Fortinet black logo

New Features

VLAN probe report

VLAN probe report

FortiGates that manage FortiAPs have the ability to probe VLANs and subnets connected to an access point. Use the VLAN probe wireless tool to help troubleshoot why users cannot connect to the Internet.

GUI

To perform a VLAN probe in the GUI:
  1. Go to WIFI & Switch Controller > Managed FortiAPs.
  2. Right click a FortiAP entry, and select View More Details.

  3. Click the VLAN Probe tab.
    1. Configure the settings in the VLAN Range field.
    2. Click Start.

  4. After the VLAN probing is complete, the VLAN probing report appears in the summary page.

CLI

You can use the CLI console in FortiGate and FortiAP to perform a VLAN probe and view the report.

FortiGate

Command syntax:

diagnose wireless-controller wlac -c vlan-probe-cmd <FAP Serial Number> <action> <interface ID> <start Vlan ID> <end Vlan ID> <retry> <timeout>

diagnose wireless-controller wlac -c vlan-probe-rpt <FAP Serial Number> <interface ID>

Where the value for action is:

  • 0 — Start
  • 1 — Stop

And where the value for interface ID is:

  • 0 — All Ethernet port(s) of FortiAP
  • 1 — The 1st Ethernet port of FortiAP, eth0
  • 2 — The 2nd Ethernet port of FortiAP, eth1, if the hardware exists
To perform a VLAN probe in the CLI:

FortiGate-81E-POE (vdom1) # diagnose wireless-controller wlac -c vlan-probe-cmd PS423E3X16000075 0 0 1 4094 2 10

Sending VLAN probe command to PS423E3X16000075: action=start wan-port=1 vlan=[1,4094] retries=2 timeout=10s

Sending VLAN probe command to PS423E3X16000075: action=start wan-port=2 vlan=[1,4094] retries=2 timeout=10s

Stop VLAN probing. You don't need to run stop command to get the probing report, only use it when you want to stop probing.

FortiGate-81E-POE (vdom1) # diag wi wlac -c vlan-probe-cmd PS423E3X16000075 1 0

Sending VLAN probe command to PS423E3X16000075: action=stop wan-port=1

Sending VLAN probe command to PS423E3X16000075: action=stop wan-port=2

To view the VLAN probe report in the CLI:

FortiGate-81E-POE (vdom1) # diagnose wireless-controller wlac -c vlan-probe-rpt PS423E3X16000075 0

VLAN probing status on eth0: Done

intf eth0 VLAN_ID=0001 gateway=10.11.100.1/24 probed_at=Wed Jan 16 17:09:48 2019

intf eth0 VLAN_ID=0002 gateway=10.22.100.1/24 probed_at=Wed Jan 16 17:09:48 2019

intf eth0 VLAN_ID=0003 gateway=10.33.100.1/24 probed_at=Wed Jan 16 17:09:48 2019

intf eth0 VLAN_ID=0004 gateway=10.44.100.1/24 probed_at=Wed Jan 16 17:09:48 2019

intf eth0 VLAN_ID=0005 gateway=10.55.100.1/24 probed_at=Wed Jan 16 17:09:48 2019

intf eth0 VLAN_ID=0006 gateway=10.66.100.1/24 probed_at=Wed Jan 16 17:09:48 2019

intf eth0 VLAN_ID=0007 gateway=10.77.100.1/24 probed_at=Wed Jan 16 17:09:48 2019

intf eth0 VLAN_ID=0100 gateway=10.10.20.2/24 probed_at=Wed Jan 16 17:09:49 2019

intf eth0 VLAN_ID=0200 gateway=10.4.100.1/24 probed_at=Wed Jan 16 17:09:48 2019

intf eth0 VLAN_ID=0300 gateway=10.5.100.1/24 probed_at=Wed Jan 16 17:09:49 2019

intf eth0 VLAN_ID=0400 gateway=10.6.100.1/24 probed_at=Wed Jan 16 17:09:49 2019

intf eth0 VLAN_ID=0500 gateway=10.7.100.1/24 probed_at=Wed Jan 16 17:09:49 2019

intf eth0 VLAN_ID=0600 gateway=10.9.100.1/24 probed_at=Wed Jan 16 17:09:49 2019

intf eth0 VLAN_ID=1000 gateway=10.10.100.1/24 probed_at=Wed Jan 16 17:09:49 2019

intf eth0 VLAN_ID=2000 gateway=10.20.100.1/24 probed_at=Wed Jan 16 17:09:49 2019

intf eth0 VLAN_ID=3000 gateway=10.30.100.1/24 probed_at=Wed Jan 16 17:09:49 2019

intf eth0 VLAN_ID=4000 gateway=10.40.100.1/24 probed_at=Wed Jan 16 17:09:49 2019

VLAN probing status on eth1: Done

FortiAP

Command syntax

cw_diag -c vlan-probe-cmd <action> <interface ID> <start Vlan ID> <end Vlan ID> <retry> <timeout>

cw_diag -c vlan-probe-rpt

Where the value for action is:

  • 0— Start
  • 1 — Stop
To perform a VLAN probe in the CLI:

PS423E3X16000075 # cw_diag -c vlan-probe-cmd 0 eth0 1 4094 2 10

VLAN probing: start intf [eth0] vlan range[1,4094] retries[2] timeout[10s] ...

