Fortinet
LAN Edge Deployment Guide
FortiGate, FortiSwitch, and FortiAP
FORTINET DOCUMENT LIBRARY
FORTINET VIDEO GUIDE
FORTINET BLOG
CUSTOMER SERVICE & SUPPORT
FORTINET TRAINING & CERTIFICATION PROGRAM
https://www.fortinet.com/training-certification
NSE INSTITUTE
FORTIGUARD CENTER
END USER LICENSE AGREEMENT
https://www.fortinet.com/doc/legal/EULA.pdf
FEEDBACK
Email: techdoc@fortinet.com
April 13, 2023
Introduction
Executive summary
The Fortinet LAN Edge Solution offers tight integration through FortiLink, treating FortiSwitch and FortiAP units as extensions of the FortiGate device. This unified approach enables consistent security across the entire network, embodying Security-Driven Networking. By leveraging Security-Driven Networking, the LAN edge extends the Fortinet Security Fabric, converging security and network access into a single platform. This convergence enhances security, reduces complexity, lowers costs, and improves performance at the LAN edge. While this integrated approach simplifies the network, the sheer power and integration can make it challenging to know where to start. Security designs are typically specific to the deployment and can evolve over time. This guide focuses on establishing the network skeleton and default firewall policies to get the baseline network operational quickly.
Intended audience
This guide is intended for individuals interested in deploying Fortinet's secure LAN Edge Solution in a new environment or upgrading an existing one. Readers should possess a solid understanding of networking, wireless, and security concepts. This includes:
- Network, wireless, and security architects
- Network, wireless, and security engineers
About this guide
This deployment guide walks readers through the design and deployment steps for a specific architecture. It is recommended that readers first assess their environment to determine suitability. Consulting the Reference Architecture Guide(s) is advisable for those still selecting an architecture. This guide presents one method of deployment and may omit specific steps requiring reader decisions for further configuration. Supplementary materials such as admin guides, example guides, cookbooks, and release notes are also recommended.
Design overview
Use case and topology
The following topology illustrates the setup:
Diagram Description: The diagram shows an ISP CPE router connecting to a FortiGate device. The FortiGate is connected to a FortiSwitch via a FortiLink connection. The FortiSwitch then connects to a FortiAP and a NAC-connected device. The FortiGate also has a WAN connection labeled 'wan1'.
- The primary focus is on establishing basic network connectivity and outbound access.
- The ISP access router/modem is assumed to be deployed and providing DHCP for the FortiGate's WAN link via an Ethernet connection.
- The deployment includes:
- One FortiGate device
- One FortiSwitch unit
- One or more FortiAP units
- All necessary Ethernet cabling is assumed to be available or already installed.
- A management station with an Ethernet port is required.
Design concept and considerations
This guide outlines a baseline network for deploying a secure LAN edge efficiently. The solution is scalable; additional FortiSwitch units, FortiAP units, and higher-end FortiGate devices can be added to accommodate more users. Redundancy can be enhanced by implementing an HA cluster for FortiGate devices, a full-mesh switch network, and aggregate links. SD-WAN can be configured for redundancy and intelligent traffic steering. For multi-site deployments, standardization into SD-branches and provisioning via FortiManager are also supported.
Deployment overview
Deployment plan
This deployment configures a FortiGate device, a FortiSwitch unit, and a FortiAP unit from factory default settings to provide wired and wireless outbound access for internal users. Most configuration steps are performed on the FortiGate device, with the exception of physical connections.
The general deployment steps are:
- Bring up a FortiGate device and connect to an ISP.
- Configure FortiLink and authorize a FortiSwitch unit.
- Create and assign VLANs in the switch controller.
- Set up NAC and create NAC policies.
- Add one or more FortiAP units.
Deployment procedures
Step 1: Bring up the FortiGate device
The following figures show the faceplate and back of the FortiGate 60F, which are similar to the FortiGate 61F.
Diagram Description: Images show the front and back panels of a FortiGate 60F device, detailing ports like DC+12V, USB, CONSOLE, WAN2, WAN1, DMZ, ports 5, 4, 3, 2, 1, and A, B. It notes that DMZ, HA, and MGMT ports may be available on larger models.
