EasyManua.ls Logo

Fortinet FortiWAN - Page 50

Fortinet FortiWAN
182 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Configuring Network Interface (Network Setting) How to set up your FortiWAN
As the illustration, FortiWAN port3 has been mapped to LAN port via [System / Network Setting / VLAN and Port
Mapping] (See "VLAN and Port Mapping"), and is assigned with private IP 192.168.34.254. Enter this IP address in
the field [IP(s) on Localhost]. For hosts in LAN, port3 (192.168.34.254) serves as gateway as well. Enter the netmask
(255.255.255.0) for the subnet in the field [Netmask]. Select the LAN port Check the field in [Enable DHCP], to
allocate IP address (any of 192.168.34.175~192.168.34.199) dynamically via DHCP to PCs in LAN.
If any hosts in LAN require static IP addresses, then enter in [Static Mapping] the IP addresses to designate, and MAC
addresses of the PCs as well.
Check the field in [NAT Subnet for VS], which is an optional choice. When users in LAN or DMZ access the WAN IP of
virtual server, their packets may bypass FortiWAN and flow to internal server directly. This function can translate the
source IP address of the users' packets into IP address of FortiWAN, to ensure the packets flow through FortiWAN. If
no check is made, the system will determine which IP address it may translate into by itself. Similarly, to deploy an
IPv6 private LAN on FortiWAN port4 which has been mapped to LAN port, with IPv6 address 2001:a:b:cd08::1 served
as gateway for PCs in LAN. Check the field in [Enable SLAAC] or [Enable DHCPv6 Service] to allocate IP addresses
dynamically to PCs in LAN. [NAT Subnet for VS] is not supported in IPv6 private LAN. The SLAAC and DHCPv6 in
FortiWAN are designed to work together, which the SLAAC responses router advertisement (including default gateway
and DNS server) to a host and DHCPv6 responses the host an appropriate IPv6 address.
Static Routing Subnet
[Static Routing Subnet] is useful when in LAN a router .is used to cut out a separate subnet which does not connect to
FortiWAN directly. The topology is similar to [Static Routing Subnet: Subnet in DMZ] mentioned previously, and the
only difference is this example is set in LAN rather than in DMZ. In this topology below, a subnet 192.168.99.x is
located in the LAN and connects to router 192.168.34.50, while another subnet 192.168.34.x is located on the LAN
port as well, but connects to FortiWAN directly. The configurations here indicate how FortiWAN to route packets to
subnet 192.168.99.x.
FortiWAN Handbook
Fortinet Technologies Inc.
50

Table of Contents

Other manuals for Fortinet FortiWAN

Related product manuals