Wireless Networking
New wireless networking features include:
- FortiAP Management
- Captive Portal for WiFi
- New Wireless Health Charts
- RADIUS Accounting
- 802.11ac and DARRP Support
- Date Channel DTLS in Kernel
FortiAP Management
How FortiAP units are managed by a FortiGate unit has changed in several ways.
Manually Selecting AP Profiles
AP profiles are no longer assigned automatically. Instead, a default or custom profile must be chosen when the connection to the FortiAP unit is configured.
The Background Scan option has also been replaced by Spectrum Analysis (for more information, see New Wireless Health Charts) and either 20MHz or 40MHz must be selected for Radio 1’s channel width.
You can choose to override some options set in the profile for a particular FortiAP unit. To do this, go to WiFi Controller > Managed Access Points > Managed FortiAPs and, under Wireless Settings, select Override Settings. This allows you to change WiFi radio settings, including SSIDs, TX power, and rogue AP scanning. This can also be configured in the CLI:
Syntax
config wireless-controller wtp
edit <name>
set override-profile enable
end
end
AP Scanning
AP scanning, including rogue AP detection, is now part of WIDS Profiles. It can be found by going to WiFi Controller > WiFi Network > WIDS Profiles. It can also be configured through the CLI:
Syntax
config wireless-controller wids-profile
edit 0
set ap-scan {enable | disable}
set ap-bgscan-period <interval>
set ap-bgscan-intv <interval>
set ap-bgscan-duration <interval>
set ap-bgscan-idle <interval>
set ap-bgscan-rpot-intv <interval>
set ap-bgscan-disable-day <day>
set ap-fgscan-repot-intv <interval>
set rogue-scan {enable | disable}
end
end
Radio Settings Summary
The Radio Settings Summary table can be found by going to WiFi Controller > Managed Access Points > Managed FortiAPs and editing a FortiAP unit. The table shows information on the FortiAP unit's Radio 1 and 2 (if applicable), including settings, channels, and SSIDs.
CLI Console Access
The CLI console on a FortiGate unit can now be used to connect directly to a managed FortiAP unit that has been configured to enable login-enable. To access the FortiAP, use the command execute telnet <ip>
, using the IP address of the FortiAP.
Telnet must be used, as FortiAPs do not support SSH/HTTPS admin access. |
The console can also now be accessed by going to WiFi Controller > Managed Access Points > Managed APs and selecting the option Connect to CLI. The console will appear in a pop-up window.
If login-enable
is set to default
or disable
on the FortiAP unit, or the FortiAP is offline, this option will not appear.
Split Tunneling for Wireless Traffic
Split tunneling can now be used for wireless traffic, allowing you to optimize WiFi traffic flow by directing only corporate traffic back to the FortiGate unit's wireless controller, while local application traffic remains local. With split tunneling, a remote user associates with a single SSID, can get access to corporate resources (for example, a mail server) and local resources (for example, a local printer).
Split tunneling should be only used for SSIDs in tunnel mode. |
Syntax
- Enabling split tunnelling for an SSID.
config wireless-controller vap
edit <name>
set split-tunneling enable
end
end
- Setting the IP lists for split tunneling
config w-c {wtp-profile | wtp}
set split-tunneling-acl-local-ap-subnet enable
config split-tunneling-acl
edit <ID>
set id <ID>
set dest-ip <IP_address>
end
end
Captive Portal for WiFi
Several changes have been made for captive portal security on wireless networks. Wireless captive portals can also use the new features for all captive portals described in Authentication.
New Configuration Options
The following options can now be configured for captive portals that use wireless interfaces:
- Security exempt list names can be added to a captive portal. This option is only available when user groups are selected as part of the SSID configuration, rather than being a match for groups in the security policy.
- URL redirection is available after the disclaimer/authentication screen.
- Four types of portals are available: authentication, authentication with disclaimer, disclaimer only, or email collection. When the mode is email collection or disclaimer only, the options for setting user groups or having an external captive portal are not available.
Syntax
config wireless-controller vap
edit <name>
set security captive-portal
set portal type {auth | auth+disclaimer | disclaimer | email-collect}
set security-exempt-list <name of list>
end
end
WPA Personal Security + Captive Portal
A new option has also been added that uses WPA Personal security as well as a captive portal. This option also allows groups to be imported from the policy.
New Wireless Health Charts
Two new charts have been added to the Wireless Health Monitor showing spectrum analysis information on the sources of wireless interference.
In order for these widgets to appear, spectrum analysis must first be enabled. This is done by editing the AP profile used by your FortiAP units and selecting Spectrum Analysis for all applicable radios.
Spectrum analysis can also be enabled in the CLI.
Syntax
config wireless-controller wtp-profile
edit <name>
config <radio>
set spectrum-analysis enable
end
end
end
After spectrum analysis has been enabled, view the Top Wireless Interference widget found in the Wireless Health Monitor. A chart icon will appear in the Channel column. Selecting this icon will open the new WiFi charts: Spectrum Analysis and Top Wireless Interference.
The Spectrum Analysis chart shows WiFi signal interference as detected by a particular FortiAP.
The Top Wireless Interference chart shows SSIDs that are interfering with a particular FortiAP unit.
RADIUS Accounting
RADIUS accounting is now supported for wireless networks, allowing RADIUS accounting messages to be sent that contain a wireless user's name and IP address.
If an accounting server has been enabled for RADIUS, the wireless client information will be sent to it.
802.11ac and DARRP Support
802.11ac support has been added for FortiOS 5.2, allowing a FortiGate unit to manage FortiAP models 221C and 320C. Distributed Automatic Radio Resource Provisioning (DARRP) is also supported for 802.11ac radio.
Syntax
config wireless-controller wtp-profile
edit {fap221c | fap320c}
config radio-2
set darrp enable
end
end
Date Channel DTLS in Kernel
Data channel Datagram Transport Layer Security (DTLS) can now be enabled in kernel using the CLI.
Syntax
config wireless-controller wtp-prof
edit wtpprof
set dtls-in-kernel enable
end
end