

Please keep this detail in mind when you think about the sizing of a PPPoE based setup. You can see clearly, that the PPPoE is placed inside the VLAN Tag:Īnd we have even one more secret for you: Any traffic passing a PPPoE interface (including VPN tunnels) can not be hardware accelerated by neither of the security processor chipsets ( We also have more details regarding this topic here). If you like to configure it on the CLI, you may use this block as a template: config system interfaceįor all that are interested in a wireshark trace, here we made one for you. Wait a minute or two until the PPPoE connection is shown as “up”. Set the PPPoE Login and save the configuration.Enter the VLAN ID and set the ID which your provider tells you.Choose the physical port where the VLAN is terminated.Change the Type of the Interface to “VLAN” and set a name for the interface.Navigate to “Network” and then to the “Interfaces” page on the WebGUI of your FortiGate.It is even possible to make the whole configuration directly off the WebGUI. The configuration of the FortiGate is not too complicated in those cases. The reason for this is, that in the majority of the cases the provider is using a layer 2 network (last mile) of another provider, which uses VLAN tagging to differentiate the traffic to different service providers. Some providers ( like init7.ch which already uses the Swisscom XGS-PON) do encapsulate their PPPoE traffic into a VLAN Tag (802.1Q or Q-Tagged).
