
The 40F Firewall on a different interface is connected to Cisco Switch for RJ45/Cable connections, which is connected to more switches etc.
From the idea of not wasting overhead for CAPWAP Tunnel mode, the SSID's have been configured as Local switching, the interface terminates on the firewall.
I've been asked to extend the STAFF SSID's VLAN to the Physical network - and I see that there are 2 options to do it - the first is to connect the FortiSwitch to the Cisco Switch to span the L2.
the second option would be to create a Software Switch, configure the SSID to use tunnel mode and terminate it on the interface connected to the software switch.
question is - would it have negative effect on performance ?
Hello,
Using a software switch in conjunction with a CAPWAP tunnel mode can potentially have some negative effects, primarily related to performance:
To mitigate these effects, ensure that the network is properly configured to handle the expected traffic load, and consider using hardware-based solutions where possible to improve performance.
Additionally, configuring CAPWAP IP fragmentation control settings can help prevent packet fragmentation issues.
Hope it helps.
Regards,
Hi Anthony,
thank you the information and prompt response.
I was worried about damaging the performance.
is there any other way to span an interface/VLAN over the physical ports of the 40F and over the FortiSwitch while using the interface to manage the switch ?
User | Count |
---|---|
2571 | |
1365 | |
796 | |
652 | |
455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.