Professional Documents
Culture Documents
SoftwareSwitchWiFi-v1 5
SoftwareSwitchWiFi-v1 5
SoftwareSwitchWiFi-v1 5
Introduction
Introduced in FortiOS 3.0 MR6, software switch is a type of interface that can be configured to form a bridge
between two or more physical or wireless FortiGate interfaces. Once the physical and wireless interfaces are
added to a software switch interface, they become interface members, and as such they cannot longer be
accessed as individual interfaces. For most part, a software switch interface functions like a normal interface: it
can be configured with a single IP address, it can be added to a zone, and it can be used in the definition of
firewall policies. It should be noted however that software switches interfaces have some limitations, as described
in “Deployment Considerations”.
This document illustrates the steps to configure a software switch interface to bridge a physical and a wireless
interface, forming a single broadcast domain (Layer 2 segment). This configuration is useful in environments
where applications require physical and wireless users to be in the same Layer 2 segment. While, using a software
switch interface is a viable solution, it is critical to understand the security and performance implications that derive
from bridging physical and wireless interfaces into a single broadcast domain. These are discussed next in
“Deployment Considerations”.
Deployment Considerations
The following are important aspects that should be understood prior to using a software switch interface to bridge
physical and wireless interfaces:
• Bridging a physical and wireless interface merges two broadcast domains into one, making the scenario
more vulnerable to broadcast and multicast storms.
• Bridging a physical and wireless interface goes against the general security best common practice of
keeping the wireless and wired infrastructures separated. Connecting physical and wireless segments
together implies traffic may be forwarded between the two media types, increasing the chances for
interception, redirection and replay attacks.
• Traffic handled by a software switch interface is CPU-processed and not hardware-accelerated.
• Software switch member interfaces cannot be monitored by HA or be used as heart beat devices.
Requirements
A FortiWiFi or FortiGate appliance running FortiOS 3.0 MR6 or later is required to configure a software switch
interface.
This configuration example uses a FortiGate 50B (FortiOS 4.0 MR3-build0441) and FortiAP 220B (v4.0- build212).
The same configuration procedure has been successfully tested with a FortiWiFi 60C (FortiOS 4.0 MR3-build0441)
and FortiAP 220A (v4.0-build214).
Network Diagram
The diagram below illustrates the network topology used. The wan2 physical interface of the FG-50B connects to
the Internet, while the internal physical interface connects to a physical switch in the internal network
(192.168.40.5/24). The FortiAP connects to the same internal switch serving the internal users. Wireless is
configured with an SSID Interna_Wifi.
Note: The configuration procedure in this example assumes that the wireless interface and SSID have been
already configured, and that the FortiAP is configured and connected to the wireless controller on the FortiGate
appliance.
The first step is to create the software switch interface, assign it an interface name and configure an IP address.
Using the web-based manager go to System > Network > Interface and click on Create New.
Note: Only physical and wireless interfaces that are not been used can be associated to the software switch.
Figure 2 shows the software interface configuration used in our example, called “InternalNetwork”. The software
switch interface is associated to the “Interna_Wifi” wireless interface and the “internal” physical interface. The
software interface is configured with a static IP address of “192.168.50.1”. Administrative access is enabled for
HTTPS, PING and SSH.
Figure 3 – Software Switch Interface
Create a DHCP server and address scope to be shared by wired and wireless users. Associate the DHCP server
to the software switch interface you configured in the previous step. Using the web-based manager go to System >
Network >DHCP Server and click on Create New.
This configuration is shown in the figure below. A DHCP pool of IP addresses is defined as 192.168.50.10-
192.168.50.200, and the default gateway is set to the IP address assigned to the software switch interface, which
is 192.168.50.1
In this example a firewall policy is defined allowing any traffic from the internal network (Network_192.168.50.0) to
any destination on the wan2 interface connecting towards the Internet. NAT is also enabled as shown in Figure 4.
At this point wired and wireless users should be able to communicate, and to access the Internet.
A simple way to verify if the software switch interface configuration is working as expected is to check the DHCP
lease table. Both wired and wireless users should be given IP addresses in the same subnet, 192.168.50.0/24 in
our example.
In order to see the DHCP lease table using the web-based manager go to System >Monitor>DHCP Monitor.
Figure 6 – DHCP Monitor
Using FortiOS CLI use the following command:
Related Information
For more information on how to configure and troubleshoot FortiGate and FortiWifi appliances, please visit:
http://docs.fortinet.com/fgt.html
Copyright© 2010 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, and FortiGuard®, are registered trademarks of Fortinet, Inc., and other
Fortinet names herein may also be trademarks of Fortinet. All other product or company names may be trademarks of their respective owners.
Performance metrics contained herein were attained in internal lab tests under ideal conditions. Network variables, different network
environments and other conditions may affect performance results, and Fortinet disclaims all warranties, whether express or implied, except to
the extent Fortinet enters a binding contract with a purchaser that expressly warrants that the identified product will perform according to the
performance metrics herein. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s
internal lab tests. Fortinet disclaims in full any guarantees. Fortinet reserves the right to change, modify, transfer, or otherwise revise this
publication without notice, and the most current version of the publication shall be applicable. Certain Fortinet products are licensed under U.S.
Patent No. 5,623,600.