hi guys
I create two interface vlan 300 between my switch and my fortigate and I have no answer ping between the two interfaces What I is the probleme in my configuration ?my configswitch ciscointerface GigabitEthernet0/1 switchport access vlan 300 switchport mode access
interface Vlan300 ip address 80.45.28.253 255.255.255.252
fortigate 200A
edit "internal3" set vdom "root" set allowaccess ping https snmp http fgfm set type physical
edit "Vlan 300" set vdom "root" set ip 80.45.28.254 255.255.255.252 set allowaccess ping https snmp fgfm set interface "internal3" set vlanid 300
you know configuration examples ?thank you for your help
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
will for starters you have one side tagged ( 802.1q ) and the cisco access mode.
Either change the cisco to a trunk mode ( 802.1q )
config term
int gi 0/1
no switchport access vlan 300
switch mode trunk
switch trunk allow vlan 300
end
or remove the vlan interface and make the FGT access mode.
PCNSE
NSE
StrongSwan
hi
when i type this commande "switch mode trunk" i nave this message
Switch(config-if)#switchport mode trunk Command rejected: An interface whose trunk encapsulation is "Auto" can not be configured to "trunk" mode. Switch(config-if)#
Depending on cisco switch type you have to set the encapsulation also.
e.g ( check the capabilities of the interface 1st )
show int gi 0/1 cap
Now we can set the trunk encapsulation
config term
int gi 0/1
switch trunk encapsulation 802.1q
do copy runn start
end
PCNSE
NSE
StrongSwan
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1692 | |
1087 | |
752 | |
446 | |
228 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.