cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
605
Views
0
Helpful
2
Replies

Cisco3750 and Fortigate 60D Setup

Hello everyone,i would like your input on which way to go on the following task

Vlan10 Data

Vlan20 Voice

Vlan 30 Guest

Vlan 90 Management

I will post my switch config so you can see what i have done so far,and also take note that i have created all these vlans on the Fortigate witch their Dhcp using zones so i can have inter vlan communication.

Im confused,is this the right way to go or do the routing on the switch,also dhcp on the switch? 

And what is the correct way to go,im a newbie pls help :)

 

1 Accepted Solution

Accepted Solutions

Seb Rupik
VIP Alumni
VIP Alumni

Hi there,

If you require ACLs between your VLANs then it makes perfect sense to implement this on the Fortigate, this is made easier by its stateful inspection.

 

The only problem you may have is the 100Mb link to the Fortigate which you are using. You may find that the inter-VLAN traffic traveling up and down that single link will create congestion. If this occurs, either create and ether-channel between the switch and firewall or implement QoS to shape the traffic.

 

You other option if inter-VLAN security does not require extensive ACLs, move the routing to the 3750, use ACLs on the SVIs, and have a link point-to-point link to the Fortigate for internet/ DMZ traffic.

 

cheers,

Seb.

View solution in original post

2 Replies 2

Seb Rupik
VIP Alumni
VIP Alumni

Hi there,

If you require ACLs between your VLANs then it makes perfect sense to implement this on the Fortigate, this is made easier by its stateful inspection.

 

The only problem you may have is the 100Mb link to the Fortigate which you are using. You may find that the inter-VLAN traffic traveling up and down that single link will create congestion. If this occurs, either create and ether-channel between the switch and firewall or implement QoS to shape the traffic.

 

You other option if inter-VLAN security does not require extensive ACLs, move the routing to the 3750, use ACLs on the SVIs, and have a link point-to-point link to the Fortigate for internet/ DMZ traffic.

 

cheers,

Seb.

Thank you very much for your input,i want to go with Firewall solution and keep everything on it, i will be using a 100D because 60D does not support LACP for the 100 port issue you mentioned and you are right it will be a problem

 

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card