Created on
02-10-2015
03:30 PM
Edited on
01-16-2025
09:56 PM
By
Anthony_E
Description
This article describes configuring FortiGate to support a FortiExtender and verifying modem functionality.
Scope
FortiExtender.
Solution
Configure FortiExtender:
Enable the FortiExtender module from CLI:
config system global
(global) # set fortiextender enable
(global) # get | grep extender
fortiextender-data-port: 25246
fortiextender : enable
(global) # end
Dedicate an interface to the FortiAP/FortiExtender. This enables CAPWAP and DHCP server on the interface by default
Alternatively, configure IP, Admin Access with CAPWAP, and DHCP Server
Power on and Connect the FortiExtender. From System->Network->FortiExtender, it will discover a FortiExtender select to Authorize. and configure FortiExtender Roles.
When there are 2 FortiExtenders connected, one can function as a standby for the other. In this case, make one Primary and the other Secondaryo therwise, leave the ‘role’ as None:
config extender-controller extender
(extender) # edit "FX100B..."
(FX100B...) # set role ? {none| primary | secondary}
(FX100B...) # end
The FortiExtender has 2 modes – Standalone or Redundant:
config extender-controller extender
(extender) # edit "FX100B..."
(FX100B...) # set mode ? {Standalone| Redundant}
(FX100B...) # end
A fortiextender can have 3 possible admin statuses:
config extender-controller extender
(extender) # edit "FX100B..."
(FX100B...) # set admin ?
disable <----- AC is configured to not provide service to this Fortiextender.
Discovered <----- Fortiextender discovered through discovery or join request message
enable <----- AC is configured to provide service to this Fortiextender }
(FX100B...) # end
Link status:
Link status can be either up or down. This indicates whether or not the CAPWAP tunnel between the Controller (FortiGate) and the FortiExtender is established. While the status is up, you can select [Details] to view the detailed system status of the FortiExtender.
Additional Modem configuration:
Additional Modem configuration can be set on the FortiExtender Configuration page. Select Configure Settings to open. The same configuration options are available from the CLI.
config extender-controller extender:
For some modems, the APN setting needs to be defined in order for the connection to work.
(extender) # edit "FX100B..."
(FX100B...) # set access-point-name <apn-name>
(FX100B...) # end
To manually dial out and hang up, use these commands:
exec extender ?
After a FortiExtender is Authorized, the controller automatically creates an interface 'fext-wan':
config extender-controller extender
edit "FX100B...."
set admin enable
set ifname "fext-wan1"
next
end
Verify FortiExtender and Modem Functionality
Interfaces Page:
This interface is displayed on the System->Network->Interfaces page. Notice the IP/Netmask corresponds to the public IP the FortiExtender received from the ISP, and NOT the IP used in the CAPWAP tunnel.
'diagnose extender atcmd <command> <Marker> <SNo>':
Used to execute the at command on the FortiExtender.
The <command> specifies the at_command to be executed. The <Marker> specifies the string used to specify the '?' in the command as the FortiGate CLI does not accept the '?'. Most of the at commands have '?'. The Marker string pattern is replaced with '?' in the at command string in the CLI back end.
Diagnose modem with standard/generic/predefined AT commands:
Detail: 'diagnose extender cmd <Integer>' The integer can be anything from 1-5. This executes the specific commands based
on the information below:
FortiExtender Status:
Get the detailed modem status connected to FortiExtender with the command: 'get extender modem status <s.no>':
FG10CH3G11-----9 # get extender modem-status FX100B3X13xxxxxx
FortiExtender system information
Get FortiExtender system information from the command: 'get extender sys-info <s.no> ':
FG10CH3G11-----9 # get extender sys-info FX100B3X13xxxxxx
Related article:
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.