LANs and LAN segmentation
This example company will use the following subnets:
Interface |
Purpose |
Subnet |
DHCP |
FortiGate interface address |
Address object |
---|---|---|---|---|---|
MGMT |
Management Network |
172.16.0.0/24 |
No |
.254 |
MGMT_net |
port1.VLAN20 |
IT |
192.168.20.0/24 |
Yes |
.254 |
VLAN20 address |
port1.VLAN21 |
IT LAB |
192.168.21.0/24 |
No |
.254 |
VLAN21 address |
port1.VLAN30 |
Engineering |
192.168.30.0/24 |
Yes |
.254 |
VLAN30 address |
port1.VLAN31 |
Engineering LAB |
192.168.31.0/24 |
No |
.254 |
VLAN31 address |
port1.VLAN40 |
Sales |
192.168.40.0/24 |
Yes |
.254 |
VLAN40 address |
port1.VLAN50 |
Corp Services |
192.168.50.0/24 |
Yes |
.254 |
VLAN50 address |
port1.VLAN60 |
VoIP phones |
192.168.60.0/24 |
Yes |
.254 |
VLAN60 address |
port1.VLAN70 |
IoT wireless/Staff WiFi |
192.168.70.0/23 |
Yes |
.71.254 |
VLAN70 address |
The subnets used in this guide illustrate the process of creating and using them. You may consider further subnets for devices such as PoS systems, printers, and security cameras to name a few.
Once completed, the topology should be as follows:
Complete the following steps to configure the LAN:
- If not done already, physically connect your managed switch to the FortiGate trunk port. See Managed switch connection.
- Configure the trunk port to connect to the core switch. See Trunk port.
- Define and assign the VLANs. See VLANs.