Description |
This article describes how to sniff CAPWAP-Data channel traffic without resorting to using clear-text and maintaining data channel security. |
Scope | FortiGate v5.6.0+, FortiAP v5.4.2+. |
Solution |
The communication between the FortiGate and FortiAP is primarily done via two connections:
By default, both of these connections are secured by DTLS to protect their contents. For the CAPWAP Data channel, the security is controlled by a setting in the FortiAP Profile.
config wireless-controller wtp-profile This FortiAP Profile is then applied to a FortiAP or group of FortiAPs to control the behavior of the FortiAP where this profile is applied.
The main drawback with this method is the extra IP header added by IPSEC which will add some overhead to each packet on the CAPWAP data-channel. Prerequisites:
Steps:
The IPSEC interface will often start with a name similar to 'wlc-0035.00'. This detail is important later. The virtual interface will also come with 'set allowaccess fabric' automatically enabled.
diagnose wireless-controller wlac -c ws diag vpn tunnel list Diagram of final state from information in diagnostics above:
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.