Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
MISSAM
New Contributor

Users Disconnect from FGT WPA2 Enterprise SSID Authenticated with Azure AD Domain Services LDAPS

We have configured our FortiGate with a WPA2-Enterprise SSID that authenticates via LDAPS pointing to an Azure AD Domain Services instance. All our company users are cloud-only and synced to Azure Domain Services. We do not have an on-premises AD or an Azure hybrid deployment, and we don't have FortiAuthenticator.

Users can connect to the Wi-Fi, but they suddenly disconnect, The connection then reconnects after some time either automatically or sometimes when the user manually reconnects.

I initially thought the issue might be due to network latency, so I set a traffic shaping policy that gives high priority and bandwidth to LDAPS traffic destined our Azur AD DS public IP, but the problem still persists.

Has anyone faced a similar issue?

1 REPLY 1
jhussain_FTNT

Hi,

The WAP2 Enterprise authentication occurs when the client joins the SSID; following the successful four-way handshake and the client receives the IP address and is able to browse, the device does not need to be authenticated again. Client disconnections can occur unexpectedly as a result of interference or a coverage issue.Please ensure that you have a configured  channel with the least interference on the AP and that the AP has adequate coverage.

 

Regards

Jamal

 

Announcements

Select Forum Responses to become Knowledge Articles!

Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.

Labels
Top Kudoed Authors