Fortinet black logo

FortiWLC

1.2.0
Copy Link
Copy Doc ID d9192d21-7d22-11ec-a0d0-fa163e15d75b:563354
Download PDF

FortiWLC

Follow this procedure on the FortiWLC GUI to configure captive portal.

  1. Navigate to Configuration > Security > RADIUS to configure a RADIUS profile. Click Add.
    Create one RADIUS profile for authentication and one for accounting. Update the configuration parameters as required.
    Note: The FortiWLC SSID must be configured in the tunnel mode; SSIDs in the bridge mode are NOT supported for Captive Portals.
  2. Enter the RADIUS IP - (Application server IP address), the RADIUS Secret should be the same as the RADIUS Secret Key configured on the FortiPresence VM GUI (Portal > Portal Settings > Radius Clients). Click Save.
  3. Navigate to Configuration > Security > Captive Portal and create a Captive Portal Exemptions profile. Click Add and update the configuration parameters as required. Enter the FQDN based exclusions in the FQDN list. Add the FQDN for FortiPresence Connect server to the exemption list.
  4. Create a Captive Portal profile. Click Add and in User Authentication enter the RADIUS profiles created for authentication and accounting.
  5. Configure the External Portal Settings, Select Fortinet-Presence as the External Server.
  6. Select the Captive Portal Exemption Profile created in Step 7 enter the Captive Portal URL, (Captive Portal URL copied from the FortiPresence VM GUI – Portal Management > Radius Configuration). Click Save.
  7. Navigate to Configuration > Security > Profile. Click Add and update the configuration parameters as required.
  8. Configure the Captive Portal Settings. Select WebAuth as the Captive Portal and select the created Captive Portal profile in Step 8 and the Captive Portal Authentication Method as External.
  9. Enter the Captive Portal profile name as the Passthrough Firewall Filter ID. Click Save.
  10. Navigate to Configuration > Wireless > ESS to create an ESS profile. Click Add and update the configuration parameters as required.
  11. Select the Security Profile created in Step 10. Click Save.

FortiWLC

Follow this procedure on the FortiWLC GUI to configure captive portal.

  1. Navigate to Configuration > Security > RADIUS to configure a RADIUS profile. Click Add.
    Create one RADIUS profile for authentication and one for accounting. Update the configuration parameters as required.
    Note: The FortiWLC SSID must be configured in the tunnel mode; SSIDs in the bridge mode are NOT supported for Captive Portals.
  2. Enter the RADIUS IP - (Application server IP address), the RADIUS Secret should be the same as the RADIUS Secret Key configured on the FortiPresence VM GUI (Portal > Portal Settings > Radius Clients). Click Save.
  3. Navigate to Configuration > Security > Captive Portal and create a Captive Portal Exemptions profile. Click Add and update the configuration parameters as required. Enter the FQDN based exclusions in the FQDN list. Add the FQDN for FortiPresence Connect server to the exemption list.
  4. Create a Captive Portal profile. Click Add and in User Authentication enter the RADIUS profiles created for authentication and accounting.
  5. Configure the External Portal Settings, Select Fortinet-Presence as the External Server.
  6. Select the Captive Portal Exemption Profile created in Step 7 enter the Captive Portal URL, (Captive Portal URL copied from the FortiPresence VM GUI – Portal Management > Radius Configuration). Click Save.
  7. Navigate to Configuration > Security > Profile. Click Add and update the configuration parameters as required.
  8. Configure the Captive Portal Settings. Select WebAuth as the Captive Portal and select the created Captive Portal profile in Step 8 and the Captive Portal Authentication Method as External.
  9. Enter the Captive Portal profile name as the Passthrough Firewall Filter ID. Click Save.
  10. Navigate to Configuration > Wireless > ESS to create an ESS profile. Click Add and update the configuration parameters as required.
  11. Select the Security Profile created in Step 10. Click Save.