FortiWLC – Multiple ESSID Mapping
Multiple ESSID Mapping The following configuration example shows how to create three ESSIDs and map them to three different VLANs to separate guest users, corporate users, and retail traffic. The first...
View ArticleFortiWLC – Utilizing Multiple IPs on a Single MAC
Utilizing Multiple IPs on a Single MAC In current implementations, a typical client machine (or station) is granted a single IP Address per wireless adapter in use. However, with the growing use of...
View ArticleFortiWLC – Time Based ESS
Time Based ESS You can schedule the availability of an ESS based on pre-define time intervals. By default, ESS profiles are always ON and available to clients/devices. By adding a timer, you can...
View ArticleFortiWLC – Redundant Ethernet
Redundant Ethernet When operating an MC1500, Ethernet redundancy can be enabled at any time by simply following the steps outlined in the following sections. However, for the following controller...
View ArticleFortiWLC – N+1 Redundancy
N+1 Redundancy The optional N+1 redundancy software feature, when implemented, allows a standby N+1 slave controller in the same subnet to monitor and seamlessly failover more than one master...
View ArticleFortiWLC – Option 43
Option 43 Option 43 is not part of any Fortinet product; it is a method for mapping controllers. With DHCP Option 43, you can specify a primary and backup controller for APs. With this configuration,...
View ArticleFortiWLC – Configuring Basic Networking for the Interface
Configuring Basic Networking for the Interface Use the following commands to configure network parameters, if necessary: To change the parameters of the FastEthernet port, use the interface...
View ArticleFortiWLC – Dual-Ethernet Operation
Dual-Ethernet Operation Dual-Ethernet support enables the controller’s second Ethernet port and provides the ability for it to work either as a redundant interface or a second active interface. If the...
View ArticleFortiWLC – Configuring Port Profiles
Configuring Port Profiles The Port Profile configuration screen allows you to create custom Ethernet profiles that can be applied to non-primary Ethernet ports on deployed devices. Certain AP models...
View ArticleFortiWLC – Link Aggregation
Link Aggregation Link aggregation allows data traffic across both Ethernet ports on AP resulting in increased throughput and redundancy. You can configure LACP only on the second interface of the AP....
View ArticleFortiWLC – Configuring Management Interfaces
Configuring Management Interfaces The Management Interfaces table (Configuration > Devices > System Settings > Management Interfaces) allows the user to control how traffic is sent from the...
View ArticleFortiWLC – Virtual Interfaces
Virtual Interfaces When operating in L3 Routing mode, Virtual Interfaces can be configured in order to act in much the same way as the standard physical interfaces on a device: they can be assigned an...
View ArticleFortiWLC – Configuring Wireless LAN Security
Configuring Wireless LAN Security In Wireless LAN System, Layer 2 and Layer 3 security options are enforced by creating Security Profiles that are assigned to an ESSID. As such, they can be tailored to...
View ArticleFortiWLC – Configure a Security Profile With the Web UI
Configure a Security Profile With the Web UI To configure Security Profile parameters, follow these steps: Click Configuration > Security > Profile. In the Security Profile Name box, type the...
View ArticleFortiWLC – Encryption Support
Encryption Support Wireless LAN System offers CCMP-AES for WPA2. WPA2 uses CCMP/AES as encryption method. Descriptions of these technologies are provided in this section. Fortinet also supports the...
View ArticleFortiWLC – Operation of the WEP Protocol
Operation of the WEP Protocol If a user activates WEP, the NIC encrypts the payload, which consists of the frame body and cyclic redundancy check (CRC), of each 802.11 frame before transmission using...
View ArticleLimitations of the WEP Protocol
Limitations of the WEP Protocol WEP is vulnerable because the relatively short IVs and keys remain static. Within a short amount of time, WEP eventually uses the same IV for different data packets. For...
View ArticleFortiWLC – Configure GRE Tunnels
Configure GRE Tunnels The GRE tunneling provides packet isolation from one endpoint to another, encapsulated within an IP tunnel to separate user traffic. GRE Tunneling facilitates configurations as...
View ArticleFortiWLC – Configure a Security Profile With the CLI
Configure a Security Profile With the CLI The controller supports the ability to define multiple Security Profiles that can be assigned to different wireless LAN extended service sets (ESS) according...
View ArticleFortiWLC – Example Security Profile with 802.1X RADIUS
Example Security Profile with 802.1X RADIUS In the following example, the Security Profile 8021x-data is created. It supports 802.1X authentication and uses the RADIUS profile main-auth to enable the...
View Article