FortiGate devices, when new, have physical ports preconfigured according to their model. These ports can be reconfigured, with some exceptions. Ports labeled 'A' and 'B' are typically preconfigured for FortiLink and connect to the FortiSwitch unit.
Default settings for an out-of-the-box FortiGate device:
Setting | Value |
---|---|
Management IP address and login credentials | |
Management IP | 192.168.1.99/24 |
User name | admin |
Password | <blank> (prompts for new password on first login) |
Ports and interfaces | |
MGMT port address range (if it exists) | 192.168.1.0/24, with the FortiGate device as the default gateway |
LAN port only | If there is no MGMT port, the LAN port address range is 192.168.1.0/24. |
MGMT and LAN port | If there is an MGMT port, the LAN ports default to a different subnet. |
WAN1 | DHCP client (requests IP from ISP) |
LAN ports labeled 'A' and 'B' | Preconfigured for FortiLink |
Firewall policies | |
LAN → WAN | Allows outgoing traffic from LAN ports; does not allow incoming traffic from the Internet/uplink (WAN1). MGMT ports do not have default Internet access. |
Power on the FortiGate device and log in
- Plug in and power on the FortiGate device.
- Connect the ISP uplink to the FortiGate WAN1 port.
- Connect a management station to the MGMT (or LAN port 1) using an Ethernet cable. The station should receive an IP address from the FortiGate. If not, configure it to 192.168.1.110/255.255.255.0 with a gateway of 192.168.1.99.
- Open a web browser and navigate to 192.168.1.99.
- Log in using the username 'admin' and a blank password, then press Enter.
- You will be prompted to set a new password.
- The FortiGate setup screen appears next; this guide skips those details. A connected station can now access the Internet via the FortiGate firewall.
Step 2: Configure FortiLink and authorize the FortiSwitch unit
FortiLink enables full management of a FortiSwitch unit from the FortiGate device, treating them as a unified entity. VLAN tags are automatically provisioned.
Remove the ports in the LAN hardware switch interface
For FortiGate models without dedicated FortiLink ports (like A and B), two LAN ports must be removed from the LAN interface to be used for FortiLink. By default, LAN ports are grouped into the LAN hardware switch interface.
Steps for FortiGate 61F:
- Navigate to Network > Interfaces and double-click on LAN.
- In the Interface Members field, remove two physical ports by clicking the 'X' icons. The highest-numbered ports are commonly used, but any two can be removed.
- Click OK.
- The removed ports will no longer be part of the LAN interface and will appear under the Physical Interface grouping.
Configure the FortiLink interface
FortiLink connects switches and access points directly to the FortiGate, making the network function as a single device.
- Go to Network > Interfaces.
- Double-click on FortiLink.
- Verify interface members:
- If two members are listed (likely ports 'A' and 'B'), FortiLink is ready.
- If no members are listed, select the two LAN ports removed earlier.
- Check FortiLink settings:
- Address section: Use the default 'Dedicated to FortiSwitch' addressing mode.
- Address section: Ensure 'Automatically authorize devices' is enabled.
- Address section: Disable 'FortiLink split interface' (used for multiple switches).
- Ensure the DHCP server is enabled for connected FortiSwitch units.
Diagram Description: A screenshot shows the FortiGate interface configuration screen, highlighting the FortiLink settings with options for addressing mode, automatic authorization, split interface, and DHCP server status.
Click OK.
Make the switch controller and WiFi controller visible in the GUI
To make the switch and WiFi controllers visible:
- Go to System > Feature Visibility.
- Under Core Features, enable 'Switch Controller'.
- Under Core Features, enable 'WiFi Controller'.
Connect the FortiLink ports to the switch ports
- Unpack and deploy the FortiSwitch unit.
- Turn on the FortiSwitch unit.
- Connect the FortiSwitch to the FortiGate using two Ethernet cables, linking the designated FortiLink ports on the FortiGate to the last two ports on the FortiSwitch. Allow a few minutes for the switch to become visible and configurable on the FortiGate.
