Hello
We have FOS 6.2.x and want to upgrade to 7.0.13.
In the meantime we have some old FAP 220B that we want to keep but without breaking the compatibility.
The following command on another FOS 7.0.13 shows that FAP 220B is compatible with FOS 7.0.13.
config wireless-controller wtp-profile
Now I need to check which FAP firmware version is required/recommended on my FAP 220B so it can be compatible with my FOS 7.0.13.
Tried to check on document "FortiAP and FortiOS Compatibility Matrix" but couldn't find anything on FAP 220B, I guess because it is EoL/EoSL.
Any idea where I can find this info?
Solved! Go to Solution.
Hi AEK.
FortiAP 220B is supported until FAP OS version 5.2.7 only. EOS date: 2018-10-06 (Please refer to: https://support.fortinet.com/Information/ProductLifeCycle.aspx)
If FortiGates running FortiOS 7.0.1 and later need to manage FortiAP models that cannot be upgraded or legacy FortiAP models whose names end with the letters B, C, CR, or D, administrators can allow those FortiAPs' connections with weak cipher encryption by using compatibility mode:
config wireless-controller global
set tunnel-mode compatible
end
Hi Sir,
Thank you for contacting Fortinet support.
For comparability you can check the below link:
Also can you please share the command output where it shows that it is compatible with FOS 7.0.13.
For confirmation of EOL/EOS you can open a case with FAP TAC for more information.
Best Regards,
Piyush
Hi Piyush
(Sorry I pressed SOLUTION button by mistake)
Actually the document you shared is the one I checked before, but unfortunately it doesn't talk about FAP-220B.
Here is the requested output:
FW01 # get system status
Version: FortiGate-200F v7.0.13,build0566,231024 (GA.M)
Security Level: 1
Firmware Signature: certified
Virus-DB: 92.00731(2024-01-17 10:26)
Extended DB: 92.00731(2024-01-17 10:25)
AV AI/ML Model: 2.14306(2024-01-17 07:45)
IPS-DB: 6.00741(2015-12-01 02:30)
IPS-ETDB: 26.00716(2024-01-17 00:44)
APP-DB: 26.00715(2024-01-16 01:56)
INDUSTRIAL-DB: 6.00741(2015-12-01 02:30)
IPS Malicious URL Database: 4.00942(2024-01-17 06:38)
Serial-Number: FG200FT*********
BIOS version: 05000011
System Part-Number: P25129-01
Log hard disk: Not available
Hostname: FW01
Private Encryption: Disable
Operation Mode: NAT
Current virtual domain: root
Max number of virtual domains: 10
Virtual domains status: 1 in NAT mode, 0 in TP mode
Virtual domain configuration: disable
FIPS-CC mode: disable
Current HA mode: a-p, primary
Cluster uptime: 387 days, 6 hours, 53 minutes, 53 seconds
Cluster state change time: 2023-11-06 09:13:48
Branch point: 0566
Release Version Information: GA
FortiOS x86-64: Yes
System time: Wed Jan 17 20:27:21 2024
Last reboot reason: warm reboot
FW01 # config wireless-controller wtp-profile
FW01 (wtp-profile) # edit 1
FW01 (1) # config platform
FW01 (platform) # set type ?
AP-11N Default 11n AP.
220B FAP220B/221B.
210B FAP210B.
222B FAP222B.
112B FAP112B.
320B FAP320B.
11C FAP11C.
14C FAP14C.
223B FAP223B.
28C FAP28C.
320C FAP320C.
221C FAP221C.
... <output truncated>
U24JEV FAPU24JEV.
U321EV FAPU321EV.
U323EV FAPU323EV.
U431F FAPU431F.
U433F FAPU433F.
U231F FAPU231F.
U234F FAPU234F.
U432F FAPU432F.
U231G FAPU231G.
U441G FAPU441G.
Hi AEK.
FortiAP 220B is supported until FAP OS version 5.2.7 only. EOS date: 2018-10-06 (Please refer to: https://support.fortinet.com/Information/ProductLifeCycle.aspx)
If FortiGates running FortiOS 7.0.1 and later need to manage FortiAP models that cannot be upgraded or legacy FortiAP models whose names end with the letters B, C, CR, or D, administrators can allow those FortiAPs' connections with weak cipher encryption by using compatibility mode:
config wireless-controller global
set tunnel-mode compatible
end
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1737 | |
1107 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.