# config wireless-controller address2. Create a wireless controller address group using the above address and set the default policy to allow.
edit "client_1"
set mac b4:ae:2b:cb:d1:72
set policy deny
next
end
# config wireless-controller addrgrp3. On the virtual access point (VAP), select the above address group.
edit mac_grp
set addresses "client_1"
set default-policy allow
next
end
# config wireless-controller vapAfter this configuration, the client (MAC address b4:ae:2b:cb:d1:72) will no longer be allowed to connect to SSID Fortinet-psk. Other clients will be able to connect to the SSID.
edit wifi-vap
set ssid "Fortinet-psk"
set security wpa2-only-personal
set passphrase fortinet
set address-group "mac_grp"
next
end
# config wireless-controller address2. Create a wireless controller address group using the above address and set the default policy to deny.
edit "client_1"
set mac b4:ae:2b:cb:d1:72
set policy allow
next
end
# config wireless-controller addrgrp3. On the virtual access point, select the above address group.
edit mac_grp
set addresses "client_1"
set default-policy deny
next
end
# config wireless-controller vapAfter this configuration, the client (MAC address b4:ae:2b:cb:d1:72) will be allowed to connect to SSID Fortinet-psk. Other clients won't be able to connect to the SSID.
edit wifi-vap
set ssid "Fortinet-psk"
set security wpa2-only-personal
set passphrase fortinet
set address-group "mac_grp"
next
end
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2023 Fortinet, Inc. All Rights Reserved.