This example provides a recommended configuration of FortiLink where multiple FortiSwitches are managed by an A-P mode HA cluster of FortiGates as switch controller via hardware or software switch interface. An example of common usage is when you need multiple distribution FortiSwitches but lack supporting aggregate on the FortiGate pairs.
- The FortiGate model supports hardware or software switch interface.
- FortiSwitch units have been upgraded to latest released software version.
- Layer-3 path/route in the management VDOM is available to Internet so that the FortiSwitch units can synchronize NTP.
Enter the following CLI commands on the FortiSwitch:
config system global set switch-mgmt-mode fortilink end This operation will cleanup all of the configuration and reboot the system! Do you want to continue? (y/n)y Backing up local mode config before entering FortiLink mode....
If the FortiSwitch ports used for the FortiLink connection have
auto-discovery-fortilink enabled, executing authorization on FortiGate will trigger the transformation to FortiLink mode automatically.
config switch interface edit "port1" set auto-discovery-fortilink enable …… next end
Create hardware or software switch interface and designate it as FortiLink interface on the FortiGate:
Create a hardware switch using the CLI:
config system virtual-switch edit "hardswitch1" set physical-switch "sw0" config port edit "port11" next edit "port12" next end next end
Create a software switch using the CLI:
config system switch-interface edit "softswitch1" set vdom "vdom1" set member "port11" "port12" next end
Using the GUI:
- Go to WiFi & Switch Controller > FortiLink Interface.
- In Interface members, select an existing hardware/software switch interface (if there is one) or select one or more physical ports to create a hardware/software switch interface.
- Configure other fields as necessary.
- Click OK.
Using the CLI:
config switch-controller managed-switch edit "FSWSerialNum" set fsw-wan1-admin enable …… next end
Check the CLI output for
Connection: Connected to show that FortiLink is up:
execute switch-controller get-conn-status FSWSerialNum Get managed-switch S248EPTF18001384 connection status: Admin Status: Authorized Connection: Connected Image Version: S248EP-v6.2.0-build143,190107 (Interim) Remote Address: 126.96.36.199 Join Time: Fri Jan 11 15:22:32 2019 interface status duplex speed fortilink stacking poe status port1 up full 1000Mbps no no Delivering Power port2 down N/A 0 no no Searching ……
Using the GUI:
- Go to WiFi & Switch Controller > Managed FortiSwitch.
- Click Authorize and wait for a few minutes for the connection to be established.
When FortiLink between the FortiGate and FortiSwitch is established, the Link-up ports change to green and the POE port that is supplying power changes to blue. The dotted line between the FortiGate and FortiSwitch changes to a solid line. The Connection status shows that FortiLink is up.
- Configure the VLAN arrangement.
- On the FortiGate, go to WiFi & Switch Controller > FortiSwitch VLANs.
- Configure the VLAN interfaces that are applied on FortiSwitch.
On FortiGate, these switch VLAN interfaces are treated as layer-3 interfaces and are available to be applied by firewall policy and other security controls in FortiOS. This means that security boundary is extended to FortiSwitch.
- Configure FortiSwitch ports.
- On the FortiGate, go to WiFi & Switch Controller > FortiSwitch Ports.
- Select one or more FortiSwitch ports and assign them to the switch VLAN.
- You can also select POE/DHCP Snooping, STP, and other parameters for the FortiSwitch ports to show their real-time status such as link status, data statistics, etc.
- Configure access authentication.
- On the FortiGate, go to WiFi & Switch Controller > FortiSwitch Security Policies.
- Configure the 802.1X security policies.
- Select Port-based or MAC-based mode and select User groups from the existing VDOM.
- Configure other fields as necessary.
- Go to WiFi & Switch Controller > FortiSwitch Ports.
- Select one or more FortiSwitch ports, click + in the Security Policy column, then make a selection from the pane.
Fortinet recommends binding FortiLink on the hardware switch interface. Since the hardware switch interface can leverage hardware chips to forward traffic, it does not consume CPU capacity, unlike a software switch.
If an authorized FortiSwitch is always offline, go to the FortiGate CLI and use the command below to see all the checkpoints. Inspect each checkpoint to find the cause of the problem.
# execute switch-controller diagnose-connection S248EPTF18001384 Fortilink interface ... OK hardswitch1 enabled DHCP server ... OK hardswitch1 enabled NTP server ... OK hardswitch1 enabled NTP server sync ... OK synchronized: yes, ntpsync: enabled, server-mode: enabled ipv4 server(ntp1.fortiguard.com) 188.8.131.52 -- reachable(0x80) S:2 T:128 no data ipv4 server(ntp2.fortiguard.com) 184.108.40.206 -- reachable(0x80) S:2 T:128 no data ipv4 server(ntp2.fortiguard.com) 220.127.116.11 -- reachable(0xff) S:2 T:66 selected server-version=4, stratum=2 reference time is dfe3aec5.744404e6 -- UTC Sat Jan 12 00:09:41 2019 clock offset is -0.320411 sec, root delay is 0.054535 sec root dispersion is 0.533081 sec, peer dispersion is 11495 msec ipv4 server(ntp1.fortiguard.com) 18.104.22.168 -- reachable(0xff) S:2 T:66 server-version=4, stratum=2 reference time is dfe3aec5.744404e6 -- UTC Sat Jan 12 00:09:41 2019 clock offset is -0.448087 sec, root delay is 0.054535 sec root dispersion is 0.533081 sec, peer dispersion is 12542 msec HA mode ... disabled Fortilink Status ... SWITCH_AUTHORIZED_READY Last keepalive ... 1 seconds ago CAPWAP Remote Address: 22.214.171.124 Status ... CONNECTED Last keepalive ... 26 seconds ago PING 126.96.36.199 (188.8.131.52): 56 data bytes 64 bytes from 184.108.40.206: icmp_seq=0 ttl=64 time=1.1 ms 64 bytes from 220.127.116.11: icmp_seq=1 ttl=64 time=13.9 ms 64 bytes from 18.104.22.168: icmp_seq=2 ttl=64 time=12.7 ms 64 bytes from 22.214.171.124: icmp_seq=3 ttl=64 time=2.9 ms 64 bytes from 126.96.36.199: icmp_seq=4 ttl=64 time=1.2 ms --- 188.8.131.52 ping statistics --- 5 packets transmitted, 5 packets received, 0% packet loss round-trip min/avg/max = 1.1/6.3/13.9 ms
If HA sync fails, use the following command to diagnose and locate the cause.
# diagnose sys ha checksum cluster