Vlans in transparent mode, Vlans in transparent – Fortinet 100A User Manual

Page 66

Advertising
background image

66

01-28007-0068-20041203

Fortinet Inc.

Adding VLAN subinterfaces

System network

5

Enter the VLAN ID that matches the VLAN ID of the packets to be received by this
VLAN subinterface.

6

Select the virtual domain to which to add this VLAN subinterface.
See

“System virtual domain” on page 131

for information about virtual domains.

7

Select the name of a zone if you want this VLAN subinterface to belong to a zone.
You can only select a zone that has been added to the virtual domain selected in the
previous step. See

“Zone” on page 58

for information about zones.

8

Configure the VLAN subinterface settings as you would for any FortiGate interface.
See

“Interface settings” on page 48

.

9

Select OK to save your changes.
The FortiGate unit adds the new VLAN subinterface to the interface that you selected
in step

4

.

To add firewall policies for VLAN subinterfaces

Once you have added VLAN subinterfaces you can add firewall policies for
connections between VLAN subinterfaces or from a VLAN subinterface to a physical
interface.

1

Go to Firewall > Address.

2

Select Create New to add firewall addresses that match the source and destination IP
addresses of VLAN packets.
See

“Address” on page 198

.

3

Go to Firewall > Policy.

4

Add firewall policies as required.

VLANs in Transparent mode

In Transparent mode, the FortiGate unit can apply firewall policies and services, such
as authentication, protection profiles, and other firewall features, to traffic on an IEEE
802.1 VLAN trunk. You can insert the FortiGate unit operating in Transparent mode
into the trunk without making changes to your network. In a typical configuration, the
FortiGate internal interface accepts VLAN packets on a VLAN trunk from a VLAN
switch or router connected to internal VLANs. The FortiGate external interface
forwards tagged packets through the trunk to an external VLAN switch or router which
could be connected to the Internet. The FortiGate unit can be configured to apply
different policies for traffic on each VLAN in the trunk.

For VLAN traffic to be able to pass between the FortiGate Internal and external
interface you would add a VLAN subinterface to the internal interface and another
VLAN subinterface to the external interface. If these VLAN subinterfaces have the
same VLAN IDs, the FortiGate unit applies firewall policies to the traffic on this VLAN.
If these VLAN subinterfaces have different VLAN IDs, or if you add more than two
VLAN subinterfaces, you can also use firewall policies to control connections between
VLANs.

Advertising