Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
Tazio4436
New Contributor

Need help to Connect 10 FortiAps to cisco Switch which is Connected to my Firewall Fortinet 100F

Hi,

I am trying on my own to figure out how to replace my existing Aps with FortiAps 431F. I am planning to replace all the Switches which are Cisco and some are HP in the short run but for now am just replacing the APs.

It is a live network and I am very cautious as each time I am trying something I am doing a backup.

I can see the SSID on my phone and laptop but I cannot connect.When I try to connect it shows connecting and then Couldn't get an IP address.

Can any one guide me where to start checking and what to check please.

Thanks

Tazio

 

7 REPLIES 7
AEK
SuperUser
SuperUser

Hi Tazio

I guess you configured the SSID in bridge mode.

If you want is simpler then try create the SSID in tunnel mode, configure DHCP for this SSID and it should work without issue.

AEK
AEK
Tazio4436
New Contributor

Hi Aek,

I configured the SSID in Tunnel mode and DHCP has been configured too.

Thanks

Tazio

Toshi_Esumi
SuperUser
SuperUser

Just tell us your intention of design, bridge mode (sharing the LAN subnet with wired devices) or tunnel mode (a separate subnet from LAN), and your GUI view for 1) Managed APs, and 2) SSID (edit interface) config.

Toshi

Tazio4436

Hello Toshi,

I want to use Tunnel mode.

Please see attached pictures. I can see one client with 169 ip address.

Thanks

TazioSSID Edit Int.pngManaged APs.png

Toshi_Esumi
SuperUser
SuperUser

The config looks fine by itself. Security Fabric is not necessary for SSID interface though. It's needed on the managment interface for the FAP, "Local_Lan". But since the FAP is online you configured it there.


Only concern is if you configured DNS server with "forward-only" mode on "FORTINETSSID" interface since you set the client's DNS server to be "Same as Interface IP". I wouldn't think this would cause clients not to recieve a DHCP IP as well as DNS server IP as 172.254.1.1. But it would drop the wifi connection shortly after when the client finds out the DNS server is not working since you didn't configure it properly.
If not sure, try change it to "Specify" with like 8.8.8.8/8.8.4.4 to see if it makes any difference.

 

Toshi

Tazio4436

Thank you very much for your support.

I tried what you requested but unfortunately it did not help.

Please see attached pictures.

Thanks

Taziowifi edit DNS.pngDNS server.png

Toshi_Esumi
SuperUser
SuperUser

I didn't request but suggested. "forward-only" mode is under DNS services when you enabled "DNS database" feature at System->Feature Visibility in GUI. CLI is much easier. If you don't want to deal with them just don't use the interface IP as client's DNS server IP. Choose either the system DNS or specify.
Anyway, then it's time you need to dig in to debugging. First, run sniffer to see if DHCP requests are arriving and your FGT is responding at FORTINETSSID interface. Below is my 40F with a FAP SSID interface fap221b (actual fap is not 221b though) received and replied to a DHCP request from a wifi client. Can you see the same?

 

fg40f-utm (root) # diag sniffer packet any 'udp and port 67' 4 0
interfaces=[any]
filters=[udp and port 67]
5.079051 fap221b in 0.0.0.0.68 -> 255.255.255.255.67: udp 361
5.080258 fap221b out 192.168.5.1.67 -> 192.168.5.3.68: udp 335
^C
2 packets received by filter
0 packets dropped by kernel

Toshi

Announcements
Check out our Community Chatter Blog! Click here to get involved
Labels
Top Kudoed Authors