This article describes the steps to gain access through SSH to a FortiAP from FortiGate.
FortiAP.
By default, the profile created on FortiGate for the managed model FortiAP is created with no management access; that is, no HTTPS SSH nor SNMP access. Therefore, no access to CLI is available when 'right-clicking' the device:
Most commonly, to fix this, there are two ways to allow SSH access:
From GUI:
Go to WiFi & Switch Controller > FortiAP Profiles, select the name of the FotiAP Profile used on the FortiAP, edit it through GUI, and select 'OK' on the bottom to save the changes.
From CLI:
Open a new CLI on FortiGate and use the command 'set allowaccess' under 'config wireless-controller wtp-profile'.
FG # config wireless-controller wtp-profile
FG (wtp-profile) # edit Test-233G
FG (Test-233G) # set allowaccess
https HTTPS access.
ssh SSH access.
snmp SNMP access.
FG (Test-233G) # set allowaccess ssh
FG (Test-233G) # next
FG (wtp-profile) # end
The configuration should be seen as follows:
FG # show wireless-controller wtp-profile Test-233G
config wireless-controller wtp-profile
edit "Test-233G"
config platform
set type 233G
end
set allowaccess ssh <---- Accesses allowed (in this case only SSH was granted permissions)
...
next
end
Once the changes have been saved, the result will be the following:
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.