Provision the Onboarding and Secure WiFi networks
Provision the Onboarding and Secure WiFi networks
To provision the Smart Connect enabled "Onboarding" SSID:
- Go to Wi-Fi & Switch Controller > SSID, and click Create New.
- Under Create New SSID, set the following:
- Profile name: Enter a name for the profile, for example Onboarding.
- Traffic mode: Tunnel.
- Under Address, set the following:
- IP/Netmask: Enter the interface IP address for the Onboarding SSID.
- Under DHCP Server, enable the DHCP Server setting and set the following:
- Leave Address range, Netmask, Gateway, and Lease time in their default states.
- DNS server: Select Same as Interface IP or specify a local DNS server that can resolve your FortiAuthenticator FQDN. If you are using the DNS database on FortiGate, select Same as Interface IP.
- Under Network, leave the Decide detection setting enabled.
- Under WiFi Settings, set the following:
- SSID: Enter the SSID, for example Onboarding.
- Security mode: Captive Portal.
- Portal type: Authentication.
- Authentication portal: Select External, and enter the FortiAuthenticator Smart Connect portal redirection URL obtained when configuring Smart Connect on FortiAuthenticator.
- User groups: Select the previously configured user group, for example Onboarding.
- Exempt destinations/services: Select FortiAuthenticator.
- Leave all other settings as their default state.
- Click OK.
To provision the "Secure Wi-Fi" network:
- Go to WiFi & Switch Controller > SSID, and click Create New.
- Configure the following settings:
- Profile name: Enter a profile name, for example Secure Wi-Fi.
- Traffic mode: Bridge.
- SSID: Enter the SSID name, for example Secure Wi-Fi.
- Security mode: WPA2 Enterprise.
- Authentication: Choose RADIUS Server, and select the FortiAuthenticator.
- Optional VLAN ID: This setting is optional and can be configured if WiFi traffic needs to be tagged by the AP to a VLAN configured on your local switch. Dynamic VLAN assignment is also supported.
- Click OK.
To assign SSIDs to FortiAP profiles:
- Go to WiFi & Switch Controller > FortiAP Profiles.
- Select the relevant AP profile(s) and assign the previously created SSIDs (Onboarding and Secure Wi-Fi) to the AP radio interfaces.
- Confirm the SSIDs are broadcasting and can be seen by WiFi enabled devices.
- Click OK.
To create a new FortiAuthenticator object to use with firewall policies:
- Go to Policy & Objects > Addresses, and click Create New > Address.
- Configure the following settings:
- Name: Enter a name, for example FAC.
- Type: Subnet.
- IP/Netmask: The FortiAuthenticator IP address.
- Interface: any.
- Click OK.
To create a firewall policy for the Onboarding SSID:
- Go to Policy & Objects > Firewall Policy, and click Create New.
- On the New Policy page, set the following:
- Name: Enter a name, for example Onboarding Policy.
- Incoming Interface: Select the Onboarding SSID.
- Outgoing Interface: Select the Management VLAN.
- Source: Select all or the Onboarding address subnet range.
- Destination: Select FortiAuthenticator and the DNS server if you are using a third party DNS server.
- Service: DNS, HTTP, and HTTPS.
- Under Advanced, enable the Exempt from Captive Portal option.
When using a FortiOS version earlier than 6.4.1, you can enable this setting in the CLI with the command set captive-portal-exempt enable
.
- Click OK.
Provision the Onboarding and Secure WiFi networks
Provision the Onboarding and Secure WiFi networks
To provision the Smart Connect enabled "Onboarding" SSID:
- Go to Wi-Fi & Switch Controller > SSID, and click Create New.
- Under Create New SSID, set the following:
- Profile name: Enter a name for the profile, for example Onboarding.
- Traffic mode: Tunnel.
- Under Address, set the following:
- IP/Netmask: Enter the interface IP address for the Onboarding SSID.
- Under DHCP Server, enable the DHCP Server setting and set the following:
- Leave Address range, Netmask, Gateway, and Lease time in their default states.
- DNS server: Select Same as Interface IP or specify a local DNS server that can resolve your FortiAuthenticator FQDN. If you are using the DNS database on FortiGate, select Same as Interface IP.
- Under Network, leave the Decide detection setting enabled.
- Under WiFi Settings, set the following:
- SSID: Enter the SSID, for example Onboarding.
- Security mode: Captive Portal.
- Portal type: Authentication.
- Authentication portal: Select External, and enter the FortiAuthenticator Smart Connect portal redirection URL obtained when configuring Smart Connect on FortiAuthenticator.
- User groups: Select the previously configured user group, for example Onboarding.
- Exempt destinations/services: Select FortiAuthenticator.
- Leave all other settings as their default state.
- Click OK.
To provision the "Secure Wi-Fi" network:
- Go to WiFi & Switch Controller > SSID, and click Create New.
- Configure the following settings:
- Profile name: Enter a profile name, for example Secure Wi-Fi.
- Traffic mode: Bridge.
- SSID: Enter the SSID name, for example Secure Wi-Fi.
- Security mode: WPA2 Enterprise.
- Authentication: Choose RADIUS Server, and select the FortiAuthenticator.
- Optional VLAN ID: This setting is optional and can be configured if WiFi traffic needs to be tagged by the AP to a VLAN configured on your local switch. Dynamic VLAN assignment is also supported.
- Click OK.
To assign SSIDs to FortiAP profiles:
- Go to WiFi & Switch Controller > FortiAP Profiles.
- Select the relevant AP profile(s) and assign the previously created SSIDs (Onboarding and Secure Wi-Fi) to the AP radio interfaces.
- Confirm the SSIDs are broadcasting and can be seen by WiFi enabled devices.
- Click OK.
To create a new FortiAuthenticator object to use with firewall policies:
- Go to Policy & Objects > Addresses, and click Create New > Address.
- Configure the following settings:
- Name: Enter a name, for example FAC.
- Type: Subnet.
- IP/Netmask: The FortiAuthenticator IP address.
- Interface: any.
- Click OK.
To create a firewall policy for the Onboarding SSID:
- Go to Policy & Objects > Firewall Policy, and click Create New.
- On the New Policy page, set the following:
- Name: Enter a name, for example Onboarding Policy.
- Incoming Interface: Select the Onboarding SSID.
- Outgoing Interface: Select the Management VLAN.
- Source: Select all or the Onboarding address subnet range.
- Destination: Select FortiAuthenticator and the DNS server if you are using a third party DNS server.
- Service: DNS, HTTP, and HTTPS.
- Under Advanced, enable the Exempt from Captive Portal option.
When using a FortiOS version earlier than 6.4.1, you can enable this setting in the CLI with the command set captive-portal-exempt enable
.
- Click OK.