Fortinet white logo
Fortinet white logo
1.3.0

VLAN Mapping

VLAN Mapping

FortiGuest provides secure network access by supporting both static and dynamic VLAN mapping when authenticating a guest. You can view the free and occupied VLANs at Accounts > Manage Accounts > VLAN Mapping. Select the RADIUS client and all VLANs currently mapped to the PSK associated with the particular RADIUS client are displayed. If both static and dynamic VLANs are configured, then the dynamic VLANs are assigned first, if the dynamic VLAN is not available, then FortiGuest assigns the configured static VLAN.

FortiGuest handles VLAN mapping differently for guest accounts that are tagged to the PSK vs guest accounts not tagged to the PSK. Consider the following, if a guest account is NOT tagged to a PSK.

  • If a static VLAN is configured then it is used and if a static VLAN is not configured then VLAN 0 is used.

  • Dynamic VLAN is NOT used in this scenario.

For PSKs with guest accounts tagged to them, the behaviour described in Dynamic VLAN Mapping is applied.

Dynamic VLAN Mapping

Dynamic VLAN mapping is used when a PSK is authenticating via a RADIUS client. Each PSK/per RADIUS client is assigned one VLAN even if that PSK is used by multiple devices, as long as it authenticates via the same RADIUS client. Consider the following example where the VLAN is assigned per RADIUS client.

VLAN pools pool1 and pool2 are configured on the RADIUS client.

  • If a device Mobile1 with a PSK, PSK-auth, logs in through a RADIUS client, Client1, then VLAN ID xx is assigned to it.

  • If another device, Mobile2 with the same PSK, PSK-auth, logs in through the same RADIUS client, Client1, then it is also assigned VLAN ID xx.

  • But if a device if Mobile3 with the same PSK PSK-auth logs in through a different same RADIUS client, Client2, then a different VLAN ID yy is assigned. Likewise, if Mobile3 with a different PSK PSK-auth12 through the same RADIUS client, Client1, then also a different VLAN ID yy is assigned.

The following behaviour applies while managing dynamic VLANs.

  • The admin is allowed to configure n number of VLANs/VLAN ranges separated by commas.

  • If the admin adds an existing VLAN on a RADIUS client, then all existing mappings with those VLANs, including those currently assigned to PSKs, remain the same. But if the admin adds a new VLAN, then the existing mappings are deleted and re-configured again with the new VLANs.

  • If a RADIUS client is deleted then all VLAN mappings associated with it are also deleted.

  • If the VLAN pool is exhausted for a RADIUS client, then the static VLAN is assigned. If no static VLAN is configured, then VLAN 0 is assigned.

To enable dynamic VLAN mapping, see PSK Authentication.

Static VLAN Mapping

A static VLAN can be configured per PSK. The VLAN value can be from 1-4095. To configure static VLAN, see Creating PSKs.

VLAN Mapping

VLAN Mapping

FortiGuest provides secure network access by supporting both static and dynamic VLAN mapping when authenticating a guest. You can view the free and occupied VLANs at Accounts > Manage Accounts > VLAN Mapping. Select the RADIUS client and all VLANs currently mapped to the PSK associated with the particular RADIUS client are displayed. If both static and dynamic VLANs are configured, then the dynamic VLANs are assigned first, if the dynamic VLAN is not available, then FortiGuest assigns the configured static VLAN.

FortiGuest handles VLAN mapping differently for guest accounts that are tagged to the PSK vs guest accounts not tagged to the PSK. Consider the following, if a guest account is NOT tagged to a PSK.

  • If a static VLAN is configured then it is used and if a static VLAN is not configured then VLAN 0 is used.

  • Dynamic VLAN is NOT used in this scenario.

For PSKs with guest accounts tagged to them, the behaviour described in Dynamic VLAN Mapping is applied.

Dynamic VLAN Mapping

Dynamic VLAN mapping is used when a PSK is authenticating via a RADIUS client. Each PSK/per RADIUS client is assigned one VLAN even if that PSK is used by multiple devices, as long as it authenticates via the same RADIUS client. Consider the following example where the VLAN is assigned per RADIUS client.

VLAN pools pool1 and pool2 are configured on the RADIUS client.

  • If a device Mobile1 with a PSK, PSK-auth, logs in through a RADIUS client, Client1, then VLAN ID xx is assigned to it.

  • If another device, Mobile2 with the same PSK, PSK-auth, logs in through the same RADIUS client, Client1, then it is also assigned VLAN ID xx.

  • But if a device if Mobile3 with the same PSK PSK-auth logs in through a different same RADIUS client, Client2, then a different VLAN ID yy is assigned. Likewise, if Mobile3 with a different PSK PSK-auth12 through the same RADIUS client, Client1, then also a different VLAN ID yy is assigned.

The following behaviour applies while managing dynamic VLANs.

  • The admin is allowed to configure n number of VLANs/VLAN ranges separated by commas.

  • If the admin adds an existing VLAN on a RADIUS client, then all existing mappings with those VLANs, including those currently assigned to PSKs, remain the same. But if the admin adds a new VLAN, then the existing mappings are deleted and re-configured again with the new VLANs.

  • If a RADIUS client is deleted then all VLAN mappings associated with it are also deleted.

  • If the VLAN pool is exhausted for a RADIUS client, then the static VLAN is assigned. If no static VLAN is configured, then VLAN 0 is assigned.

To enable dynamic VLAN mapping, see PSK Authentication.

Static VLAN Mapping

A static VLAN can be configured per PSK. The VLAN value can be from 1-4095. To configure static VLAN, see Creating PSKs.