Created on
09-27-2023
01:06 AM
Edited on
12-21-2025
06:46 AM
By
Jean-Philippe_P
This article describes troubleshooting steps when it is impossible to get FortiAP connected to FortiGate Online.
Consolidated Troubleshooting for the FortiAP to get online over FortiGate.
Before starting, make sure to follow the step-by-step LAN Edge Deployment Guide as many of the basic issues will be addressed in this guide.
First Time installation of FortiAP: Issues a Checklist.
Note:
If the FortiAP was online once, it will show disconnected as per the screenshot below under managed FortiAPs. If the FortiAP was never online, it will not show the FortiAP.
CLI command and output that shows FortiAP offline:
cfg -s
fap-get-status
Steps and Actions:
Note:
The above link is just an example to find the appropriate FortiGate model and check for the number of FortiAPs supported.
As per the support included in the specs sheet for the number of APs supported in tunnel mode or bridge mode. If the tunnel mode capacity is over, then it is necessary to change the WTP mode to remote.
config wireless-controller wtp
edit FAP22B3U11005354
set wtp-mode remote
set wtp-profile 220B_bridge
end
Note:
Remote mode only supports local bridge mode SSIDs.
Related article:
If it is not supported.
Next Steps:
Try bringing up the FortiAP on FortiLanCloud or another FortiGate Firewall, or ask him to talk to the sales or accounts team as no more FortiAPs are supported for the given FortiGate.
Check the cabling Issue and LED light status on the Access Points:
If the light status shows no cabling Issue, move to Step 3.
If the light status shows bad or suspect cabling issues:
Check for the compatibility of the firmware version in the release notes and check for the platform profile on the FGT along with the supportability matrix.
URL for release notes: Firmware Images.
URL for the supportability matrix: FortiAP / FortiWiFi.
If the platform profile/FortiAP Model is available on the FortiAP profiles, move to Step 4.
Navigate to Wifi & Switch Controller -> FortiAP Profiles -> Create New -> Check the dropdown list for the Platform.
If it is a FortiAP-U/Meru firmware:
Action:
Get the console access for the FortiAP.
Stop at uboot on FortiAP, when prompted:
Password: fap22b1!$
set_image_id fap_default
nvram save
savenv
reset
If not able to stop at uboot, let the FortiAP boot with the Meru image. On prompting for a password, use the Serial number as the password.
Use the command <bootimg imageid 2> to boot with the FortiAP Image.
Make sure the FortiAP is not discovered on the cloud; if the FortiAP is discovered on the cloud, it will not come online on the FortiGate. Ask the user for a cloud account or WCFG output, look for AC_DISCOVERY_TYPE.
If FortiAP is on the Cloud.
Action:
Take the FortiAP serial number, contact Fortinet support, and get the FortiAP removed.
cw_diag -c all-countries
The following CLI command helps to view a list of the country and region codes, and regulatory domains supported by Fortinet:
Action:
Ask the customer to talk to his sales representative and get the replaced AP with the correct country settings.
config wireless-controller setting
set fapc-compatibility {enable | disable}
end
Action: enable it.
Action:
Proceed to Step 10.
Action:
Issue is resolved.
Action: Proceed to Step 10.
Action: Issue resolved.
Action: Get the console Access of the FortiAP-U and we may see it is continuously crashing and not able to discover the FortiGate:
Password: fap22b1!$
# set_image_id fap_default
# nvram save
# savenv
# reset
Password: fap22b1!$
# set_auto_learning off
# set_image_id meru_default
# nvram save
# savenv
# reset
On prompting for a password, use the Serial number as the password.
Use command <bootimg imageid 2> to boot with the FortiAP Image.
diagnose sniffer packet <interface_name> “port 5246” 4
With this, it is possible to see the two-way communication of the FortiGate with the FortiAP.
Action: Proceed to step 11.
Action: Issue resolved.
To activate CAPWAP on an interface, the Fabric option must be enabled. The FortiLink interface has this option enabled by default, but for other interfaces, such as a VLAN assigned to the FortiLink interface, the Fabric option must be enabled.
1(static) → 2(dhcp) → 3(dns) → 7(fortiapcloud) → 5(multicast) → 6(broadcast)
If it is stuck at one phase, contact L3 support to get the below logs.
diag wireless-controller wlac wtp_filter FP112B3X13000193 0-192.168.6.8:5246 2 <----- Replace the serial number and IP address of the FortiAP.
diagnose debug console timestamp enable
diagnose debug application cw_acd 0x7ff
diagnose debug enable
kp
crash
cw_diag kernel-panic (Show the kernel panic output).
dmesg
cw_diag show all
diagnose wireless-controller wlac -c wtp (Shows the status of the AP).
Action: Contact Fortinet Support
Action: Proceed to step 13.
