Fortinet white logo
Fortinet white logo

New Features

Allow VLAN sub-interfaces to be used in virtual wire pairs 7.2.4

Allow VLAN sub-interfaces to be used in virtual wire pairs 7.2.4

Note

This information is also available in the FortiOS 7.2 Administration Guide:

VLAN sub-interfaces, such as regular 802.1Q and 802.1ad (QinQ), are allowed to be members of a virtual wire pair.

Example

In this example, the FortiGate has two VLAN interfaces. The first interface is a QinQ (802.1ad) interface over the physical interface port3. The second interface is a basic 802.1Q VLAN interface over physical interface port5. These two interfaces are grouped in a virtual wire pair so that bi-directional traffic is allowed. This example demonstrates ICMP from the client (3.3.3.4) sent to the server (3.3.3.1).

To configure VLAN sub-interfaces in a virtual wire pair:
  1. Configure the QinQ interfaces:

    config system interface
        edit "8021ad-port3"
            set vdom "vdom1"
            set vlan-protocol 8021ad
            set device-identification enable
            set role lan
            set snmp-index 31
            set interface "port3"
            set vlanid 3
        next
        edit "8021Q"
            set vdom "vdom1"
            set device-identification enable
            set role lan
            set snmp-index 32
            set interface "8021ad-port3"
            set vlanid 33
        next
    end
  2. Configure the 802.1Q interface:

    config system interface
        edit "8021q-port5"
            set vdom "vdom1"
            set device-identification enable
            set role lan
            set snmp-index 33
            set interface "port5"
            set vlanid 5
        next
    end
  3. Configure the virtual wire pair:

    config system virtual-wire-pair
        edit "VWP1"
            set member "8021Q" "8021q-port5"
        next
    end
  4. Configure the firewall policy:

    config firewall policy
        edit 1
            set name "1"
            set srcintf "8021Q" "8021q-port5"
            set dstintf "8021Q" "8021q-port5"
            set action accept
            set srcaddr "all"
            set dstaddr "all"
            set schedule "always"
            set service "ALL"
        next
    end
To verify that bi-directional traffic passes through the FortiGate:
# diagnose sys session filter policy  1
# diagnose sys session list

session info: proto=1 proto_state=00 duration=18 expire=42 timeout=0 flags=00000000 socktype=0 sockport=0 av_idx=0 use=3
origin-shaper=
reply-shaper=
per_ip_shaper=
class_id=0 ha_id=0 policy_dir=0 tunnel=/ vlan_cos=0/0
state=may_dirty br npu 
statistic(bytes/packets/allow_err): org=168/2/1 reply=168/2/1 tuples=2
tx speed(Bps/kbps): 0/0 rx speed(Bps/kbps): 0/0
orgin->sink: org pre->post, reply pre->post dev=56->55/55->56 gwy=0.0.0.0/0.0.0.0
hook=pre dir=org act=noop 3.3.3.4:3072->3.3.3.1:8(0.0.0.0:0)
hook=post dir=reply act=noop 3.3.3.1:3072->3.3.3.4:0(0.0.0.0:0)
src_mac=08:5b:0e:71:bf:c6  dst_mac=d4:76:a0:5d:b2:de
misc=0 policy_id=1 pol_uuid_idx=534 auth_info=0 chk_client_info=0 vd=3
serial=00005f6c tos=ff/ff app_list=0 app=0 url_cat=0
rpdb_link_id=00000000 ngfwid=n/a
npu_state=0x4000c00 ofld-O ofld-R
npu info: flag=0x81/0x81, offload=8/8, ips_offload=0/0, epid=187/156, ipid=156/187, vlan=0x0005/0x0021
vlifid=156/187, vtag_in=0x0005/0x0021 in_npu=1/1, out_npu=1/1, fwd_en=0/0, qid=0/5
total session 1

Allow VLAN sub-interfaces to be used in virtual wire pairs 7.2.4

Allow VLAN sub-interfaces to be used in virtual wire pairs 7.2.4

Note

This information is also available in the FortiOS 7.2 Administration Guide:

VLAN sub-interfaces, such as regular 802.1Q and 802.1ad (QinQ), are allowed to be members of a virtual wire pair.

Example

In this example, the FortiGate has two VLAN interfaces. The first interface is a QinQ (802.1ad) interface over the physical interface port3. The second interface is a basic 802.1Q VLAN interface over physical interface port5. These two interfaces are grouped in a virtual wire pair so that bi-directional traffic is allowed. This example demonstrates ICMP from the client (3.3.3.4) sent to the server (3.3.3.1).

To configure VLAN sub-interfaces in a virtual wire pair:
  1. Configure the QinQ interfaces:

    config system interface
        edit "8021ad-port3"
            set vdom "vdom1"
            set vlan-protocol 8021ad
            set device-identification enable
            set role lan
            set snmp-index 31
            set interface "port3"
            set vlanid 3
        next
        edit "8021Q"
            set vdom "vdom1"
            set device-identification enable
            set role lan
            set snmp-index 32
            set interface "8021ad-port3"
            set vlanid 33
        next
    end
  2. Configure the 802.1Q interface:

    config system interface
        edit "8021q-port5"
            set vdom "vdom1"
            set device-identification enable
            set role lan
            set snmp-index 33
            set interface "port5"
            set vlanid 5
        next
    end
  3. Configure the virtual wire pair:

    config system virtual-wire-pair
        edit "VWP1"
            set member "8021Q" "8021q-port5"
        next
    end
  4. Configure the firewall policy:

    config firewall policy
        edit 1
            set name "1"
            set srcintf "8021Q" "8021q-port5"
            set dstintf "8021Q" "8021q-port5"
            set action accept
            set srcaddr "all"
            set dstaddr "all"
            set schedule "always"
            set service "ALL"
        next
    end
To verify that bi-directional traffic passes through the FortiGate:
# diagnose sys session filter policy  1
# diagnose sys session list

session info: proto=1 proto_state=00 duration=18 expire=42 timeout=0 flags=00000000 socktype=0 sockport=0 av_idx=0 use=3
origin-shaper=
reply-shaper=
per_ip_shaper=
class_id=0 ha_id=0 policy_dir=0 tunnel=/ vlan_cos=0/0
state=may_dirty br npu 
statistic(bytes/packets/allow_err): org=168/2/1 reply=168/2/1 tuples=2
tx speed(Bps/kbps): 0/0 rx speed(Bps/kbps): 0/0
orgin->sink: org pre->post, reply pre->post dev=56->55/55->56 gwy=0.0.0.0/0.0.0.0
hook=pre dir=org act=noop 3.3.3.4:3072->3.3.3.1:8(0.0.0.0:0)
hook=post dir=reply act=noop 3.3.3.1:3072->3.3.3.4:0(0.0.0.0:0)
src_mac=08:5b:0e:71:bf:c6  dst_mac=d4:76:a0:5d:b2:de
misc=0 policy_id=1 pol_uuid_idx=534 auth_info=0 chk_client_info=0 vd=3
serial=00005f6c tos=ff/ff app_list=0 app=0 url_cat=0
rpdb_link_id=00000000 ngfwid=n/a
npu_state=0x4000c00 ofld-O ofld-R
npu info: flag=0x81/0x81, offload=8/8, ips_offload=0/0, epid=187/156, ipid=156/187, vlan=0x0005/0x0021
vlifid=156/187, vtag_in=0x0005/0x0021 in_npu=1/1, out_npu=1/1, fwd_en=0/0, qid=0/5
total session 1