FortiAP
FortiAP devices are thin wireless access points (AP) supporting the latest Wi-Fi technologies (multi-user MIMO 802.11ac Wave 1 and Wave 2, 4x4), as well as 802.11n, 802.11AX , and the demand for plug and play deployment.
GautSikk
Staff
Staff
Article Id 276137
Description

 

This article describes troubleshooting steps when it is impossible to get FortiAP connected to FortiGate.

 

Scope

 

Consolidated Troubleshooting for the FortiAP to get Online over FortiGate.

 

Solution

 

Before starting,  make to have followed the step-by-step LAN Edge Deployment Guide as many of the basic issues will be addressed in this guide. 

 

First Time installation of FortiAP Issues a Checklist.  

Note:

If the FortiAP was online once it will show disconnected as per the below screenshot under managed FortiAPs. If the FortiAP was never online, it will not show the FortiAP.

 

GautSikk_0-1695760095633.png

 

CLI command and output that shows FortiAP offline:

 

cfg -s

fap-get-status


Steps and Actions:

  1. Check for the hardware platform, which shows the number of APs supported per the FortiGate Model: Fortinet Data sheets


Note:

The above link is just an example to find the appropriate FortiGate model and check for the number of FortiAP supported.

 

As per the support included in the specs sheet for the number of APs supported in tunnel mode or bridge mode. If tunnel mode capacity is over then it is necessary to change the WTP mode to remote.

 

config wireless-controller wtp

    edit FAP22B3U11005354

        set wtp-mode remote

        set wtp-profile 220B_bridge

end

 

Note:

Remote mode only supports only local bridge mode SSIDs.

 

Related article:

Technical Tip: Maximum managed FortiAPs in FortiGate managed FortiAP page shows lesser value than da...

 

If it is not supported.

Next Steps:

Try bringing up the FortiAP on FortiLanCloud or another FortiGate Firewall or ask him to talk to the sales or accounts team as no more FortiAP ssupported for the given FortiGate.

  1. Check the cabling Issue and LED light status on the Access Points:

 

GautSikk_1-1695760095636.png

 

  1. If the light status shows no cabling Issue, move to Step 3.

  2. If the light status shows bad or suspect cabling Issues:

    1. Try changing the Cable.
    2. Try changing the Switch port if connected to the Switch.
    3. Try to use the well-known POE

  1. Check for the compatibility of the firmware version on release notes and check for the platform profile on the FGT along with the supportability matrix.

    URL for release notes: https://support.fortinet.com/Download/FirmwareImages.aspx

    URL for the supportability matrix: https://docs.fortinet.com/product/fortiap/7.2

  2. If the platform profile/FortiAP Model is available on the FortiAP profiles, move to Step 4.

  3. If it is a FortiAP-U/Meru firmware:  

 

Action: 

Get the console access for the FortiAP.

 

Stop at uboot on FortiAP , when prompted:

 

Password: fap22b1!$

set_image_id fap_default

nvram save

savenv

reset

 

If not able to stop at uboot, let the FortiAP boot with the Meru image.On prompting for a password, use the Serial number as the password.

Use command <bootimg imageid 2> to boot with the FortiAP Image.

 

  1. Make sure the FortiAP is not discovered on the cloud, if FortiAP is discovered on the cloud it will not come online on the FortiGate. Ask the user for a cloud account or wcfg output, look for AC_DISCOVERY_TYPE.

  2. If FortiAP is on the Cloud.

 

Action: 

Take the FortiAP serial number, contact Fortinet support, and get the FortiAP removed.

  1. If the FortiAP is discovered on the Cloud and the Customer wants to move it to the FortiGate Firewall, undeploy the AP from the Cloud and move it to the FortiGate.
  2. If FortiAP is not on Cloud, move to step 5:

  1. If the FortiAP is still not up, check for the country or region code of the FortiAP .
  1.  

    cw_diag -c all-countries

     

The following CLI command helps to view a list of the country and region codes, and regulatory domains supported by Fortinet:

 

  1. If the code is incorrect:


Action:

Ask the customer to talk to his sales and get the replaced AP with the correct country settings.

 

  1. Check whether C compatibility mode is needed or not. For any FortiAP with a serial number starting with FAPC, check for the below.

 

config wireless-controller setting

    set fapc-compatibility {enable | disable}

end

 

  1. If AP is C-compatible:

Action: enable it.

  1. If FortiAP is not C-compatible:
    Action: Do not change the default values.

 

  1. Make sure the FortiAP has an IP address.

 

  • This can be validated on the DHCP monitor under the monitor tab in GUI.
  • SSH or CLI access to FortiGate Firewall Terminal, check for the arp –a whether we are seeing the arp entry from the FortiAP .

 

  1. Check for reachability of the FortiAP/any other device from that port to the FortiGate interface on which the security fabric connection is enabled or the interface on which the customer intends to keep the FortiAP online using ping (make sure ping is enabled on that interface).

 

  • If FortiAP does not connect to FortiGate.


Action:

Proceed to Step 10.

