FortiAP
FortiAP devices are thin wireless access points (AP) supporting the latest Wi-Fi technologies (multi-user MIMO 802.11ac Wave 1 and Wave 2, 4x4), as well as 802.11n, 802.11AX , and the demand for plug and play deployment.
laltuzar
Staff
Staff
Article Id 318233
Description

 

This article describes the steps to gain access through SSH to a FortiAP from FortiGate.

 

Scope

 

FortiAP.

 

Solution

 

By default, the profile created on FortiGate for the managed model FortiAP is created with no management access; that is, no HTTPS SSH nor SNMP access. Therefore, no access to CLI is available when 'right-clicking' the device:

 

Cannot connect to CLI of FortiAP from FortiGateCannot connect to CLI of FortiAP from FortiGate

 

Most commonly, to fix this, there are two ways to allow SSH access:

  1. From GUI.
  2. From FortiGate CLI.

 

From GUI:

Go to WiFi & Switch Controller > FortiAP Profiles, select the name of the FotiAP Profile used on the FortiAP, edit it through GUI, and select 'OK' on the bottom to save the changes.

 

GUI configuration.GUI configuration.

 

GUI configuration.GUI configuration.

 

From CLI:

Open a new CLI on FortiGate and use the command 'set allowaccess' under 'config wireless-controller wtp-profile'.

 

FG # config wireless-controller wtp-profile

FG (wtp-profile) # edit Test-233G

FG (Test-233G) # set allowaccess
https HTTPS access.
ssh SSH access.
snmp SNMP access.

FG (Test-233G) # set allowaccess ssh

FG (Test-233G) # next

FG (wtp-profile) # end

 

The configuration should be seen as follows:

 

FG # show wireless-controller wtp-profile Test-233G
config wireless-controller wtp-profile
     edit "Test-233G"
          config platform
               set type 233G
          end
     set allowaccess ssh <---- Accesses allowed (in this case only SSH was granted permissions)
...

     next
end

 

Once the changes have been saved, the result will be the following:

 

ForitAP can now be accessed through SSH.ForitAP can now be accessed through SSH.

Contributors