MS 425-16 integration with Fortinet

nst1
Building a reputation

MS 425-16 integration with Fortinet

 

We will have an infrastructure renovation.

And the equipment that we will use will be MS 425-16 (core) and MS225-48 (access)

 

Scenario 1

The MS 425-16 (core) will be connected to the Firewall (Fortinet)

 

In total, 7 Firewall cables will be connected to the MS.

 

Namely:

1 cable will be for the (VLAN & SVI) of wifi guest.

1 cable will be for the LAN (VLAN & SVI)

1 cable will be for the (VLAN & SVI) of admin switches.

 

....and so on

 

And also the MS 425 want it to be the DHCP

 

And it is intended to reach the following, as shown in the following image

 

nst1_0-1669257959526.png

 

 

 


I do not agree, because meraki does not allow me to assign an IP to a specific port.

The ports can only be access or trunk but not L3.

 

Scenario 2

I have commented having only 1 cable from the MS to the Fortinet and creating a transport VLAN between these two devices and creating the different VLANs in the MS.

 

When creating it I will already have a default route from MS425 to the fortinet and in this way it will allow me to create my VLANs and also run the DHCP

 

 

nst1_3-1669260785076.png

 

 

the scenario is possible ???
is the scenario correct ???

 

 

11 REPLIES 11
Brash
Head in the Cloud

Both are acceptable options. It mainly comes down to design preference.

One thing to be aware of with option 2 is that you'll have an SVI for each network on the MS, and therefore the ability to route between the networks. If you want to prevent this, you'll need to use Meraki ACL's which (in my opinion) will probably be harder to manage than Forti's stateful firewall rules and zones.

 

Assuming the Forti can do SVI's, a 3rd option you could consider is having a single link between the MS and the Forti with all applicable VLAN's trunked up.

nst1
Building a reputation

but how could I assign an ip to the meraki port??

Brash
Head in the Cloud

You can't apply IP addresses directly to the ports on Meraki. You will need to use Vlans and SVI's.

Speedbird1
Getting noticed

We have done something very similar except our gateways for vlans are on the fortigate, DHCP/DNS provided by fortigate 

2 X 10Gb Aggr port with trunked vlans from MS425 to Fortigate.

 

We find better visibilty and ease of management by letting the fortigate handle services. 

nst1
Building a reputation

 

That's a good idea, but we want the MS425 to manage L3 and not the Fortigate.

Both options are great MS425 or Fortigate depending on as others say your traffic needs.

 

We have no on prem servers or the need for client to client traffic, everything is cloud. Hence we let the Fortigate do all L3 services.

 

 

PhilipDAth
Kind of a big deal

Is much traffic going to be flowing between these VLANs?

 

If not, have you considered putting all the L3 interfaces on the firewall, as well as DHCP?  And only using the switches as L2 devices, rather than L3?

nst1
Building a reputation

 

Currently the firewall is L3 and DHCP we want to take that job away from the firewall

BlakeRichardson
Kind of a big deal

We are doing a similar thing with MS425-32 and a Fortigate and we went with your option 1 approach simply because of the limitation of supported ACL's on the MS, not sure if those limitations have changed but this was setup a 2-3 years ago now. 

 

If using the FGT for L3 just make sure you specify the right size hardware for the job. While switches can do your L3 routing firewalls also have the ability to scan traffic for viruses whereas a switch cannot. 

www.btr.net.nz
GIdenJoe
Kind of a big deal

In smaller network you can do L3 on the firewall instead of the coreswitch.  However in campus networks with multiple buildings or routed access designs you cannot have that and then you have to rely on switching to do the intervlan security OR you can use VRF's which is a feature that is missing on Meraki switches.  That is why the combination Catalyst in core/distribution and Meraki in the access layer is also a good design.  This is the whole reason we have Catalyst monitoring now.


On small secret about Catalyst switches and "routed interfaces".  When you create a routed port on a Catalyst switch in the background the switch creates an internal VLAN which you cannot configure starting at 4094 (if internal vlan policy is descending) and only assigns it to the "routed interface" and disables some layer 2 protocols like STP on that port.  So in essence you can do the same on your Meraki switch.  You create an otherwise unused VLAN ID and assign it only on one port and then create an SVI with the correct IP.

 

About the DHCP thing.  You should do DHCP on the device that is routing or on a separate server(which is better).  If you want to do DHCP on your coreswtich you can only do that if your gateway lives on the coreswitch.

Get notified when there are additional replies to this discussion.
Welcome to the Meraki Community!
To start contributing, simply sign in with your Cisco account. If you don't yet have a Cisco account, you can sign up.
Labels