Stop VLAN probing.You don't need to run stop command to get the probing report, only use it when you want to stop probing.

PS423E3X16000075 # cw_diag -c vlan-probe-cmd 1 eth0

VLAN probing: stop intf [eth0] vlan range[0,0] retries[0] timeout[0s] ...

To view the VLAN probe report in the CLI:

PS423E3X16000075 # cw_diag -c vlan-probe-rpt

WTP VLAN probing status: Idle

VLAN probing report on intf[eth0] vlan range[1,4094] retries[2] timeout[10]:

VLAN_ID=0001 gateway=10.11.100.1/24 age=289

VLAN_ID=0002 gateway=10.22.100.1/24 age=289

VLAN_ID=0003 gateway=10.33.100.1/24 age=289

VLAN_ID=0004 gateway=10.44.100.1/24 age=289

VLAN_ID=0005 gateway=10.55.100.1/24 age=289

VLAN_ID=0006 gateway=10.66.100.1/24 age=289

VLAN_ID=0007 gateway=10.77.100.1/24 age=289

VLAN_ID=0100 gateway=10.3.100.1/24 age=289

VLAN_ID=0200 gateway=10.4.100.1/24 age=289

VLAN_ID=0300 gateway=10.5.100.1/24 age=289

VLAN_ID=0400 gateway=10.6.100.1/24 age=289

VLAN_ID=0500 gateway=10.7.100.1/24 age=289

VLAN_ID=0600 gateway=10.9.100.1/24 age=289

VLAN_ID=1000 gateway=10.10.100.1/24 age=289

VLAN_ID=2000 gateway=10.20.100.1/24 age=289

VLAN_ID=3000 gateway=10.30.100.1/24 age=289

VLAN_ID=4000 gateway=10.40.100.1/24 age=289

VLAN probing report on intf[eth1] vlan range[1,4094] retries[2] timeout[10]:

VLAN probe report

FortiGates that manage FortiAPs have the ability to probe VLANs and subnets connected to an access point. Use the VLAN probe wireless tool to help troubleshoot why users cannot connect to the Internet.

GUI

To perform a VLAN probe in the GUI:
  1. Go to WIFI & Switch Controller > Managed FortiAPs.
  2. Right click a FortiAP entry, and select View More Details.

  3. Click the VLAN Probe tab.
    1. Configure the settings in the VLAN Range field.
    2. Click Start.

  4. After the VLAN probing is complete, the VLAN probing report appears in the summary page.

CLI

You can use the CLI console in FortiGate and FortiAP to perform a VLAN probe and view the report.

FortiGate

Command syntax:

diagnose wireless-controller wlac -c vlan-probe-cmd <FAP Serial Number> <action> <interface ID> <start Vlan ID> <end Vlan ID> <retry> <timeout>

diagnose wireless-controller wlac -c vlan-probe-rpt <FAP Serial Number> <interface ID>

Where the value for action is:

  • 0 — Start
  • 1 — Stop

And where the value for interface ID is:

  • 0 — All Ethernet port(s) of FortiAP
  • 1 — The 1st Ethernet port of FortiAP, eth0
  • 2 — The 2nd Ethernet port of FortiAP, eth1, if the hardware exists
To perform a VLAN probe in the CLI:

FortiGate-81E-POE (vdom1) # diagnose wireless-controller wlac -c vlan-probe-cmd PS423E3X16000075 0 0 1 4094 2 10

Sending VLAN probe command to PS423E3X16000075: action=start wan-port=1 vlan=[1,4094] retries=2 timeout=10s

Sending VLAN probe command to PS423E3X16000075: action=start wan-port=2 vlan=[1,4094] retries=2 timeout=10s

Stop VLAN probing. You don't need to run stop command to get the probing report, only use it when you want to stop probing.

