WPA3 Security
For full WPA3 support, we recommend you update your FortiGate and FortiAP devices to the latest supported firmware version.
For more precise support information between FortiGate and FortiAP firmware versions, see each model's release notes. |
You can configure the following WPA3 security modes:
- WPA3 Enterprise 192-bit
- WPA3 Enterprise Only
- WPA3 Enterprise Transition
- WPA3 Simultaneous Authentication of Equals (SAE)
- WPA3 SAE Transition
- Opportunistic Wireless Encryption (OWE)
- OWE Transition
To configure WPA3 on an SSID - GUI:
- Go to WiFi Controller > SSID.
- Create a new SSID, or edit a current one.
- In the WiFi Settings section, set the Security Mode to a WPA3 option.
-
Configure the relevant security settings as needed.
If you set the security mode to either WPA3-SAE or WPA3-SAE-Transition, you can enable Hash-to-Element (H2E) only or Simultaneous Authentication of Equals Public Key (SAE-PK).
-
H2E only: Use hash-to-element-only mechanism for PWE derivation.
-
SAE-PK: Enable or disable WPA3 SAE-PK.
When SAE-PK authentication option is enabled, the SAE-PK private key is mandatory. The private key can be generated by FortiOS (for information on how to generate the SAE-PK password and private key, see Generating SAE-PK private key and password) or through a third-party tool. FortiOS will verify the private key and reject invalid input.
-
- Click OK.
Configuring WPA3 OWE - CLI
To configure WPA3 OWE only:
Clients that support WPA3 can connect with this SSID.
config wireless-controller vap edit "80e_owe" set ssid "80e_owe" set security owe set pmf enable set schedule "always" next end
To configure WPA3 OWE Transition:
Clients connect with normal OPEN or OWE depending on its capability. Clients which support WPA3 connect with OWS standard. Clients which cannot support WPA3 connect with Open SSID.
config wireless-controller vap edit "80e_open" set ssid "80e_open" set security open set owe-transition enable set owe-transition-ssid "wpa3_open" set schedule "always" next edit "wpa3_owe_tr" set ssid "wpa3_open" set broadcast-ssid disable set security owe set pmf enable set owe-transition enable set owe-transition-ssid "80e_open" set schedule "always" next end
Configuring WPA3 SAE - CLI
To configure WPA3 SAE:
Clients that support WPA3 can connect with this SSID.
config wireless-controller vap edit "80e_sae" set ssid "80e_sae" set security wpa3-sae set pmf enable set schedule "always" set sae-password ******** next end
To configure WPA3 SAE Transition:
There are two passwords in the SSID. If passphrase is used, the client connects with WPA2 PSK. If sae-password is used, the client connects with WPA3 SAE.
config wireless-controller vap edit "80e_sae-tr" set ssid "80e_sae-transition" set security wpa3-sae-transition set pmf optional set passphrase ******** set schedule "always" set sae-password ******** next end
To configure WPA3 SAE and enable H2E only:
config wireless-controller vap edit "wifi" set ssid "Example_SSID" set security wpa3-sae set pmf enable set sae-h2e-only enable set schedule "always" set sae-password ENC * next end
To configure WPA3 SAE and enable SAE-PK:
config wireless-controller vap edit "wifi" set ssid "Example_SSID" set security wpa3-sae set pmf enable set sae-pk enable set sae-private-key "*******" set sae-password ENC * set schedule "always" next end
Note: The private key can be generated by FortiOS (see Generating SAE-PK private key and password) or through a third-party tool. FortiOS will verify the private key and reject invalid input.
Configuring WPA3 Enterprise - CLI
When using the following WPA3 Enterprise options, you can select the auth
type to use either RADIUS authentication or local user authentication. When using RADIUS authentication, you can enable accounting interim updates to integrate with Cisco's Identity Services Engine (ISE).
To configure WPA3 Enterprise 192-bit:
By default, this option is not show in the GUI. When you configure this SSID from the CLI, the GUI will list the security option as WPA3 Enterprise 192-bit. |
Using this option, you can set the security mode to wpa3-enterprise
to use 192-bit encryption with PMF mandatory.
config wireless-controller vap edit "80e_wpa3" set ssid "80e_wpa3" set security wpa3-enterprise set pmf enable set auth radius set radius-server "wifi-radius" set schedule "always" next edit "80e_wpa3_user" set ssid "80e_wpa3_user" set security wpa3-enterprise set pmf enable set auth usergroup set usergroup "usergroup" set schedule "always" next end
To configure WPA3 Enterprise Only:
Using this option, you can set the security mode to wpa3-only-enterprise
to use WPA3 Enterprise with PMF mandatory.
config wireless-controller vap edit "wpa3" set ssid "wpa3" set security wpa3-only-enterprise set pmf enable set auth radius set radius-server "FAC" set schedule "always" next end
To configure WPA3 Enterprise Transition:
Using this option, you can set the security mode to wpa3-enterprise-transition
to use WPA3 Enterprise with PMF optional. A WPA3-Enterprise STA shall negotiate PMF when associating with an AP using WPA3-Enterprise transition mode.
config wireless-controller vap edit "wpa3" set ssid "wpa3" set security wpa3-enterprise-transition set pmf optional set auth radius set radius-server "FAC" set schedule "always" next end
To configure WPA3 Enterprise SSID to integrate with Cisco ISE:
Enable accounting interim updates to integrate with Cisco's ISE session stitching feature. When a wireless client roams between FortiAPs, the FortiGate creates an "Interim-Update" accounting message with the same "Acct-Session-Id" value to avoid interrupting the ISE session.
-
Create a RADIUS server with an accounting server:
config user radius edit "peap" set server "172.18.56.104" set secret ENC set nas-ip 192.168.1.10 set nas-id-type custom set nas-id "FWF-61F-AUTH" set acct-interim-interval 300 set radius-coa enable set password-renewal disable config accounting-server edit 1 set status enable set server "172.18.56.104" set secret ENC next end next end
-
Create a WPA3 Enterprise SSID with the authentication method set to
radius
and the radius server set to the example you previously configured (peap
).config wireless-controller vap edit "wifi4" set ssid "FOS_61F_ENT" set security wpa3-only-enterprise set auth radius set radius-server "peap" set schedule "always" next end
-
Enable
roaming-acct-interim-update
.config wireless-controller vap edit "wifi4" set ssid "FOS_61F_ENT" set security wpa3-only-enterprise set auth radius set radius-server "peap" set schedule "always" set roaming-acct-interim-update enable next end
-
Apply this SSID to the FortiAPs you want to roam between.
|