FortiOS automatically creates a route for each directly connected subnet. Have a look at 'Routing' > 'Monitor' to see them.
As already mentioned, you then only have to allow traffic from one interface to another by creating policies.
With many VLANs, this can become excessive. To reduce the amount of policies you can create a zone and put all VLAN interfaces into it. Then, you allow 'inter-zone traffic' to enable traffic between all VLANs and all directions at the same time. This of course reduces control in favor of simplicity.
You need to setup the routing tables on the device for each VLAN. You need to use the VLAN address as the gateway, if you are using the Fortinet device as a layer 3 switch or router. My 800C has HP Layer 3 switches for this. At home, I use a 60E and it does the layer 3. Routing table has the network 192.168.1.0/24 gateway is 0.0.0.0 because it is direct connect and the interface WAN2, since I changed WAN2 to a LAN port. Each interface you use for layer 3 in LAN mode must have a router entry. Your device uses the interface IP address for its VLAN gateway. So if the interface is 192.168.1.200 for your VLAN, that is the gateway of your device in DHCP.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1743 | |
1114 | |
760 | |
447 | |
241 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.