Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
Secucard
New Contributor III

ZTNA within a 2 site setup (multiple offices)

Hi,

we play around with ZTNA and I am not sure, if I am to silly ;) or I have a single point of missing knowledge or misconfiguration.

 

Our Setup:


2 x FGT (HA) -> Fortiswitch (VLAN) <-- fiber, with transfernetwork --> FortiSwitch (VLAN) -> 2 x FGT (HA)

 

Some hints:

- we use a Fortiswitch on each site, we have a highspeed fiber ($$$) and this is just in place once, so for HA purposes on the FGT, we use this Fortiswitch,

- the VLAN is configured with same ID on both sites and dataflow works 

- we need at both site a full FGT cluster, to setup local ip settings, manage the local switches and can run both sites without interruptions if one site fails (we have a fallback route on site A to reach site B)

- first idea was, to manage *ALL* switches and networks from site (B), this would work, but then, we can not manage the setup on site (A) if there will be any problem with site (B).

 

And now, the fun begins...

We setup a simple EMS Cloud to fulfill ZTNA.

 

a) Normally, a ZTNA server setup is required for this. I played around with FortiOS 7.0/7.2/7.4. Hm :/. Only TCP is working, no loadbalancing, no UDP and no Port-range support is given. So, for many applications, this will not fit.

 

b) It is possible to work with Tags (MAC, IP based) in the policies. But this will not work because if different locations. We tried to allow a Tag on Site (B) from Site (A) which is synced from EMS cloud, but this is not working. I believe/suppose, but are not sure, this is because of the Layer 3 Setup between the both Site A/Site B VLANs. Means, a Client on Site (A) having this TAG assigned, can not pass through a policy on Site (B) (C) (D) wherever. Is this right? Idea then is, but I am not sure, to Setup the VLAN on (A) and (B) to 0.0.0.0/0.0.0.0 to have a simple Layer 2 setup. But routing will not work then and I think, Layer 2 is not even possible with FGT in setup.

 

Thanks for any ideas.

Ronny

 

 

2 REPLIES 2
johnathan
Staff
Staff

Tags alone should be fine in the policies. Ensure that tags are synced properly to EMS Cloud on each FortiGate and show the same list of IPs for that tag.
I would make sure that the policy going from one FortiGate to another would not be NATting the traffic, as the real IP of the client is required for it to work. 

"Never trust a computer you can't throw out a window."
Secucard
New Contributor III

This is now working fine using VLANs. Thanks.

Announcements

Select Forum Responses to become Knowledge Articles!

Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.

Labels
Top Kudoed Authors