I have a WPA2 Enterprise network. Fortinac connects to the network by authenticating the user from the active directory with radius. But I want to make this role based. I want those in role A to get IP from vlan A and those in role B to get IP from vlan B. How can I do it?
Solved! Go to Solution.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
I found that the problem is caused by the dynamic vlan feature of the SSID, thanks for your help.
If you mean role A and role B are AD groups, you can do as follows:
Created on 03-19-2024 03:50 AM Edited on 03-19-2024 03:52 AM
I do it this way, but when the user connects to the network, it comes out of the default ip range.
Firstly you have to verify if the host are matching the right network access policy. FNAC has a handy feature that allows to test the policy directly from GUI (no need to test on the end host after every configuration change):
From here you can check the policy that is currently hitting and the VLAN that should be sent to NAS. If the right VLAN is shown in the policy check, than you can continue troubleshooting the RADIUS or the SSID configuration in the WLC.
I found that the problem is caused by the dynamic vlan feature of the SSID, thanks for your help.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1670 | |
1082 | |
752 | |
446 | |
226 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.