Explore the switch controller
Navigate to WiFi & Switch Controller > FortiLink Interface. This section provides access to additional options, including FortiOS Network Address Control (NAC).
Check the switch authorization and topology
- Go to WiFi & Switch Controller > Managed FortiSwitch.
- Verify that the FortiSwitch unit is visible, connected, and authorized. If not automatically authorized, click the icon to authorize it.
- To view the topology, change the dropdown menu in the upper right corner from 'List' to 'Topology'. This view shows the logical connection between the FortiGate and the FortiSwitch.
- Hover over the switch icon to access context menus.
- The figure shows the FortiSwitch unit is connected, authorized, and ready.
Diagram Description: A screenshot displays the Managed FortiSwitch interface, showing a list of connected switches with their status, model, and connection details. Another screenshot shows the topology view.
Step 3: Create and assign VLANs in the switch controller
Create FortiSwitch VLANs
Predefined VLANs exist for NAC purposes, allowing automatic assignment of devices to a default VLAN. This guide demonstrates creating two example VLANs for internal use, enabling Internet access and inter-VLAN routing.
Steps:
- Go to WiFi & Switch Controller > FortiSwitch VLANs.
- Click 'Create New'.
- Assign a VLAN name (e.g., VLAN100).
- Ensure 'Type' is 'VLAN' and 'Interface' is 'fortilink'.
- Assign a unique VLAN ID (e.g., 100). Predefined VLANs use IDs 4089-4093.
- Optionally, select a color.
- Set the 'Role' to 'LAN'.
- Set 'Addressing mode' to 'Manual'.
- Enter an IP/Netmask (e.g., 10.10.100.1/255.255.255.0).
- Enable 'Create address object matching subnet'.
Diagram Description: A screenshot shows the FortiGate interface for creating a new VLAN, with fields for Name, Type, Interface, VLAN ID, Role, Addressing Mode, and IP/Netmask.
This setting will be useful in policies later.
- Enable DHCP Server.
- Accept or adjust the default address range.
- Ensure 'Same as Interface IP' and 'Same as System DNS' are enabled.
Diagram Description: A screenshot shows the DHCP Server configuration for the VLAN, including DHCP status, address range, netmask, default gateway, and DNS server settings.
Click OK.
For the second VLAN (e.g., VLAN200):
- Repeat the procedure, using VLAN200 for the name and ID.
- Set the IP/Netmask to 10.10.200.1/255.255.255.0.
- Configure other settings as needed.
Click OK.
Create firewall policies for Internet access
Internet access policies are similar to the LAN internet policy. These policies allow traffic from the new VLANs to the internet.
Steps:
- Go to Policy & Objects > Firewall Policy.
- Click 'Create New'.
- Configure the policy for the first VLAN (e.g., VLAN100-Internet):
- Incoming Interface: VLAN100
- Outgoing Interface: WAN1
- Source: all
- Destination: all
- Schedule: always
- Service: ALL
- Action: ACCEPT
- Under Firewall/Network Options, ensure NAT is enabled and 'Use Outgoing Interface Address' is selected.
Diagram Description: A screenshot shows the FortiGate firewall policy creation screen, detailing fields for Name, Incoming/Outgoing Interfaces, Source, Destination, Schedule, Service, Action, and Firewall/Network Options like NAT.
Accept default settings and click OK.
Repeat steps 1-5 for the second VLAN.
Enable inter-VLAN routing (if needed)
To allow communication between VLANs, configure two additional policies. For example:
- Policy 1: Incoming VLAN100, Outgoing VLAN200.
- Policy 2: Incoming VLAN200, Outgoing VLAN100.
Diagram Description: A screenshot shows a list of configured firewall policies, including inter-VLAN routing policies.
Assign VLANs to switch ports
Assign VLANs statically to switch ports. NAC policies can be used for dynamic assignment later.
- Go to WiFi & Switch Controller > FortiSwitch Ports.
- Note that FortiLink ports show the FortiGate device in the native VLAN column; no trunk port configuration is needed.
- To change a port's VLAN, hover over the current native VLAN and click the pencil icon.
