Created on
10-22-2024
05:19 AM
Edited on
06-26-2025
04:29 PM
By
Divya_Puramsett
| Description | This article provides a workaround to fix the issue of endpoints connected to FortiAP where traffic is going through FortiGate but reply traffic does not reach back to the endpoints. |
| Scope | FortiOS, FortiGate, FortiSwitch, FortiAP. |
| Solution |
Scenario:
FortiGate (172.18.0.1) <----> FortiSwitch <----> FortiAP <----> (172.18.0.27) Endpoint In the presented scenario, the endpoint is unable to browse the internet by failing DNS queries with FortiAP presenting the action 'DNS-no-resp'. Also, the Endpoint is failing to ping its Gateway IP (FortiGate internal IP 172.18.0.1).
However, debugs and logs show that FortiGate is allowing the traffic. With DNS responses and icmp replies observed going out of the FortiGate towards the FortiSwitch, but never received on the Endpoint. The below image shows Endpoint ICMP requests reaching FortiGate and FortiGate interface replying.
The next images show DNS traffic being allowed out, but also that FortiGate recorded reply traffic on the logs.
As a workaround disable CAPWAP offloading, and reboot the wireless controller, using the below commands on FortiGate:
config system npu set capwap-offload disable end execute wireless-controller restart-acd
This operation will reboot wireless controller daemon! Do you want to continue? (y/n) After the reboot, the Endpoint should start receiving the traffic. If the above does not resolve the issue and it persists, open a support ticket for further investigation. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.