All our SSID's are tunneled. But now I need a locally bridged SSID (name "tech") in a separate VLAN (eg VLAN20). VLAN20 is an existing VLAN interface on the Fortigate (serving as gateway, DHCP, DNS...).
A few existing tunneled SSID's and the new bridged SSID need to be available on the same access points.
Fortigate is still on 5.8.6.
Switchport where the access point is connected should accept both VLANs: CAPWAP untagged/default, VLAN20 tagged (since I guess AP is tagging bridged traffic with setting "Optional VLAN ID" in SSID config on the fortigate).
My wifi client authenticates fine to SSID tech (WPA2 pre shared key for testing), but does not get an IP from DHCP. With manual IP on the client device, I can't even ping the VLAN20 interface IP (gateway). Nothing of significance in logs either...
I must be missing something.
Is it even possible ?
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Ok, got it working, so it is possible.
VLAN was missing on a trunk somewhere in between...
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1720 | |
1093 | |
752 | |
447 | |
234 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.