Fortinet white logo
Fortinet white logo

Cookbook

Installing Sales

Installing Sales

  1. On Marketing, go to Network > Interfaces and edit the interface that Sales will connect to (in this example, internal14).

    Set an IP/Network Mask for the interface (in this example, 192.168.135.2/255.255.255.0).

    Under Administrative Access, enable FortiTelemetry.

  2. Go to Policy & Objects > IPv4 Policy and create a policy for traffic from Sales to External.

    Enable NAT.

  3. On Sales, go to Network > Interfaces and edit WAN2.

    Set an IP/Network Mask for the interface that is on the same subnet as the internal 14 interface on Marketing (in this example, 192.168.135.10/255.255.255.0).

  4. Edit the LAN interface.

    Set Addressing Mode to Manual, and set the IP/Network Mask to a private IP address (in this example, 10.10.135.1/255.255.255.0).

    Under Administrative Access, enable FortiTelemetry.

    If you require the FortiGate to provide IP addresses, using DHCP to devices that connect to this interface, enable DHCP Server.

    Under Networked Devices, enable Device Detection.

  5. Go to Network > Static Routes and add a route.

    Set Gateway to the IP address of the internal 14 interface on Marketing.

  6. Go to Policy & Objects > IPv4 Policy and create a policy to allow users on the Sales network to access Marketing.

  7. Go to Security Fabric > Settings to add Sales to the Security Fabric.

    Enable FortiGate Telemetry, then enter the same Group name and Group password that you set previously.

    Enable Connect to upstream FortiGate and enter the IP address of the internal 14 interface on Marketing.

    FortiAnalyzer Logging is enabled by default. Settings for the FortiAnalyzer will be retrieved when Accounting connects to External.

  8. If you have not already done so, connect WAN2 on Sales to the internal 14 interface on Marketing.

Installing Sales

Installing Sales

  1. On Marketing, go to Network > Interfaces and edit the interface that Sales will connect to (in this example, internal14).

    Set an IP/Network Mask for the interface (in this example, 192.168.135.2/255.255.255.0).

    Under Administrative Access, enable FortiTelemetry.

  2. Go to Policy & Objects > IPv4 Policy and create a policy for traffic from Sales to External.

    Enable NAT.

  3. On Sales, go to Network > Interfaces and edit WAN2.

    Set an IP/Network Mask for the interface that is on the same subnet as the internal 14 interface on Marketing (in this example, 192.168.135.10/255.255.255.0).

  4. Edit the LAN interface.

    Set Addressing Mode to Manual, and set the IP/Network Mask to a private IP address (in this example, 10.10.135.1/255.255.255.0).

    Under Administrative Access, enable FortiTelemetry.

    If you require the FortiGate to provide IP addresses, using DHCP to devices that connect to this interface, enable DHCP Server.

    Under Networked Devices, enable Device Detection.

  5. Go to Network > Static Routes and add a route.

    Set Gateway to the IP address of the internal 14 interface on Marketing.

  6. Go to Policy & Objects > IPv4 Policy and create a policy to allow users on the Sales network to access Marketing.

  7. Go to Security Fabric > Settings to add Sales to the Security Fabric.

    Enable FortiGate Telemetry, then enter the same Group name and Group password that you set previously.

    Enable Connect to upstream FortiGate and enter the IP address of the internal 14 interface on Marketing.

    FortiAnalyzer Logging is enabled by default. Settings for the FortiAnalyzer will be retrieved when Accounting connects to External.

  8. If you have not already done so, connect WAN2 on Sales to the internal 14 interface on Marketing.