diagnose wireless-controller wlac -c wtp
Example:
diagnose wireless-controller wlac -c wtp
-----------------------------WTP 1----------------------------
WTP vd : root
vfid : 0
id : FP433FTF20001356
uuid : 4eb674cc-728f-51ed-f368-4ff04362c41d
mgmt_vlanid : 0
region code : A
regcode status : valid
refcnt : 3 own(1) wtpprof(1) ws(1)
apcfg status : N/A,N/A cfg_ac=0.0.0.0:0 val_ac=0.0.0.0:0 cmds T 0 P 0 U 0 I 0 M 0
apcfg cmd details:
plain_ctl : disabled
deleted : no
image-dl(wtp,rst): yes,no
admin : enable
cfg-wtp-profile : FAP433F-default
override-profile : disabled
oper-wtp-profile : FAP433F-default
wtp-mode : normal
wtp-wanlan-mode : aggregate
cfg-apcfg-prof :
oper-apcfg-pro :
bonjour-profile :
wtp-group :
name :
location :
region-map :
pos-x : 0
pos-y : 0
ble-major-id : 0 (wtp: 0, grp: 0, prof: 0)
ble-minor-id : 0 (wtp: 0, prof: 0)
led-blink : disabled
led-state : enabled
led-schedules :
poe mode : auto(auto)
poe-mode-oper : auto
ext-info-enable : enabled
ip-frag-prevent : TCP_MSS
tun-mtu : 0,0
split-tunneling-acl-path : local
split-tunneling-local-ap-subnet : disabled
energy-efficient-ethernet : disabled
active sw ver : FP433F-v7.0-build0034
local IPv4 addr : 192.168.20.3
board mac : d4:76:a0:0b:8b:50
join_time : Tue Sep 5 11:04:50 2023
mesh-uplink : ethernet
mesh hop count : 0
parent wtp id :
connection state : Connected
image download progress: 0
last failure : 20 -- ECHO REQ is missing --> Reason for the FortiAP offline.
last failure param: N/A
last failure time: Tue Sep 5 10:59:44 2023
station info : 0/0
geo : World (0)
deployment : cfg platform-determined oper indoor
LAN :
rId : 3
cnt : 2
port 1 : mode offline(0)
port 2 : mode offline(0)
LLDP : enabled (total 0)
SNMP : disabled
WAN port authentication: none
WAN port 802.1x EAP method: all
Temperature in Celsius: 3 (50,50,49)
Capability :
local standalone : enabled
lan port : enabled
local switch : enabled
vlan : enabled
local bridge : enabled
DFS : enabled
timestamp offset : enabled
txpower percentage : enabled
wpa3 : enabled
station health : enabled
DTLS v1.2 : enabled
multiple time schedule : enabled
energy-efficient-ethernet : enabled
wan lan mode : enabled
led dark : enabled
kernel DTLS data : enabled
128-length passwd : disabled
internal wtp : disabled
IGMP Snoop : enabled
enhanced mpsk : enabled
vap acl singe mac : enabled
no rouge ap sta : enabled
vap acl range/wildcard mac : disabled
Radio 1 : AP
80211d enable: : enabled
country name : CA
country code : 5001
drma_manual_mode : ncf
radio_type : 11AX
channel list : 1 6 11
darrp : enabled
airtime fairness : disabled
bss color mode : Auto
bss color(actual): 0
opt antenna : None
txpower : high 23 low 10 tgt -70 (calc 23 oper 10 dBm)
beacon_intv : 100
rts_threshold : 2346
frag_threshold : 2346
ap scan : disable
ap scan passive : disabled
sensor mode : both
ARRP profile : arrp-default
WIDS profile : default
wlan 6 : venssid
max vaps : 8
base bssid : d4:76:a0:0b:8b:58
oper chan : 1
noise_floor : -95
chutil : enabled
oper chutil time : Fri Sep 15 13:20:59 2023 (age=0)
oper chutil data : 45,46,51,40,47, 50,52,46,37,36, 37,43,47,34,43 ->newer
station info : 0/0
Radio 2 : AP
80211d enable: : enabled
country name : CA
country code : 5001
drma_manual_mode : ncf
radio_type : 11AX_5G
channel list : 36 40 44 48 52 56 60 64 100 104 108 112 116 120 124 128 132 ...
darrp : enabled
airtime fairness : disabled
bss color mode : Auto
bss color(actual): 0
opt antenna : None
txpower : high 23 low 10 tgt -70 (calc 17 oper 10 dBm)
beacon_intv : 100
rts_threshold : 2346
frag_threshold : 2346
ap scan : disable
ap scan passive : disabled
sensor mode : both
ARRP profile : arrp-default
WIDS profile : default
wlan 6 : venssid
max vaps : 8
base bssid : d4:76:a0:0b:8b:60
oper chan : 36
noise_floor : -95
chutil : enabled
oper chutil time : Fri Sep 15 13:20:59 2023 (age=0)
oper chutil data : 31,37,33,31,38, 32,32,27,37,30, 30,30,32,32,28 ->newer
station info : 0/0
Radio 3 : Monitor
ap scan passive: enabled
sensor mode : both
auto suppress : enabled
fgscan rptintv : 15
spectrum analysis: scan only
ARRP profile : ---
WIDS profile : default
Radio 4 : Virtual Lan AP
max vaps : 0
base bssid : 00:00:00:00:00:00
station info : 0/0
Radio 5 : Not Exist
WAN/LAN stats :
: lan1 rx,tx bytes 764258258,6409351395 packets 2017554,8602021 errors 0,0 dropped 4,0
: lan2 rx,tx bytes 0,0 packets 0,0 errors 0,0 dropped 0,0
status :
uplink status :
lan1 carrier=1, speed=1000, duplex=full
lan2 carrier=0, speed=0, duplex=
According to the above example, the FortiAP went offline because of communication issues between the FortiAP and the FortiGate.
Collect the output below from the FortiAP CLI (Telnet or SSH) to get more information from the FortiAP perspective.
From FortiGate:
fap-tech
cfg -s
fap-get-status
cw_diag uptime
cw_diag sys-performance
iwconfig
diag_debug_crashlog read
cw_diag -c wtp-cfg
cw_diag -c radio-cfg
cw_diag -c vap-cfg
cw_diag kernel-panic
dmesg
rcfg
klog
fnsysctl killall cw_acd <----- Reset wireless controller.
Related article:
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.