If you had FortiAPs you could create separate SSIDs for Computers and Phones. Computer SSID would let bridge the the local network (or tunnel for more policy control) and Phone SSID would tunnel to the Fortigate.
In your case, you can see if you can create separate SSIDs and assign them to different VLANs. You can then layer 2 the VLAN to the Fortigate for policy control.
Thank you for the feedback i'm not clued up on vlans, everyone i have spoken too says its very easy.
I tried to configure vlans once but failed and had to factory reset the switches as whilst doing the setup i was under a lot of pressure to get the site up and running before everyone was settled at their desks.
I am trying to free up one switch so that i can play around with it and do some vlan training on it.
I know what vlans are suppose to do because i need to do this to get a nanobeam to send both lan and telephone network over it.
i have a few different ranges that i have setup on my FGT.
192.168.0.1 - Computers
192.168.1.1 - Telephones
192.168.2.1 - Cameras
these are set using hardware switch function where my telephones are on 2 PoE switches connected to LAN1 and Computers are connected to LAN2 with 3 Switches and LAN3 is connected to a seperate NetworkCabinet with the DVR and its switches
My reason for separation is because i want to block cellphones from youtube and facebook and give them a bandwidth limit so that they don't effect my internet in the office, everyone has an android or an iphone and some have watches and tablets so im sitting at around 60 devices pulling my internet down and my computers running tracking are suffering.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.