Fortinet Document Library

Version:

Version:

Version:

Version:

Version:

Version:


Table of Contents

FortiWiFi and FortiAP Configuration Guide

Testing wireless connection

FortiAPs can be configured to run in Service Assurance Management (SAM) mode, where a radio is designated to operate as a client and perform tests against another AP. Ping tests and iPerf tests can be run on interval, with results captured in the WiFi event logs. This allows the FortiGate to verify and ensure that an existing Wi-Fi network can provide acceptable services.

To configure a FortiAP profile to run in SAM mode from the CLI
  1. Configure the FAP profile to enable SAM ping test.

    config wireless-controller wtp-profile

    edit "FAP231E-sam"

    config radio-2

    set mode sam

    set sam-ssid "test-sam"

    set sam-bssid 00:00:00:00:00:00

    set sam-security-type wpa-personal

    set sam-captive-portal disable

    set sam-password ENC +Yo/ZS

    set sam-test ping

    set sam-server "iperf.he.net"

    set sam-report-intv 60

    end

    next

    end

  2. Check configurations received on the FAP side in the "rcfg" output.

    sam ssid           : test-sam

    sam bssid          : 00:00:00:00:00:00

    sam security type  : Personal

    sam captive portal : disabled

    sam test           : Ping

    sam server ip      : iperf.he.net

    sam report interval: 60

    sam iperf port     : 5001

    sam iperf protocol : TCP

  3. Check the WiFi event log for test results. The result log is generated periodically based on report interval setting.

    1: date=2021-03-18 time=11:46:45 eventtime=1616006806043197750 tz="-0700" logid="0104043711" type="event" subtype="wireless" level="notice" vd="vdom1" logdesc="SAM ping test result" sn="FP231ETF20000449" ap="FP231ETF20000449" vap="test-sam" ssid="test-sam" stamac="04:d5:90:bf:4b:57" radioid=2 channel=144 security="WPA2 Personal" encryption="AES" action="sam-ping-result" msg="Connected to AP TEST-FAP-423E, 0.0% packet loss" remotewtptime="3107.537428"
To configure a FortiAP profile to run the iperf test from the CLI

The SAM test also supports the "iperf" test.

  1. FOS side configuration:

    config wireless-controller wtp-profile

    edit "FAP231E-sam"

    config radio-2

    set mode sam

    set sam-ssid "test-sam"

    set sam-bssid 00:00:00:00:00:00

    set sam-security-type wpa-personal

    set sam-captive-portal disable

    set sam-password ENC +Yo/ZS

    set sam-test iperf

    set sam-server "iperf.he.net"

    set iperf-server-port 5001

    set iperf-protocol tcp

    set sam-report-intv 60

    end

    next

    end

  2. Configuration received on FAP side:

    sam ssid           : test-sam

    sam bssid          : 00:00:00:00:00:00

    sam security type  : Personal

    sam captive portal : disabled

    sam test           : Iperf

    sam server ip      : iperf.he.net

    sam report interval: 60

    sam iperf port     : 5001

    sam iperf protocol : TCP

  3. WiFi event log for test result:

    1: date=2021-03-19 time=10:41:35 eventtime=1616175695652094949 tz="-0700" logid="0104043710" type="event" subtype="wireless" level="notice" vd="vdom1" logdesc="SAM iperf test result" sn="FP231ETF20000449" ap="FP231ETF20000449" vap="test-sam" ssid="test-sam" stamac="04:d5:90:bf:4b:57" radioid=2 channel=144 security="WPA2 Enterprise" encryption="AES" action="sam-iperf-result" msg="Connected to AP TEST-FAP-423E, TCP, max rate 10.9 MB/s" remotewtptime="4061.104484"

Testing wireless connection

FortiAPs can be configured to run in Service Assurance Management (SAM) mode, where a radio is designated to operate as a client and perform tests against another AP. Ping tests and iPerf tests can be run on interval, with results captured in the WiFi event logs. This allows the FortiGate to verify and ensure that an existing Wi-Fi network can provide acceptable services.

To configure a FortiAP profile to run in SAM mode from the CLI
  1. Configure the FAP profile to enable SAM ping test.

    config wireless-controller wtp-profile

    edit "FAP231E-sam"

    config radio-2

    set mode sam

    set sam-ssid "test-sam"

    set sam-bssid 00:00:00:00:00:00

    set sam-security-type wpa-personal

    set sam-captive-portal disable

    set sam-password ENC +Yo/ZS

    set sam-test ping

    set sam-server "iperf.he.net"

    set sam-report-intv 60

    end

    next

    end

  2. Check configurations received on the FAP side in the "rcfg" output.

    sam ssid           : test-sam

    sam bssid          : 00:00:00:00:00:00

    sam security type  : Personal

    sam captive portal : disabled

    sam test           : Ping

    sam server ip      : iperf.he.net

    sam report interval: 60

    sam iperf port     : 5001

    sam iperf protocol : TCP

  3. Check the WiFi event log for test results. The result log is generated periodically based on report interval setting.

    1: date=2021-03-18 time=11:46:45 eventtime=1616006806043197750 tz="-0700" logid="0104043711" type="event" subtype="wireless" level="notice" vd="vdom1" logdesc="SAM ping test result" sn="FP231ETF20000449" ap="FP231ETF20000449" vap="test-sam" ssid="test-sam" stamac="04:d5:90:bf:4b:57" radioid=2 channel=144 security="WPA2 Personal" encryption="AES" action="sam-ping-result" msg="Connected to AP TEST-FAP-423E, 0.0% packet loss" remotewtptime="3107.537428"
To configure a FortiAP profile to run the iperf test from the CLI

The SAM test also supports the "iperf" test.

  1. FOS side configuration:

    config wireless-controller wtp-profile

    edit "FAP231E-sam"

    config radio-2

    set mode sam

    set sam-ssid "test-sam"

    set sam-bssid 00:00:00:00:00:00

    set sam-security-type wpa-personal

    set sam-captive-portal disable

    set sam-password ENC +Yo/ZS

    set sam-test iperf

    set sam-server "iperf.he.net"

    set iperf-server-port 5001

    set iperf-protocol tcp

    set sam-report-intv 60

    end

    next

    end

  2. Configuration received on FAP side:

    sam ssid           : test-sam

    sam bssid          : 00:00:00:00:00:00

    sam security type  : Personal

    sam captive portal : disabled

    sam test           : Iperf

    sam server ip      : iperf.he.net

    sam report interval: 60

    sam iperf port     : 5001

    sam iperf protocol : TCP

  3. WiFi event log for test result:

    1: date=2021-03-19 time=10:41:35 eventtime=1616175695652094949 tz="-0700" logid="0104043710" type="event" subtype="wireless" level="notice" vd="vdom1" logdesc="SAM iperf test result" sn="FP231ETF20000449" ap="FP231ETF20000449" vap="test-sam" ssid="test-sam" stamac="04:d5:90:bf:4b:57" radioid=2 channel=144 security="WPA2 Enterprise" encryption="AES" action="sam-iperf-result" msg="Connected to AP TEST-FAP-423E, TCP, max rate 10.9 MB/s" remotewtptime="4061.104484"