Quantcast
Channel: Fortinet GURU
Browsing all 2380 articles
Browse latest View live

FortiWLC – Multiple ESSID Mapping

Multiple ESSID Mapping The following configuration example shows how to create three ESSIDs and map them to three different VLANs to separate guest users, corporate users, and retail traffic. The first...

View Article


FortiWLC – Utilizing Multiple IPs on a Single MAC

Utilizing Multiple IPs on a Single MAC In current implementations, a typical client machine (or station) is granted a single IP Address per wireless adapter in use. However, with the growing use of...

View Article


FortiWLC – Time Based ESS

Time Based ESS You can schedule the availability of an ESS based on pre-define time intervals. By default, ESS profiles are always ON and available to clients/devices. By adding a timer, you can...

View Article

FortiWLC – Redundant Ethernet

Redundant Ethernet When operating an MC1500, Ethernet redundancy can be enabled at any time by simply following the steps outlined in the following sections. However, for the following controller...

View Article

FortiWLC – N+1 Redundancy

N+1 Redundancy The optional N+1 redundancy software feature, when implemented, allows a standby N+1 slave controller in the same subnet to monitor and seamlessly failover more than one master...

View Article


FortiWLC – Option 43

Option 43 Option 43 is not part of any Fortinet product; it is a method for mapping controllers. With DHCP Option 43, you can specify a primary and backup controller for APs. With this configuration,...

View Article

FortiWLC – Configuring Basic Networking for the Interface

Configuring Basic Networking for the Interface Use the following commands to configure network parameters, if necessary: To change the parameters of the FastEthernet port, use the interface...

View Article

FortiWLC – Dual-Ethernet Operation

Dual-Ethernet Operation Dual-Ethernet support enables the controller’s second Ethernet port and provides the ability for it to work either as a redundant interface or a second active interface. If the...

View Article


FortiWLC – Configuring Port Profiles

Configuring Port Profiles The Port Profile configuration screen allows you to create custom Ethernet profiles that can be applied to non-primary Ethernet ports on deployed devices. Certain AP models...

View Article


FortiWLC – Link Aggregation

Link Aggregation Link aggregation allows data traffic across both Ethernet ports on AP resulting in increased throughput and redundancy. You can configure LACP only on the second interface of the AP....

View Article

FortiWLC – Configuring Management Interfaces

Configuring Management Interfaces The Management Interfaces table (Configuration > Devices > System Settings > Management Interfaces) allows the user to control how traffic is sent from the...

View Article

FortiWLC – Virtual Interfaces

Virtual Interfaces When operating in L3 Routing mode, Virtual Interfaces can be configured in order to act in much the same way as the standard physical interfaces on a device: they can be assigned an...

View Article

FortiWLC – Configuring Wireless LAN Security

Configuring Wireless LAN Security In Wireless LAN System, Layer 2 and Layer 3 security options are enforced by creating Security Profiles that are assigned to an ESSID. As such, they can be tailored to...

View Article


FortiWLC – Configure a Security Profile With the Web UI

Configure a Security Profile With the Web UI To configure Security Profile parameters, follow these steps: Click Configuration > Security > Profile. In the Security Profile Name box, type the...

View Article

FortiWLC – Encryption Support

Encryption Support Wireless LAN System offers CCMP-AES for WPA2. WPA2 uses CCMP/AES as encryption method. Descriptions of these technologies are provided in this section. Fortinet also supports the...

View Article


FortiWLC – Operation of the WEP Protocol

Operation of the WEP Protocol If a user activates WEP, the NIC encrypts the payload, which consists of the frame body and cyclic redundancy check (CRC), of each 802.11 frame before transmission using...

View Article

Limitations of the WEP Protocol

Limitations of the WEP Protocol WEP is vulnerable because the relatively short IVs and keys remain static. Within a short amount of time, WEP eventually uses the same IV for different data packets. For...

View Article


FortiWLC – Configure GRE Tunnels

Configure GRE Tunnels The GRE tunneling provides packet isolation from one endpoint to another, encapsulated within an IP tunnel to separate user traffic. GRE Tunneling facilitates configurations as...

View Article

FortiWLC – Configure a Security Profile With the CLI

Configure a Security Profile With the CLI The controller supports the ability to define multiple Security Profiles that can be assigned to different wireless LAN extended service sets (ESS) according...

View Article

FortiWLC – Example Security Profile with 802.1X RADIUS

Example Security Profile with 802.1X RADIUS In the following example, the Security Profile 8021x-data is created. It supports 802.1X authentication and uses the RADIUS profile main-auth to enable the...

View Article
Browsing all 2380 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>