Task 5: Manage Network Traffic Between Hubs

In this task, the student will create FortiGate firewall policies to allow or deny selective east-west network traffic between spokes in different vWAN hubs.

Create the following addresses and firewall policies on both FortiGates.

  1. Create firewall addresses for Spoke1-vHub1_VNET, Spoke2-vHub1_VNET, and Spoke3-vHub2_VNET.

    • Login to both FortiGate NVAs
    • Navigate to “Policy & Objects”
    • Select “Addresses” and “+ Create new” at the top of the Address page.
    • Name Spoke1-vHub1_VNET
    • Interface: port2
    • IP/Netmask: 192.168.1.0/24
    • Click OK

    6_5-manage-net-hubs-1 6_5-manage-net-hubs-1 6_5-manage-net-hubs-2 6_5-manage-net-hubs-2

  2. Follow the above steps to create addresses for Spoke2-vHub1_VNET (192.168.2.0/24) and Spoke3-vHub2_VNET (192.168.3.0/24), both on interface port2.

    6_5-manage-net-hubs-3 6_5-manage-net-hubs-3

  3. Create a firewall policy to allow traffic to pass from spoke1 to spoke3. Be sure to do this on both FortiGates.

    NOTE: Delete the existing port2_to_port2 policy first!

    • Click Firewall Policy

    • Click Create new

      AttributeValue
      NameSpoke1_to_Spoke3
      Incoming interfaceport2
      Outgoing interfaceport2
      SourceSpoke1-vHub1_VNET
      DestinationSpoke3-vHub2_VNET
      Schedulealways
      ServiceALL
      NATdisabled
      Enable this policyenabled
    • Click “OK”

    6_5-manage-net-hubs-4 6_5-manage-net-hubs-4 6_5-manage-net-hubs-5 6_5-manage-net-hubs-5

  4. Follow the above steps to create a firewall policy to deny traffic from spoke2 to spoke3 and another firewall policy to allow traffic from spoke3 to both spoke1 and spoke2. Be sure to do this on both FortiGates.

  5. Test connectivity between Linux spoke VMs.

    • Open serial console connections on each Linux VM and ping the other spoke VMs
      • Linux-Spoke1-VM - ping 192.168.3.4
      • Linux-Spoke2-VM - ping 192.168.3.4
      • Linux-Spoke3-VM - ping 192.168.1.4
      • Linux-Spoke3-VM - ping 192.168.2.4

Did you get the results you expected? If you did, great job!. You are done with the course.

If you did not, here are some helpful troubleshooting hints:

  • Did you enter the addresses and firewall policies on both FortiGates?
  • Double check your firewall policies. Make sure NAT is disabled.
  • Make sure the address names have the correct IP addresses/subnet.
  • Check your route table on the FortiGates. Do you still see all three VNETs listed?

If you checked all the above and you are still not getting the expected results, reach out to an instructor.

Thanks for attending!