FortiGate-81E-POE (vdom1) # diag wi wlac -c vlan-probe-cmd PS423E3X16000075 1 0

Sending VLAN probe command to PS423E3X16000075: action=stop wan-port=1

Sending VLAN probe command to PS423E3X16000075: action=stop wan-port=2

To view the VLAN probe report in the CLI:

FortiGate-81E-POE (vdom1) # diagnose wireless-controller wlac -c vlan-probe-rpt PS423E3X16000075 0

VLAN probing status on eth0: Done

intf eth0 VLAN_ID=0001 gateway=10.11.100.1/24 probed_at=Wed Jan 16 17:09:48 2019

intf eth0 VLAN_ID=0002 gateway=10.22.100.1/24 probed_at=Wed Jan 16 17:09:48 2019

intf eth0 VLAN_ID=0003 gateway=10.33.100.1/24 probed_at=Wed Jan 16 17:09:48 2019

intf eth0 VLAN_ID=0004 gateway=10.44.100.1/24 probed_at=Wed Jan 16 17:09:48 2019

intf eth0 VLAN_ID=0005 gateway=10.55.100.1/24 probed_at=Wed Jan 16 17:09:48 2019

intf eth0 VLAN_ID=0006 gateway=10.66.100.1/24 probed_at=Wed Jan 16 17:09:48 2019

intf eth0 VLAN_ID=0007 gateway=10.77.100.1/24 probed_at=Wed Jan 16 17:09:48 2019

intf eth0 VLAN_ID=0100 gateway=10.10.20.2/24 probed_at=Wed Jan 16 17:09:49 2019

intf eth0 VLAN_ID=0200 gateway=10.4.100.1/24 probed_at=Wed Jan 16 17:09:48 2019

intf eth0 VLAN_ID=0300 gateway=10.5.100.1/24 probed_at=Wed Jan 16 17:09:49 2019

intf eth0 VLAN_ID=0400 gateway=10.6.100.1/24 probed_at=Wed Jan 16 17:09:49 2019

intf eth0 VLAN_ID=0500 gateway=10.7.100.1/24 probed_at=Wed Jan 16 17:09:49 2019

intf eth0 VLAN_ID=0600 gateway=10.9.100.1/24 probed_at=Wed Jan 16 17:09:49 2019

intf eth0 VLAN_ID=1000 gateway=10.10.100.1/24 probed_at=Wed Jan 16 17:09:49 2019

intf eth0 VLAN_ID=2000 gateway=10.20.100.1/24 probed_at=Wed Jan 16 17:09:49 2019

intf eth0 VLAN_ID=3000 gateway=10.30.100.1/24 probed_at=Wed Jan 16 17:09:49 2019

intf eth0 VLAN_ID=4000 gateway=10.40.100.1/24 probed_at=Wed Jan 16 17:09:49 2019

VLAN probing status on eth1: Done

FortiAP

Command syntax

cw_diag -c vlan-probe-cmd <action> <interface ID> <start Vlan ID> <end Vlan ID> <retry> <timeout>

cw_diag -c vlan-probe-rpt

Where the value for action is:

  • 0— Start
  • 1 — Stop
To perform a VLAN probe in the CLI:

PS423E3X16000075 # cw_diag -c vlan-probe-cmd 0 eth0 1 4094 2 10

VLAN probing: start intf [eth0] vlan range[1,4094] retries[2] timeout[10s] ...

Stop VLAN probing.You don't need to run stop command to get the probing report, only use it when you want to stop probing.

PS423E3X16000075 # cw_diag -c vlan-probe-cmd 1 eth0

VLAN probing: stop intf [eth0] vlan range[0,0] retries[0] timeout[0s] ...

To view the VLAN probe report in the CLI:

PS423E3X16000075 # cw_diag -c vlan-probe-rpt

WTP VLAN probing status: Idle

VLAN probing report on intf[eth0] vlan range[1,4094] retries[2] timeout[10]:

VLAN_ID=0001 gateway=10.11.100.1/24 age=289

VLAN_ID=0002 gateway=10.22.100.1/24 age=289

VLAN_ID=0003 gateway=10.33.100.1/24 age=289

VLAN_ID=0004 gateway=10.44.100.1/24 age=289

VLAN_ID=0005 gateway=10.55.100.1/24 age=289

VLAN_ID=0006 gateway=10.66.100.1/24 age=289

VLAN_ID=0007 gateway=10.77.100.1/24 age=289

VLAN_ID=0100 gateway=10.3.100.1/24 age=289

VLAN_ID=0200 gateway=10.4.100.1/24 age=289

VLAN_ID=0300 gateway=10.5.100.1/24 age=289

VLAN_ID=0400 gateway=10.6.100.1/24 age=289

VLAN_ID=0500 gateway=10.7.100.1/24 age=289

VLAN_ID=0600 gateway=10.9.100.1/24 age=289

VLAN_ID=1000 gateway=10.10.100.1/24 age=289

VLAN_ID=2000 gateway=10.20.100.1/24 age=289

VLAN_ID=3000 gateway=10.30.100.1/24 age=289

VLAN_ID=4000 gateway=10.40.100.1/24 age=289

VLAN probing report on intf[eth1] vlan range[1,4094] retries[2] timeout[10]: