Deploying an enterprise network for a remote office
Networking

🌐 Deploying an enterprise network for a remote office

FortiGate, Meraki, VLANs and real-world surprises

TL;DR: I deployed a segmented network with FortiGate + Meraki for a remote office. The ISP hadn’t finished provisioning the circuit, VLANs didn’t exist where they needed to, and a WiFi printer uncovered a hidden firewall rule. Everything got resolved, but not before losing hours on problems that weren’t mine.


The Project

Network for a small/medium remote office. Clear requirements: secure internet, corporate WiFi separated from guest, cloud management, and operational simplicity.

Stack:

Topology:

ISP → FortiGate 60F → Meraki MS130-24P → MR46 APs + wired devices

The firewall does all the heavy lifting: routing, NAT, DHCP, and policy enforcement. The switch distributes VLANs and powers the APs via PoE.


Segmentation

Two VLANs, two worlds:

VLANPurposeSubnetAccess
10Staff WiFi192.168.10.0/24Full LAN + internet
30Guest WiFi192.168.30.0/24Internet only, no LAN

Each VLAN with its own gateway and DHCP on the FortiGate, separate firewall policies. Guest can’t touch anything internal - exactly as it should be.


The Real Problems

1. The ISP that wasn’t ready

The physical link was active. Green light on the port. But the gateway wasn’t responding - ICMP returned “Destination unreachable”.

I spent a good while checking WAN config, default route, NAT… everything was correct on my side.

Root cause: the ISP hadn’t finished provisioning their router. The circuit was physically delivered but not logically. One call to the ISP and 30 minutes later, everything worked.

Lesson: before touching your config, verify the other side is ready. A ping to the ISP gateway before configuring anything else saves you hours.

2. Homeless VLANs

WiFi clients were getting IPs via DHCP but had zero connectivity. No internet, no LAN, nothing.

Cause: the VLAN interfaces were missing on the FortiGate. The switch was distributing VLANs correctly, the APs were assigning SSIDs to the right VLANs, but the firewall had no interfaces to receive them.

No VLAN interface on the firewall = no gateway = no routing = no life.

Lesson: validate VLANs end-to-end. Just because they exist on the switch doesn’t mean they exist where it matters.

3. The ghost printer

The WiFi printer had the correct IP on the staff VLAN. Users couldn’t ping it. Looked like a Layer 3 problem.

But when testing IPv6, the printer responded perfectly via link-local. That confirmed Layer 2 was working - the problem was IPv4-specific.

Cause: Meraki had a default rule on the SSID: Deny IPv4 Any Local LAN Any. It was blocking all IPv4 traffic between devices on the same VLAN at the AP level, before it even reached the switch.

Lesson: check the default rules on your WiFi platform. And IPv6 can be your best troubleshooting tool - if IPv6 works and IPv4 doesn’t, the problem isn’t physical connectivity.


What I Learned

Verify the ISP first. Before diagnosing your side, confirm the circuit is provisioned end-to-end. A ping to the ISP gateway is step zero.

VLANs are a system, not a component. They need to exist on the switch, on the APs, AND on the firewall. If one link in the chain is missing, nothing works.

Cloud platforms have opinions. Meraki, Fortinet, any managed platform comes with default rules that can block legitimate traffic. Don’t assume “default” means “permissive”. Once your network is running, securing access with SSO and Zero Trust becomes the next layer.

IPv6 is useful even if you don’t use it. Link-local is always there and can confirm Layer 2 is working when IPv4 is lying to you.

Document everything. Not for the report - for yourself in 6 months when something stops working and you need to remember why it was configured that way. And once your mail is flowing through the network, protecting it with MTA-STS prevents downgrade attacks.



By: Cesar Rosa Polanco - Based on a real case, with editorial support from artificial intelligence.

First time here?

Explore the key topics and articles on this blog.

Start Here →
← Back to articles Available in Spanish →