In the Security Fabric, External is the root FortiGate. This FortiGate receives information from the other FortiGates in the Security Fabric and is used to run the Security Fabric Audit.
In this example, the following interfaces on External connect to other network devices:
- Port 9 connects to the Internet (this interface was configured when External was initially installed).
- Port 10 connects to Accounting (IP address: 192.168.10.2).
- Port 11 connects to Marketing (IP address: 192.168.200.2).
- Port 16 connects to the FortiAnalyzer (IP address: 192.168.55.2).
- On External, go to Network > Interfaces and edit port 10.
- Set an IP/Network Mask for the interface. In this example, 192.168.10.2/255.255.255.0.
- Under Administrative Access, enable FortiTelemetry, which is required for communication between FortiGates in the Security Fabric.
- Repeat these steps to configure the other interfaces with the appropriate IP addresses.
- Go to Policy & Objects > IPv4 Policy and create a policy for traffic from Accounting to the Internet. Ensure NAT is enabled.
- Repeat this step to create a similar policy for Marketing.
- Still on External, go to System > Feature Visibility, and under Additional Features, enable Multiple Interface Policies.
- Go to Policy & Objects > IPv4 Policy and create a policy allowing Accounting and Marketing to access the FortiAnalyzer.
- To enable communication between the FortiGates in the Security Fabric, go to Security Fabric > Settings and enable FortiGate Telemetry.
Set a Group name and Group password.
FortiAnalyzer Logging is enabled by default.
Set IP address to an internal address that will later be assigned to port 1 on the FortiAnalyzer (in this example, 192.168.55.10).
- Click Test Connectivity.
An error appears because the FortiGate is not yet authorized on the FortiAnalyzer. This authorization will be configured in a later step.