I need help with configuring VLANs on Fortigate firewall and 3COM Managed Switch
- Get link
- X
- Other Apps
Good day from Singapore,
I need help with configuring VLANs on Fortigate firewall and Managed Switch.
We have a Fortigate 60D firewall. An Internal (LAN) interface was created with ports 3, 4, 6 and 7 as members. The subnet for the internal interface is 192.168.1.1/24. DHCP Server is turned on for this interface.
Additionally, I have created VLAN 10 and VLAN 20 riding on top of the Internal interface.
VLAN 10 has subnet 192.168.10.1/24. DHCP server is turned on for this interface. MGMT WIFI will use VLAN 10.
VLAN 20 has subnet 192.168.20.1/24. DHCP server is turned on for this interface. GUEST WIFI will use VLAN 20.
I do understand that every port on the Internal interface of the Fortigate firewall is a trunk port.
Now, we come to the 3COM Baseline 2920 Managed Switch.
I configured Port 1 on the 3com switch as a TRUNK, carrying VLAN 10 and VLAN 20. PVID is VLAN 1. Port 1 on the 3com switch is connected to port 3 on the Fortigate firewall using a LAN cable (trunk).
Supposing I have an enterprise grade wireless access point. I need to create 2 SSIDs. One SSID is MGMT WIFI and the other SSID is GUEST WIFI. The MGMT WIFI SSID will use VLAN 10 while the GUEST WIFI SSID will use VLAN 20. Assuming this enterprise grade access point only has an ethernet port, how should I configure it? This is question 1.
Question 2. Then I also need to connect this access point to port 16 on the 3com switch. How should I configure port 16 on the 3com switch? As an access port or trunk port? Please elaborate. I am not that experienced with VLAN configuration.
Thank you very much for your kind assistance.
Regards,
Mr. Turritopsis Dohrnii Teo En Ming
Targeted Individual in Singapore
REFERENCES
============
- Get link
- X
- Other Apps
Comments
Post a Comment