Hi all, I'm experiencing some issues with a software switch
configuration. To elaborate, I have two sets of interfaces (configured
as 802.3ad Aggregate) named INT1 and INT2, both as members of a software
switch.The software switch has the option of I...
Hi support, I'm unsure if this is feasible, but I have two VDOMs: one
named ROOT, configured with NAT for internet connectivity, and another
named TEST in transparent mode, encompassing all local VLANs. I've
established a VDOM link to successfully fo...
No, it's configured on a Fortigate 400F, and behind the aggregate
interfaces are Cisco switches. It's set up with two trunk interfaces
that are 802.3ad aggregates and members of a software switch. In a
single stack configuration, it should resemble t...
Hi @hbac, yes, we have two 802.3ad aggregate interfaces as members of
the software switch. VLANs are defined within the software switch.
@ozkanaltas The strange thing is, I don't see any traffic (whether
permitted or denied) from the two hosts behind...
Hi Ozkanaltas, thank you for your suggestion.I've already added a policy
from VLAN100 to VLAN100 with no restrictions on source, destination, and
service, but it's not working. Is there something else I need to do to
enable this kind of traffic? Than...
Thanks to both of you for the suggestions.@AEK is correct; the gateway
for each VLAN is on the L3 switch. Now, do I need to add the default
gateway on the switch? I can set an IP only to the VDOM (NAT - "root")
link, and obviously not on the VDOM (Tr...