Diagram Description: A screenshot shows the FortiSwitch Ports configuration screen, listing ports with their Native VLAN, Allowed VLANs, and other settings. It highlights the pencil icon for editing.
In the 'Select Entries' pane, choose the VLAN to assign. If the VLAN is not defined, click 'Create'. Click 'Apply' to save.
Assign other ports to static VLANs as needed.
Diagram Description: A screenshot shows the process of selecting a VLAN for a specific port in the FortiSwitch Ports configuration.
Step 4: Set up NAC and create NAC policies
NAC identifies devices based on criteria like OS and hardware vendor, then assigns them to a policy-defined VLAN.
When a device connects to a switch port in NAC mode, it undergoes these steps:
- Receives a DHCP address on the onboarding VLAN.
- Is categorized by a NAC policy.
- Receives a new DHCP address on the assigned VLAN.
If a device doesn't match any category, it remains on the onboarding VLAN. Stricter restrictions on the onboarding VLAN policy are recommended.
Change the onboarding VLAN
By default, FortiGate NAC policies place onboarding devices into the onboarding VLAN. This can be changed by editing the VLAN within NAC Policies > FortiSwitch VLANs and modifying the FortiLink interface.
Diagram Description: A screenshot shows the FortiGate NAC Policies screen, listing onboarding VLANs and their assignments.
Set up NAC policies on the FortiSwitch unit
Define rules to assign devices to VLANs based on patterns, user information, or EMS tags.
Steps:
- Go to WiFi & Switch Controller > NAC Policies.
- Click 'Create New' to create a NAC policy (e.g., 'dev-NAC').
- Set 'Status' to 'Enabled'.
- Set 'Category' to 'Device'.
- Enable 'MAC address' and enter a device MAC address (e.g., 00:00:00:00:00:00). Multiple criteria can be enabled.
- Under 'Switch Controller Action', enable 'Assign VLAN' and select a previously configured VLAN.
Diagram Description: A screenshot shows the FortiGate interface for creating a new NAC policy, with fields for Name, Status, Category (Device, MAC address, Hardware vendor, etc.), and Switch Controller Action (Assign VLAN).
Click OK to save the NAC policy.
Create other NAC policies as needed.
Assign ports to use a NAC policy
Ports can be configured to use NAC policies for dynamic access and security levels based on the connected device.
- Go to WiFi & Switch Controller > FortiSwitch Ports.
- Select the ports to be changed to NAC mode.
- Right-click and select 'Mode' > 'NAC'.
Diagram Description: A screenshot shows the FortiSwitch Ports configuration screen, where ports can be selected and their mode changed to NAC.
After applying NAC mode, refresh the page; the Native VLAN value will update.
Diagram Description: A screenshot shows the FortiSwitch Ports configuration after applying NAC mode, indicating updated Native VLAN values.
FortiSwitch configuration complete
The FortiSwitch configuration is complete. Devices connected to ports in static mode will follow assigned firewall policies. Devices on NAC-mode ports will be placed in VLANs based on matching NAC policies.
Step 5: Deploy WiFi
This guide focuses on network configuration, not physical AP installation. Refer to FortiAP Quick Start Guides for installation details. Best practices include:
- Integrated/internal antennas are for ceiling mounts. For wall mounting, use external antennas.
- Antenna patterns (omnidirectional, directional) affect signal coverage. Omnidirectional antennas create a donut pattern, suitable for 10-20 foot ceilings. Down-pointed directional antennas are better for higher ceilings. High-gain omnidirectional antennas can flatten the pattern, reducing ceiling coverage.
- Wall-mounted APs require external antennas, ideally vertically aligned omnidirectional ones.
- Ensure sufficient Power over Ethernet (PoE) from the switch and that the total PoE budget meets the needs of all access points.
- Record AP MAC addresses/serial numbers and locations for documentation.
- Leave extra cable slack at AP ends for easier coverage adjustment.
Add an AP VLAN
Create an AP VLAN for AP management (control plane) to isolate it from user traffic. This is done via WiFi & Switch Controller > FortiSwitch VLANs (refer to 'Create FortiSwitch VLANs' on page 15).
Steps:
- Enter a VLAN name.
