Hi everyone,
I need some clarification on the Bridge mode (when create the SSID).
It's a Fortigate 90D running firmware version 5.2.7. The FortiAP is connected to the Internal interface
When a SSID is created, it is shown as a new interface in the Network section. But I don't how it actually works.
I mean:
- Should the 'Internal' interface option (in the Policy) includes all the bridged interface? Or you have to add all the bridged interface together with the Internal.
- Does it inherit all the properties of the Internal interface (DHCP, Allowed Protocols, ...) ?
- Does a policy created for a particular bridged interface apply only for that interface? Really?
- Does the traffic from the bridged interface to the internal (and vice versa) travel through the FGT? Do we need a policy for that? or is it just implicitly allowed?
Regards,
Cuong Pham
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
I realise this is an old post, but just in case you or others are still working on this, I'll list what I've found, at least for 5.4.1. On your version of 5.2.7 it might be different.
A bridged SSID means that a client connected to the FAP will act like it is directly connected to the physical lan interface the FAP is connected to.
If you specify a vlan for the bridged SSID the physical port needs to support tagged vlan packets for that vlan ID.
In my experience (all my bridged SSIDs specify a vlan) the bridged SSID interface is just a place holder. I do not refer to it in security policies, nor in DNS servers, nor in NTP, nor in DHCP, nor in routes. Instead, all of these (including DHCP) are handled by my rules for the interface object associated with the vlan interface on the physical lan interface.
You can specify WPA2 Personal on the bridged SSID to allow initial authentication and still have your actual vlan interface require WPA2 Enterprise.
Hi,
Thank you for replying.
I don't know what is wrong with my post. And I'm still waiting for the information.
Regards,
Cuong
Hi Cuong,
Again, this is from my 5.4.1 experience so your version may be different. I'm also assuming you're talking about a *separate* FortiAP connected to a FortiGate 90D, not a FortiWiFi 90D.
My understanding of bridge mode is that, once your client has connected to the FortiAP's bridge mode SSID, it is like they are directly connected to the same network cable the FortiAP is connected to. The FortiAP is just functioning as a bridge (and adding/removing vlan tags for you if you've specified a vlan for that SSID). The bridged SSID interface object is just a placeholder and you don't do anything with it.
One not very detailed reference to this.
http://kb.fortinet.com/kb....do?externalId=FD35115
Please note that I'm not a Fortinet employee, so if you need more clarification on this, you should probably open a ticket with Fortinet support.
Hi,
Your assumption is correct, it's a separate FortiAP connected to a FortiGate 90D.
My setup is likely the simplest setup, and likely the most common one as well where I connect the both the FGT and FAP to the same switch with other devices. There is no vlan settings in place.
And because it is quite a common scenario, I wanted to post it here so that others can see the answer too.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1732 | |
1105 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.