 

  • If FortiAP does connect to FortiGate.


Action:

Issue  is resolved.

 

 

  • If AP does not connect to FortiGate.

 

Action: Proceed to Step 10.

 

  • If AP does connect to FortiGate.

 

Action: Issue resolved.

 

  • If a FortiAP-U is not coming online and the Customer says the Power light is coming and going.

Action:  Get the console Access of the FortiAP-U and we may see it is continuously crashing and not able to discover the FortiGate: 

 

GautSikk_2-1695760095639.png

 

  • Stop at uboot on FortiAP , when prompted:

 

Password: fap22b1!$

# set_image_id fap_default

# nvram save

# savenv

# reset

 

  • If the above point did not help, then Stop at uboot on FortiAP , when prompted:
  •  

Password: fap22b1!$

# set_auto_learning off

# set_image_id meru_default

# nvram save

# savenv

# reset

 

  • Let the AP boot with the meru image.

On prompting for a password, use the Serial number as the password.

Use command <bootimg imageid 2> to boot with the FortiAP Image.

 

  1. For any configuration issues, follow the below link: Connecting FortiAP

 

  1. Check for packets reaching the FortiGate using diag sniff for CAPWAP and see if the FortiGate is responding. 

 

diagnose sniff packet <interface_name> “port 5246” 4

 

With this, it is possible to see the two-way communication of the FortiGate with the FortiAP.

 

  • If no CAPWAP connection:

Action: Proceed to step 11.

 

  • If CAPWAP connection:

Action: Issue resolved.

 

  1. Check for the AP console logs using wcfg to check the state of discovery or if the AP is going into a sulking state.

 

1(static) → 2(dhcp) → 3(dns) → 7(fortiapcloud) → 5(multicast) → 6(broadcast) 

 

If it is stuck at one phase, contact L3 support to get the below logs.

diag wireless-controller wlac wtp_filter FP112B3X13000193 0-192.168.6.8:5246 2 <----- Replace the serial number and IP address of the FortiAP.

di de console timestamp en

di de application cw_acd 0x7ff

di de en

 

  1. Check for crash logs using the AP console.

 

kp

crash

cw_diag kernel-panic (Show the kernel panic output).

dmesg

cw_diag show all

diagnose wireless-controller  wlac -c wtp (Shows the status of the AP).

 

  • If kernel panic is seen in the output.

Action: Contact Fortinet Support

 

  • If no kernel panic is seen.

Action: Proceed to step 13.

 

  1. If the already connected FortiAP goes offline from the FortiGate, checking the reason why the FortiAP became offline from FortiGate is necessary by using the below command. There will be a different article for AP, which was once online now disconnected.

diagnose  wireless-controller  wlac -c wtp

 

Example:

diagnose  wireless-controller  wlac -c wtp
-----------------------------WTP    1----------------------------
WTP vd               : root

    vfid             : 0

    id               : FP433FTF20001356

    uuid             : 4eb674cc-728f-51ed-f368-4ff04362c41d

    mgmt_vlanid      : 0

    region code      : A

    regcode status   : valid

    refcnt           : 3 own(1) wtpprof(1) ws(1)

    apcfg status     : N/A,N/A cfg_ac=0.0.0.0:0 val_ac=0.0.0.0:0 cmds T 0 P 0 U 0 I 0 M 0

    apcfg cmd details:

    plain_ctl        : disabled

    deleted          : no

    image-dl(wtp,rst): yes,no

    admin            : enable

    cfg-wtp-profile  : FAP433F-default

    override-profile : disabled

    oper-wtp-profile : FAP433F-default

    wtp-mode         : normal

    wtp-wanlan-mode  : aggregate

    cfg-apcfg-prof   :

    oper-apcfg-pro   :

    bonjour-profile  :

    wtp-group        :

    name             :

    location         :

    region-map       :

    pos-x            : 0

    pos-y            : 0

    ble-major-id     : 0 (wtp: 0, grp: 0, prof: 0)

    ble-minor-id     : 0 (wtp: 0, prof: 0)

    led-blink        : disabled

    led-state        : enabled

    led-schedules    :

    poe mode         : auto(auto)

    poe-mode-oper    : auto

    ext-info-enable  : enabled

    ip-frag-prevent  : TCP_MSS

    tun-mtu          : 0,0

    split-tunneling-acl-path         : local

    split-tunneling-local-ap-subnet  : disabled

    energy-efficient-ethernet        : disabled

    active sw ver    : FP433F-v7.0-build0034

    local IPv4 addr  : 192.168.20.3

    board mac        : d4:76:a0:0b:8b:50

    join_time        : Tue Sep  5 11:04:50 2023

    mesh-uplink      : ethernet

    mesh hop count   : 0

    parent wtp id    :

    connection state : Connected

    image download progress: 0

    last failure     : 20 -- ECHO REQ is missing --> Reason for the FortiAP offline.

    last failure param: N/A

    last failure time: Tue Sep  5 10:59:44 2023

    station info     : 0/0

    geo              : World (0)

    deployment       : cfg platform-determined oper indoor

    LAN              :

             rId     : 3

             cnt     : 2

             port 1  : mode offline(0)

             port 2  : mode offline(0)

