Created on 04-18-2022 06:32 PM
Hi all, I would greatly appreciate help in resolving a problem I have with FG-80F and FAP-433F both on 7.2.0 where I'm trying to bridge WiFi with local interface using VLANS, without software switch.
Configuration:
I'm trying to create a "WiFi_IoT" as bridge specifying "OPTIONAL VLAN ID" 50 and have it bridged with "internal_IoT".
Here is what I've tried so far.
Software switch: SS requires tunneling mode for SSID but then it's pretty easy, add SSID and unconfigured physical interfaces into it, configure SS with IP and DHCP and all connected get IP - done but not in bridge and no VLANs
I tried, deleting "internal_IoT" VLAN switch to free up ports 5 and 6, then creating a VLAN 50 subinterface for SS: remove IP and DHCP from SS, configure SS VLAN (50) with IP and DHCP, then if I specify "OPTIONAL VLAN ID" (50) for "WiFi_IoT" (which is a member of SS) - wifi clients get IP fine, but no matter what I do, physical interfaces 5 and 6 (which I added to SS for this config) never get served IP.
I tried creating VLAN SWITCH, adding 4 and 5 to it, then creating VLAN as subinterface with IP and DCHP but physical interfaces never get served by it.
I've tried creating VLAN SWITCH with ID 50 and no IP config, then adding it to SS but physical ports again never get served with IP
Since AP is physically connected to "internal_LAN", I tried setting VLANFORWARD as enabled for "internal_LAN" VLAN SWITCH thinking that it would pass traffic from AP tagged to other VLANs but no avail.
I've seen youtube where bridging SSIDs to VLANs in "bridge" mode and specifying "optional vlan id" was done but in that config AP was connected to FortiSwitch 108 which was then fortilinked to FG
Is there a way for me bridge SSIDs to FG using VLANs?
Solved! Go to Solution.
Created on 04-22-2022 12:01 PM Edited on 04-22-2022 12:02 PM
Yeah, additional bridging would simply consist of the repetition of:
- set the "optional" VLAN ID for the bridged SSID
- create VLAN-SWITCH with the same VLAN-ID (solution #1) / or create another VLAN-interface on top of the HW-switch with the same VLAN-ID (solution #2)
And you're right about "wouldn't I need internal1 to assign IP to AP?". That's the part where I am not certain about solution #1. I suspect that the trunk-interface may not accept untagged traffic.
If you're willing to test this, and the trunk-interface indeed does not accept untagged frames from the FortiAP, then you could consider setting the management VLAN-ID for the FortiAP, as described in this KB . If you choose to go this way, then you will additionally need to make one more VLAN-switch with the same VLAN-ID. This would then be the place to configure the IP/subnet/DHCP for the FortiAP.
THANK YOU FOR YOUR HELP!
You were right - trunk port did not take untagged traffic from the AP.
I need another VLAN switch for FAP management but I couldn't add a trunk port into that switch and I dont have any more free ports to populate the switch with.
Here is what I ended up doing that worked (kind of):
So, everything works as expected except no changes can be made to "mgmt FAP" switch UNLESS port "B" is unset trunk.
Is this normal?
I've tried, per article you referenced upstream, to configure FAP management for manual IP and VLAN but that configuration still requires a VLAN switch on FG, which, again, needs at least one interface that I dont have.
Is there a better way or did I miss anything?
Hello FortiForum,
Thank you for using the Community Forum. I will seek to get you an answer or help. We will reply to this thread with an update as soon as possible.
Thanks,
Hey FortiForum,
I am by no means an expert in all things SSID bridging and VLAN, but I think your issue is the following:
- your SSID is in bridge mode
- it is physically connected on port4, so FortiGate considers the SSID a part/extension of port4
-> port1-4 are a switch
-> SSID is technically part of this because it is technically a part of port4
You're looking to have the SSID bridged to interfaces it is not physically connected to, correct?
Or do you want to have the SSID both bridged to port1-4 (VLAN 167) AND port5/6 (VLAN50)?
From what I could find, you might need a VLAN interface with ID 50 on port4, and with VLAN ID 50 in SSID, the SSID should be considered part of the VLAN ID, not part of the physical port4
Then you could use the VLAN interface + port5 + port6 and create a switch with subnet and DHCP (or VLAN 50 interfaces on port5/port6)
If I'm wrong, please let us know and we will continue to see what documentation we can find.
Hi Debbie, thank you for your attention.
The ultimate goal is NOT to use tunnel mode on any SSID but instead bridge them to their respective VLANs. Pardon my switcharoo game, but in my initial ports I used hypothetical interfaces and port numbers, but the principal is the same. Below is my actual configuration. AP is connected to FG-80F to port "b"
The goal is:
You see, I understand that since AP is physically connected to VLAN switch "internal LAN" port "b" and considered to be a part of it, shouldn't there be a way for that switch to "forward" other VLANS?
Then I can specify "OPTIONAL VLAN" 30 for "wifi IoT", create a new HW VLAN switch "internal IoT" with "VLAN ID" 30, add internal5 and "wifi IoT" to it?
I have two suggestions to feed the discussion, but neither is perfect. Hopefully someone will be able to flesh it out further...
Some assumptions for the example below:
Let me know if this roughly matches your goal. (If it's too different, we may need to re-think the sample setup below)
Idea #1: Using VLAN-switch
config sys interface > edit internal1 > set trunk enable
At this point, client traffic should behave like so:
However, I am uncertain as to what should happen to the FortiAP's traffic.
By default it will hit the trunk-interface with no VLAN-tag, and I was not able to find out what happens to untagged frames hitting the trunk-interface. If they get dropped, then this is likely a show-stopper for this solution attempt. (there also doesn't seem to be any sort "set native-vlan" option for the trunk-interface)
If perhaps you could make the FortiAP tag its own management traffic, then that could let you steer its traffic through the trunk-interface into another VLAN-switch (matching the given VLAN-ID)?
Idea #2: Using the "traditional" hardware switch + VLANs on top of it
With the non-VLAN-switch approach, things could work like so:
Con: You would need another switch on the path to strip the VLAN-tag if the IoT devices expect untagged frames.
Thank you for your time. Your assumptions are almost correct with one omission: there is still "internal LAN" interface that should be bridged with "wifi LAN" to service VLAN 167
Idea #1
So, for this great idea I would need:
WiFi Config:
Correct?
Created on 04-22-2022 12:01 PM Edited on 04-22-2022 12:02 PM
Yeah, additional bridging would simply consist of the repetition of:
- set the "optional" VLAN ID for the bridged SSID
- create VLAN-SWITCH with the same VLAN-ID (solution #1) / or create another VLAN-interface on top of the HW-switch with the same VLAN-ID (solution #2)
And you're right about "wouldn't I need internal1 to assign IP to AP?". That's the part where I am not certain about solution #1. I suspect that the trunk-interface may not accept untagged traffic.
If you're willing to test this, and the trunk-interface indeed does not accept untagged frames from the FortiAP, then you could consider setting the management VLAN-ID for the FortiAP, as described in this KB . If you choose to go this way, then you will additionally need to make one more VLAN-switch with the same VLAN-ID. This would then be the place to configure the IP/subnet/DHCP for the FortiAP.
THANK YOU FOR YOUR HELP!
You were right - trunk port did not take untagged traffic from the AP.
I need another VLAN switch for FAP management but I couldn't add a trunk port into that switch and I dont have any more free ports to populate the switch with.
Here is what I ended up doing that worked (kind of):
So, everything works as expected except no changes can be made to "mgmt FAP" switch UNLESS port "B" is unset trunk.
Is this normal?
I've tried, per article you referenced upstream, to configure FAP management for manual IP and VLAN but that configuration still requires a VLAN switch on FG, which, again, needs at least one interface that I dont have.
Is there a better way or did I miss anything?
Well, this only worked until next reboot at which point the trunked port "B" is removed from "mgmt FAP" switch and all communication with the FAP is lost, taking all SSIDs with it
So, I've settled at:
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1737 | |
1108 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.