Fortinet black logo

802.1x Supplicant Access Point

802.1x Supplicant Access Point

You can now configure the FAP-U42xEV, FAP-U422EV, and FAP-U32xEV access points as an 802.1X supplicant for port based authentication. The 802.1X supplicant access point is authenticated by an external RADIUS server based on the configured credentials (user name and password). The switch is the authenticator between the supplicant access point and the external RADIUS server.

Note: This feature is tested in a setup of 15 access points.

This feature is disabled by default and is enabled using the FortiWLC CLI or GUI. To enable and configure this feature while configuring an AP:

  • Run the 1x_auth state enable username <username> password <password> command. To disable, run the 1x_auth state disable command.
    OR
  • Create an initialization script. Navigate to Maintenance > File Management on the FortiWLC GUI.

Note: Change in the username and password for 802.1X authentication takes effect only after the AP is rebooted.

802.1x Supplicant Access Point

You can now configure the FAP-U42xEV, FAP-U422EV, and FAP-U32xEV access points as an 802.1X supplicant for port based authentication. The 802.1X supplicant access point is authenticated by an external RADIUS server based on the configured credentials (user name and password). The switch is the authenticator between the supplicant access point and the external RADIUS server.

Note: This feature is tested in a setup of 15 access points.

This feature is disabled by default and is enabled using the FortiWLC CLI or GUI. To enable and configure this feature while configuring an AP:

  • Run the 1x_auth state enable username <username> password <password> command. To disable, run the 1x_auth state disable command.
    OR
  • Create an initialization script. Navigate to Maintenance > File Management on the FortiWLC GUI.

Note: Change in the username and password for 802.1X authentication takes effect only after the AP is rebooted.