

Network variables, different network environments and other conditions may affect performance results.

Performance metrics contained herein were attained in internal lab tests under ideal conditions, and performance may vary.

All other product or company names may be trademarks of their respective owners. Fortinet®, FortiGate®, and FortiGuard®, are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be trademarks of Fortinet. With the similar setup, instead of running PPPoE on vlan wan ports, I took 2 routers (assuming wan1 for Router_A and wan2 for Router_B), configured the ISP's credential in routers then connecting both of the routers to wan1 and wan2 with almost similar configuration as follow: policy type: firewallĪnd everything works fine.Ap064-20120425 Copyright© 2012 Fortinet, Inc. They are able to negotiate an IP from the DHCP server as well as obtained a DNS server from the ISP itself.

Similarly for Office_lan: policy type: firewallīut when I inspect the Foward Traffic log, there are no internet connection from either Office_lan or Access_point. Outgoing interface: ISP_A_vlan, ISP_B_vlanĮnable NAT: true (use destination interface address) Next, I created a policy for both ISP_A_vlan and ISP_B_vlan with the following configuration: policy type: firewall Of the 16 ports I have, I've separated it into 8 different networks in pair of 2 ports per network with DHCP enabled, where it serves different IP in different network pair. I created VLANs for both wan1 and wan2 (assuming ISP_A_vlan and ISP_B_vlan) with all ISPs' credential set and I am able to connect and obtain an IP from the ISP, which is fine. I have 2 ISPs using PPPoE connection that runs on VLAN 500. I am fairly new towards Fortigate firewalls and I am trying to set up one FortiGate 100D running firmware v5.0 as a router for a hotel network.
