Open SSID for device onboarding
If you have a secure SSID that requires a supplicant configuration on the connecting host, the supplicant configuration can be served to the host through an Open SSID. Add the supplicant configuration to one of your Open SSIDs.
- Click System > Quick Start.
- Select Network Settings > Network Devices from the steps on the left.
- Select a device in the Network Devices window.
- Click Wireless Security.
- On the SSID Mappings dialog, click Add.
- Click the drop-down arrow in the SSID Name field and select the Name of the SSID for which you are adding a configuration in the FortiNAC database. These names are read from the wireless device and represent existing SSIDs.
- Select Device Onboarding.
- Click Modify next to the RADIUS Secret field and enter the RADIUS Secret configured on the device.
- In the Directory Group field select a group. The connecting user must be a member of this directory group to access the SSID. If you are authenticating through RADIUS instead of LDAP, this option is hidden.
- In the Allowed Operating Systems section select one or more operating systems. The connecting host must have one of these operating systems installed to connect to this SSID.
- In the Portal Configuration field, select the captive portal that should be presented to the user when the host connects to this SSID. If you are not using multiple portals or you do not have a specific portal for this group of guests, select Use Default.
- In the Access User Group field select the production User Group to be used for hosts accessing the Secure SSID. These are read from the wireless device and represent existing User Groups that have been configured on the wireless device.
-
In the Isolation User Group field select the User Group to be used to isolate unknown hosts. These User Groups are read from the wireless device and represent existing User Groups that have been configured on the wireless device.
The Supplicant Configuration field is optional. If you select a supplicant configuration that configuration is installed on the connecting host, allowing the host to connect to a secure SSID. See the table below for settings and Supplicant configurations for additional information.
- Select a supplicant configuration from the drop-down menu. You can use the icons next to the Supplicant Configuration field to add a new configuration, delete a configuration or modify the configuration shown in the drop-down menu. Note that if you modify this configuration, it is modified for all features that make use of it.
-
To add a supplicant configuration, click Add next to the Supplicant Configuration field.
- In the Name field, enter a name for this supplicant configuration.
- In the SSID field, select the SSID that requires that a Supplicant be installed and configured on the connecting host.
- In the Security field select a type from the drop-down list. Options include: Open, WEP, WPA, WPA2, WEP Enterprise, WPA Enterprise, WPA2 Enterprise.
- Click in the Password field to open the Password pop-up. This is the Pre-Shared Key. Enter the key twice to confirm that it is correct and click OK. The Password field does not display if Open, WPA2 Enterprise or WPA Enterprise is selected in the Security field.
- Click in the Cipher field and select AES, NONE or TKIP.
- In the EAP Type field PEAP is the only option. EAP type does not display when Open, WEP or WPA is selected in the Security field.
-
The Validate Server Certificate field applies only to Windows 7 and higher hosts:
-
If disabled, it disables the Validate Server Certificate setting on the host and any certificate will be accepted.
-
If enabled, the host validates the Certificate with the list of Trusted Root Certificate Authorities listed in the host's Certificate Manager. If the CA is not listed on the host, the user may have to connect to the secure SSID manually.
-
- If you have enabled WEP Enterprise, WPA Enterprise or WPA2 Enterprise the CA Certificate field is displayed. Browse to the CA or Root Certificate from the CA that issued the SSL certificate used on your RADIUS server. Select the file and click Open.
- The CA Fingerprint field is displayed and automatically populated after a CA or Root Certificate is uploaded and the supplicant configuration is saved.
- The Note field is optional.
- Click OK to save the supplicant configuration.
- In the Primary RADIUS field select the RADIUS server that FortiNAC should use for authentication. If no RADIUS servers are configured, click New to add one. Only displays if a supplicant configuration has been selected.
- In the Secondary RADIUS field select the RADIUS server to be used in the event that the Primary RADIUS cannot be accessed. This field is optional.
- Click OK to save the SSID configuration.
Open SSID settings
Field |
Description |
SSID Name |
Network name of the SSID configuration that includes all of the settings for the SSID, such as encryption method or VLANs. |
Mapping Type |
|
RADIUS Secret |
Encryption key used by the RADIUS server to send authentication information. The RADIUS secret must be the same in FortiNAC RADIUS settings, on the SSID configuration and on the device itself. |
Directory Group |
Connecting user must be a member of the selected directory group to access this SSID. If you are authenticating through RADIUS instead of LDAP, this option is hidden. |
Allowed Operating |
Allows or denies access to an SSID based on the operating system of the connecting host. Options include:
|
Portal Configuration |
Name of the Portal that will be applied to hosts connecting via this SSID. |
Access User Group |
Name or number of the network access identifier where a known host or device will be placed, such as, User Group, VLAN ID or VLAN Name. |
Isolation User Group |
Name or number of the network access identifier, such as, User Group, VLAN ID or VLAN Name, for the Isolation VLAN where an unknown host or device will be placed. |
Supplicant Configuration |
Contains the configuration for the SSID, Security Settings and password if required. This is optional. See the table below and Supplicant configurations. |
Primary RADIUS Server |
RADIUS server that will be used by FortiNAC for authentication. Only displays if a supplicant configuration has been selected. |
Secondary RADIUS Server |
Secondary RADIUS server that will be used by FortiNAC for authentication if the Primary RADIUS server cannot be reached. |
Supplicant configuration settings
Field |
Definition |
||
---|---|---|---|
Name |
User defined name for the Configuration. |
||
SSID |
Name of the SSID being configured. This is not necessarily the SSID to which the host is connected. However, the agent will attempt to move the host to this SSID when the configuration is applied. A host can have supplicant configurations stored for multiple SSIDs. |
||
Security |
Indicates the type of encryption that will be used for connections to this SSID. Options include:
|
||
Password |
Opens the Password pop-up. This is the pre-shared key. Enter the key twice to confirm that it is correct and click OK. The Password field does not display if open, WPA2 enterprise, or WPA enterprise is selected in the Security field. The XML predefined characters ' " < > & are not supported. |
||
Cipher |
Encryption/decryption method used in conjunction with the information in the Security field to secure this connection. Options include:
|
||
EAP Type |
Currently only PEAP is supported. |
||
Validate Server Certificate |
Applies only to Windows 7 and higher hosts. Default = Disabled. If disabled, it disables the Validate Server Certificate setting on the host and any certificate will be accepted. If enabled, the host validates the Certificate with the list of Trusted Root Certificate Authorities listed in the host's Certificate Manager. If the CA is not listed on the host, the user may have to connect to the secure SSID manually. |
||
CA Fingerprint |
Fingerprint parsed from the CA or Root Certificate from the CA that issued the SSL certificate used to secure the RADIUS server. This field does not display until after the certificate has been uploaded and the supplicant configuration has been saved. |
||
CA Certificate |
This field is only displayed if you select WEP Enterprise, WPA Enterprise or WPA2 Enterprise in the Security field. Select Choose File to browse to and select the CA or Root certificate from the CA that issued the SSL certificate used to secure the RADIUS server. CA or Root certificates can be downloaded from the CA web site. Either PEM or binary format can be used. |
||
Note |
User specified note field. |