Hi, so the:
Port 1- no ip assigned
port 1 (sub1) - 172.16.0.0/24 (vlan 7)
port 1 (sub2) - 172.16.1.0/24 (vlan 8)
scenario on FortiGate should be read as:
Port 1's Sub1 port ...is a VLAN 7 tagged member
Port 1's Sub2 port ...is a VLAN 8 tagged member
and, technically speaking, the Port 1 itself (call it Sub 0 port if you want) is simply removed from having an untagged membership on, tipically, VLAN 1 (or, better, it doesn't have a VLAN assignment at all)...which is possible because, acting as a logical port carrying more than one VLAN (operating in "trunk mode" as we call it), it isn't orphaned of at least one VLAN membership (indeed it belong to VLAN 7 and also VLAN 8, both tagged).
The peering interface should then be a logical interface (thus operating in trunk mode) - either a single physical port or an aggregate port (a LAG <- if the same is on the FortiGate side) - tagged member of VLAN 7 and VLAN 8 only.
Original Message:
Sent: Jun 13, 2025 08:54 AM
From: ktimm@labconnect.com
Subject: LACP between HP 1950 and FortiGate Firewall
After a bit of time I've learned that the "default" interface on a fortinet is located on the "Main" interface. IE, let's say you've got something like
Port 1 - 172.16.0.0/24 (Vlan 7)
Port 1 (sub1) - 172.16.1.0/24 (Vlan 8)
Port 1 (sub2) - 172.16.2.0/24 (Vlan 9)
Then your "default vlan" or "native vlan" (whatever you want to call it) in the above case is Vlan 7. It's the vlan that's on the "main" interface. Now if you have something like this
Port 1- no ip assigned
port 1 (sub1) - 172.16.0.0/24 (vlan 7)
port 1 (sub2) - 172.16.1.0/24 (vlan 8)
Then you kind of don't have a "native vlan" on port 1, so if your native vlan on the other side is vlan 7, port1 (sub1) won't pick up that traffic. You'll have to change the native vlan on the other side to something other than vlan 7, so that the other side will send vlan 7 as tagged traffic.
Original Message:
Sent: Jun 12, 2025 09:16 AM
From: edalgic
Subject: LACP between HP 1950 and FortiGate Firewall
Hello Ktimm,
Thank you very much for your explanations. We are confident that the method you provided works perfectly and thank you very much for saving us from a major issue.
Best Regards.
Original Message:
Sent: Feb 03, 2025 01:28 PM
From: ktimm@labconnect.com
Subject: LACP between HP 1950 and FortiGate Firewall
I think I figured out the issue, but I won't know for sure until our next maintenance window.
All the vlan interfaces on the Fortinet are sub-interfaces of the LACP-Trunk interface. On the HP, I had the PVID set as 1 and allowed vlans set as all. I think the issue is a vlan tagging issue. The fortinet is expecting vlan 1 to have a tag, not just be the native vlan and the HP wasn't tagging vlan 1. I tested by changing the PVID on the HP to 4094 and created a dummy LACP-Test interface on the Fortinet, with a sub-interface on vlan 1 that was an unused IP on the network. Plug up the ports, the LACP comes up and I get pings across! So I can't be 100% sure until our next maintenance window, but it looks like it was a vlan tagging issue.
Original Message:
Sent: Feb 03, 2025 08:24 AM
From: ktimm@labconnect.com
Subject: LACP between HP 1950 and FortiGate Firewall
I'm attempting to replace my current firewall. Right now, we've just got a single line running from the HP 1950 to the watchguard. In order to build in some redundancy, I'm wanting to setup a LACP connection from the 1950 to the FortiGate. As far as I can tell, everything is configured correctly.
- interface Bridge-Aggregation1
- port link-type trunk
- port trunk permit vlan all
- interface Ten-GigabitEthernet1/0/1
- port link-type trunk
- port trunk permit vlan all
- port link-aggregation group 1
- interface Ten-GigabitEthernet1/0/4
- port link-type trunk
- port trunk permit vlan all
- port link-aggregation group 1
The configuration on the Fortinet is correct. In this case, I've got the LACP set as static, trying to bring it up, but I also tried with the LACP at Dynamic
- interface Bridge-Aggregation1
- port link-type trunk
- port trunk permit vlan all
- link-aggregation mode dynamic
But it was the same result. I'd get a physical connection between the devices, but when I tried to ping from the 1950 to the FortiGate or from the FrotiGate to the 1950, I got no response. Any idea why I couldn't get traffic to flow between them?