We have configured our FortiGate with a WPA2-Enterprise SSID that authenticates via LDAPS pointing to an Azure AD Domain Services instance. All our company users are cloud-only and synced to Azure Domain Services. We do not have an on-premises AD or an Azure hybrid deployment, and we don't have FortiAuthenticator.
Users can connect to the Wi-Fi, but they suddenly disconnect, The connection then reconnects after some time either automatically or sometimes when the user manually reconnects.
I initially thought the issue might be due to network latency, so I set a traffic shaping policy that gives high priority and bandwidth to LDAPS traffic destined our Azur AD DS public IP, but the problem still persists.
Has anyone faced a similar issue?
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Hi,
The WAP2 Enterprise authentication occurs when the client joins the SSID; following the successful four-way handshake and the client receives the IP address and is able to browse, the device does not need to be authenticated again. Client disconnections can occur unexpectedly as a result of interference or a coverage issue.Please ensure that you have a configured channel with the least interference on the AP and that the AP has adequate coverage.
Regards
Jamal
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1673 | |
1083 | |
752 | |
446 | |
226 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.