Fortinet black logo

Authorize FortiExtender on FortiOS

Copy Link
Copy Doc ID 15a69e94-fb2c-11eb-8f3f-00505692583a:573278
Download PDF

Authorize FortiExtender on FortiOS

Once the FortiExtender is discovered, you must authorize it by associating it either with a virtual WAN interface or a VLAN interface.

To authorize the FortiExtender device in FortiOS:

  1. Go to Network>FortiExtender, and wait for the FortiExtender device to be discovered by FortiGate.
  2. Bind the device to an interface and authorize it.
  3. In FortiGate 5.4 and later releases, you must manually create either a virtual WAN interface of type FEX-WAN or a VLAN sub-interface, and link it to FortiExtender as part of the authorization process, as illustrated below.

Make sure that FortiExtender and FortiGate are connected on Layer 2 by default. If they are not connected via Layer 2 but can reach each other via Layer-3 networking, configure your FortiExtender with static discovery using the following FortiExtender CLI commands:

config system management fortigate

set ac-discovery-type static

set static-ac-ip-addr 192.168.1.99

set ac-ctl-port 5246

set ac-data-port 25246

end

Authorize FortiExtender on FortiOS

Once the FortiExtender is discovered, you must authorize it by associating it either with a virtual WAN interface or a VLAN interface.

To authorize the FortiExtender device in FortiOS:

  1. Go to Network>FortiExtender, and wait for the FortiExtender device to be discovered by FortiGate.
  2. Bind the device to an interface and authorize it.
  3. In FortiGate 5.4 and later releases, you must manually create either a virtual WAN interface of type FEX-WAN or a VLAN sub-interface, and link it to FortiExtender as part of the authorization process, as illustrated below.

Make sure that FortiExtender and FortiGate are connected on Layer 2 by default. If they are not connected via Layer 2 but can reach each other via Layer-3 networking, configure your FortiExtender with static discovery using the following FortiExtender CLI commands:

config system management fortigate

set ac-discovery-type static

set static-ac-ip-addr 192.168.1.99

set ac-ctl-port 5246

set ac-data-port 25246

end