Hi Guys, I have a network made up of fortiAps connected to port 22 of the fortiswitch which in turn is connected to the fortigate 40f I wanted to configure the entire network under the 192.168.1.X class and the APs in bridge mode and assign an IP to the fortiswitch.Is all this possible? sorry but I'm new to the fortinet world I have to understand well...because the fotilink port on the fortigate is defined as dedicated to fortiswitch. Thank you very much in advance
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
@Tannu1986
If you want Fortiswitch and FortiAP to receive IP address from the interface: fortilink then make sure native vlan on port22 is fortilink and APs in bridge mode.
I hope it helps.
Regards,
Rahul Kaushik
Hi,
on port 22 the native VLAN is configured as defaul.fortilink while the port that goes to the fortigate is dedicated, everything is ok, the switch gives me IP 192.168.1.2 while I authorize the APs but the IP is not assigned.
What I'm wondering is how I can configure the entire system with the 192.168.1.X/24 class, that is, each device must have its own LAN network IP.
If you want this, the fortiap and the fortiswitch on the same manage vlan ?
if yes you need to modify the dhcp server of the fortilink interface, this dhcp server only offer ip to fortiswitches by default.
Hi,
Yes, my devices must all be on VLAN 1, the Native one, I tried to set the DHCP but the APs don't get any IPs. As I was saying, the APs are connected to the fortiswitch and the ports are configured by default in (default fortilink) the APs are configured as bridge mode.
The FortiLink DHCP is dedicated to FSW and FEX. I don't think it's recommended or supported to change it, the DHCP server configuration shows:
set vci-match enable
set vci-string "FortiSwitch" "FortiExtender"
If you want less possible configuration and subnetting for this network, I would suggest to leave the default subnet for FortiLink (10.255.1.1/24) and put the AP management on the same VLAN as the users. With this configuration, the FSW may not be accessible remotely (outside of this FGT) and the user may try to access the AP so make sure to configure a strong password.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1660 | |
1077 | |
752 | |
443 | |
220 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.