- Assign a VLAN ID.
- Set 'Addressing mode' to 'Manual' and assign a VLAN/gateway IP address.
- Under 'Administrative Access', click 'Security Fabric Connection' and add other access types as needed.
Diagram Description: A screenshot shows the FortiGate interface for creating a new VLAN, similar to the previous VLAN creation steps, but for the AP VLAN.
- Enable DHCP server and specify the IP address range.
- Under 'Network', enable 'Device detection'.
- Enable 'Automatically authorize devices'. This is recommended during initial deployment and can be disabled later for enhanced security.
Diagram Description: A screenshot shows the DHCP Server configuration for the AP VLAN, including IP address range and device detection settings.
Click OK.
Assign the AP VLAN to AP ports on the FortiSwitch unit
FortiAPs connected to ports assigned the AP VLAN will automatically connect, get an IP, and be authorized. A FortiSwitch PoE port can power the AP.
- Go to WiFi & Switch Controller > FortiSwitch Ports.
- Select a PoE-capable port and change its native VLAN to the AP VLAN.
Diagram Description: A screenshot shows the FortiSwitch Ports configuration, highlighting the selection of a port and changing its Native VLAN to the AP VLAN.
Connect APs via Ethernet cables to the appropriate PoE-capable FortiSwitch ports. Allow a few minutes for them to start and authorize. Check progress via Security Fabric > Physical Topology or WiFi & Switch Controller > Managed FortiAPs.
- Go to WiFi & Switch Controller > Managed FortiAPs.
- If needed, change the view from 'Group' to 'AP'.
Diagram Description: A screenshot shows the Managed FortiAPs interface, listing connected access points and their status.
If APs are not automatically authorized, use the right-click menu or the 'Edit' button. Renaming APs (e.g., "Main-Lobby") is recommended for easier identification.
Create SSIDs
Steps:
- Go to WiFi & Switch Controller > SSIDs.
- Click 'Create New' > 'SSID'.
- Enter an internal name for the SSID.
- Set the 'Traffic mode' to 'Tunnel'. In tunnel mode, WLANs function as interfaces in the FortiGate.
- Assign an IP address (VLAN gateway) and set up the DHCP server.
Diagram Description: A screenshot shows the FortiGate interface for creating a new SSID, with fields for Name, Alias, Type, Traffic Mode, and IP/Netmask.
Under WiFi Settings:
- Enter the over-the-air SSID name.
- Select a security mode (e.g., WPA3 SAE or WPA2 Personal). Enterprise modes are recommended for refined security policies.
- Enter a pre-shared key.
Diagram Description: A screenshot shows the WiFi Settings for SSID configuration, including SSID name, security mode (WPA2 Personal), pre-shared key, client limit, and broadcast options.
Click OK.
SSIDs are deployed to the APs. More complex deployments can be configured using groups of APs and different WLANs.
Configure the firewall policies
Firewall policies must be configured to allow wireless access from the SSID. Refer to 'Create firewall policies for Internet access' on page 17. Profiles for traffic scanning can also be defined here.
Diagram Description: A screenshot shows the FortiGate firewall policy configuration screen, demonstrating a policy for an SSID allowing internet access.
Deployment complete
The basic LAN edge network design is now configured. The FortiGate serves as the internet gateway, the FortiSwitch is connected and communicating via FortiLink, Wi-Fi is operational, and an example NAC policy is in place. For further security, refinement, optimization, and scaling, refer to additional Fortinet documentation.
Appendix A: Products used in this guide
The following product models and firmware were used in this guide. FortiSwitch 7.0 and FortiAP 7.0 can also be used for this deployment.
Product | Model | Firmware |
---|---|---|
FortiGate | FortiGate 61F | 7.0.3 |
FortiSwitch | FortiSwitch 108E-POE | 6.4.4 |
FortiAP | FortiAP 221E | 6.4.4 |
Appendix B: Documentation references
For more information, use the following resources:
- Product administration guides:
- FortiGate Administration Guide
- Managed FortiSwitch Administration Guide
- FortiWiFi and FortiAP Configuration Guide
- Solution hub:
- Secure Access