Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
Thilina_Senevirathna
New Contributor

How does Fortigate Handle Multiple Internal Networks

Hi, I have a network with 192.168.1.0/24 subnet with an inside LAN physical interface 192.168.1.7 connected to Fortigate 200B firewall. There is a requirement to break the internal network into 2 subnets. This means the internal network will contain 192.168.1.0/24 network range and 10.0.0.0/16 network range once the solution is implemented. Does this mean I have to create a virtual sub interface or a physical interface within the firewall to serve the traffic for the new network of 10.0.0.0/16? Meaning should the firewall have a zone (interface) representing each internal network to support policies for both networks? Or isn' t possible to create a completely isolated 10.0.0.0/16 network connected to 192.168.1.0 network internally and route the 10.0.0.0/16 traffic via 192.168.1.0 network to the firewall gateway of 192.168.1.7? Will the firewall drop traffic if it receives packets sourced from 10.0.0.0/16 subnet from 192.168.1.7 physical interface even if the policy is created to allow traffic? Please advise :) Thank you in advance. Thilina
6 REPLIES 6
ShrewLWD
Contributor

Hi THilina, welcome to the forums! Both subnets can be directly attached to the Fortinet. Give the Internal interface of the Fortinet a secondary IP address from the 10.0.0.0 range. Give both subnets a firewall address name (e.g. 192.168.1.0/24=Range1 and 10.0.0.0/16 =Range2, etc.) In the firewall rules, be specific when creating the rules, to use the address names above, don' t use the generic ANY or ALL (on the LAN side). Example firewall policies: Internal - Range1 -> WAN - ALL Internal - Range2 -> WAN - ALL You can then create rules to filter and send traffic between those two subnets, by using; Internal - Range1 -> Internal - Range2 Internal - Range2 -> Internal - Range1 Don' t NAT the rules.
Thilina_Senevirathna
New Contributor

Thank you for your swift response ShrewLWD. Really appreciated. I would also like to know the following. 1) If we don' t create a firewall interface for 10.0.0.0/16 network, and keep the network internal behind a router, and create a policy to allow traffic to/from 10.0.0.0 from 192.167.1.7 interface, will it work? Is it a must that all internal networks have an interface on the firewall in order the firewall to allow traffic? 2) If we create 2 interfaces in the firewall for both internal networks, can both networks be NAT to the same external public IP address on the WAN interface? Thanks
ede_pfau
SuperUser
SuperUser

1) In order to differentiate between legitimate and rogue network (addresses) the Fortigate requires that each legititmate network is present in the routing table. If you want to just use addresses from the 10.0.0.0 range on your internal network then you have to create a static route for 10.0.0.0/24 pointing to the ' internal' port. Otherwise, this traffic will be dropped by the FGT which means that it cannot go across the firewall, e.g. to the internet. Assigning an address to a physical or virtual interface automatically creates a ' directly connected' route in the FGT' s routing table. Thats why a secondary address or a VLAN interface ' works' . 2) Yes, no problem. You can NAT outgoing traffic from any or all ports to the WAN interface' s IP address or any other (public) IP address that you choose. If you have 2 ports for your 2 networks then connect both ports to the same LAN switch. This doesn' t really sound like a good idea though. You will have broadcasts, DHCP discovery requests etc. for both address ranges on the same wire and in the same broadcast domain. Running one network over a newly created VLAN is much better, for clarity, bandwidth consumption and functionality. This would mean that your switch(es) will have to support VLANs, preferably tagged VLANs or if needs be, port based VLANs. If that is not an option you should go with the ' secondary address' approach as proposed earlier.

Ede

"Kernel panic: Aiee, killing interrupt handler!"
Ede"Kernel panic: Aiee, killing interrupt handler!"
Thilina_Senevirathna
New Contributor

Thanks Ede for the reply. 1) This means it can keep internal networks not visible to the firewall. We just need to create a static route and allow traffic from the firewall policy. Creating a Vlan will remove the need of creating a static route. 2) This one is clear. Thanks all :)
ede_pfau
SuperUser
SuperUser

Yes, creating a VLAN or assigning a secondary address to a physical port will both create static routes in the routing table. Try it out for yourself. Don' t forget that without a policy traffic cannot traverse the firewall, from one port to another.

Ede

"Kernel panic: Aiee, killing interrupt handler!"
Ede"Kernel panic: Aiee, killing interrupt handler!"
CodeTron
New Contributor III

Hi,

 

I have an internal network 10.10.20.0/24 connected to the internal port1 on a Fortinet 90E and I have another network 10.10.99.0/24 connected to port11 zone "MGT" on the same firewall (this network is to be used to connect all management IPs to it and to be accessed from s specific internal IP address), now I have created policies from internal to MGT allowing all sources and traffic to pass and a policy from MGT to internal also allowing all sources and destinations (i'm not limiting the source IP for testing purposes)

Now I can not reach any of the IP's inside the MGT network also I can not ping port11 IP address which is 10.10.99.1

 

Note: I did not create a static route because it is done automatically be the firewall

 

What could be the problem?

 

Thanks in advance 

Labels
Top Kudoed Authors