This document provides the following information for FortiAP-S and FortiAP-W2 version 6.2.2, build 0265:
- Supported models
- What's new in FortiAP-S and FortiAP-W2 version 6.2.2
- Upgrade information
- Product integration and support
- Resolved issues
- Known issues
For more information about your FortiAP device, see the FortiWiFi and FortiAP Configuration Guide.
FortiAP-S and FortiAP-W2 version 6.2.2, build 0265 support the following models:
FAP-S421E, FAP-S422E, FAP-S423E
FAP-221E, FAP-222E, FAP-223E, FAP-224E
FortiAP-W2 models do not have the unified threat management (UTM) functionality.
The following list includes new features in FortiAP-S and FortiAP-W2 version 6.2.2 managed by FortiGate (running FortiOS version 6.2.2):
- Local-standalone SSID supports MAC address filter (FortiOS-side "address-group" setting under VAP configuration).
- Local-standalone SSID supports RADIUS-based MAC address authentication.
- FortiAP can detect client OS information locally via DHCP fingerprint (DHCP options and VCI etc.)
- RADIUS COA over WiFi supports the
- FortiPresence v7.1 Push API update
- Send AP Tx power as part of the FAP ID packets
- WPA2-Personal SSID supports MPSK schedule.
- Local-bridging captive-portal SSID supports external authentication on 3rd-party web servers.
- FortiAP reports uplink interface speed to FortiGate (FortiOS v6.2.2 REST API update).
- Local-bridging SSID supports GRE tunnel.
- Local-bridging SSID supports L2TP tunnel.
- FortiAP requires administrators to set a password upon the first out-of-the-box login, or after a factory reset.
- The "wcfg" command can diagnose Ekahau blink and AeroScout states.
- Wi-Fi country and region code adjustments:
- In Tunisia, outdoor models (FAP-S422E, FAP-222E and FAP-224E) only allow 5GHz channels 100, 104, 108, 112 and 116, and disallow all other 5GHz channels and 2.4GHz channels.
- Changed Yemen to region E
- Changed Oman to region E
- Changed Honduras to region N
- Changed Macau to region S
- Changed Philippines to region S