  LLDP               : enabled (total 0)

  SNMP               : disabled

  WAN port authentication: none

  WAN port 802.1x EAP method: all

  Temperature in Celsius: 3 (50,50,49)

  Capability        :

      local standalone             : enabled

      lan port                     : enabled

      local switch                 : enabled

      vlan                         : enabled

      local bridge                 : enabled

      DFS                          : enabled

      timestamp offset             : enabled

      txpower percentage           : enabled

      wpa3                         : enabled

      station health               : enabled

      DTLS v1.2                    : enabled

      multiple time schedule       : enabled

      energy-efficient-ethernet    : enabled

      wan lan mode                 : enabled

      led dark                     : enabled

      kernel DTLS data             : enabled

      128-length passwd            : disabled

      internal wtp                 : disabled

      IGMP Snoop                   : enabled

      enhanced mpsk                : enabled

      vap acl singe mac            : enabled

      no rouge ap sta              : enabled

      vap acl range/wildcard mac   : disabled

  Radio 1            : AP

    80211d enable:   : enabled

    country name     : CA

    country code     : 5001

    drma_manual_mode : ncf

    radio_type       : 11AX

    channel list     : 1 6 11

    darrp            : enabled

    airtime fairness : disabled

    bss color mode   : Auto

    bss color(actual): 0

    opt antenna      : None

    txpower          : high 23 low 10 tgt -70 (calc 23 oper 10 dBm)

    beacon_intv      : 100

    rts_threshold    : 2346

    frag_threshold   : 2346

    ap scan          : disable

    ap scan passive  : disabled

    sensor mode      : both

    ARRP profile     : arrp-default

    WIDS profile     : default

      wlan  6        : venssid

    max vaps         : 8

    base bssid       : d4:76:a0:0b:8b:58

    oper chan        : 1

    noise_floor      : -95

    chutil           : enabled

    oper chutil time : Fri Sep 15 13:20:59 2023  (age=0)

    oper chutil data : 45,46,51,40,47, 50,52,46,37,36, 37,43,47,34,43 ->newer

    station info     : 0/0

  Radio 2            : AP

    80211d enable:   : enabled

    country name     : CA

    country code     : 5001

    drma_manual_mode : ncf

    radio_type       : 11AX_5G

    channel list     : 36 40 44 48 52 56 60 64 100 104 108 112 116 120 124 128 132 ...

    darrp            : enabled

    airtime fairness : disabled

    bss color mode   : Auto

    bss color(actual): 0

    opt antenna      : None

    txpower          : high 23 low 10 tgt -70 (calc 17 oper 10 dBm)

    beacon_intv      : 100

    rts_threshold    : 2346

    frag_threshold   : 2346

    ap scan          : disable

    ap scan passive  : disabled

    sensor mode      : both

    ARRP profile     : arrp-default

    WIDS profile     : default

      wlan  6        : venssid

    max vaps         : 8

    base bssid       : d4:76:a0:0b:8b:60

    oper chan        : 36

    noise_floor      : -95

    chutil           : enabled

    oper chutil time : Fri Sep 15 13:20:59 2023  (age=0)

    oper chutil data : 31,37,33,31,38, 32,32,27,37,30, 30,30,32,32,28 ->newer

    station info     : 0/0

  Radio 3            : Monitor

      ap scan passive: enabled

      sensor mode    : both

      auto suppress  : enabled

      fgscan rptintv : 15

    spectrum analysis: scan only

      ARRP profile   : ---

      WIDS profile   : default

  Radio 4            : Virtual Lan AP

    max vaps         : 0

    base bssid       : 00:00:00:00:00:00

    station info     : 0/0

  Radio 5            : Not Exist

  WAN/LAN stats      :

                     : lan1 rx,tx bytes 764258258,6409351395 packets 2017554,8602021 errors 0,0 dropped 4,0

                     : lan2 rx,tx bytes 0,0 packets 0,0 errors 0,0 dropped 0,0

         status      :

  uplink status      :

                       lan1 carrier=1, speed=1000, duplex=full

                       lan2 carrier=0, speed=0, duplex=

 

According to the above example, the FortiAP went offline because of communication issues between FortiAP and FortiGate.
Collect the below output from the FortiAP CLI (Telnet or SSH) to get more information from the FortiAP perspective.

From FortiGate:

  • To take ssh or telnet access to the FortiAP, make sure that it is allowed in the FortiAP profile. (Wifi & Switch Controller -> FortiAP Profiles, edit the 'respective profile' and allow 'SSH').

 

GautSikk_3-1695760095646.png

 

  1. Other Handy AP commands:

 

fap-tech

cfg -s

fap-get-status

cw_diag uptime

cw_diag sys-performance

iwconfig

diag_debug_crashlog read

cw_diag -c wtp-cfg

cw_diag -c radio-cfg

cw_diag -c vap-cfg

cw_diag kernel-panic

dmesg

rcfg

klog