?
Solved

Guest SSID config on Cisco AP

Posted on 2014-12-16
3
Medium Priority
?
391 Views
Last Modified: 2015-02-18
Here is the scenario:
I have two Cisco AP's  and one Fortigate Firewall. The AP's are directly connected to the inside zone of Fortigate firewall 60D.
Model of CIsco AP: AIR-SAP702i-N-K9
Model of Fortigate Firewall is: Fortigate 60D.

On Fortigate firewall 60D, we have 8 ports facing inside network, one is connected to outside network(to ISP) and other is connected to DMZ.

Here I wish to configure Guest SSID and User SSID on Cisco AP which is in standalone mode.  I have configured User SSID and both are working fine. The inside network is 192.168.1.0/24 and Gateway is 192.168.1.99.

Need help to configure Guest SSID on AP and the changes required on the Fortigate firewall. Assume Port 1 & 2 are connected to Cisco AP.

Thanks
Sub
0
Comment
Question by:Subhashis Sahoo
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 46

Assisted Solution

by:Craig Beck
Craig Beck earned 500 total points
ID: 40503135
You need to configure each SSID in its own VLAN on the AP.  For example, User SSID VLAN 10, Guest SSID VLAN 20.  This should be identical on each AP.

The Fortigate needs to allow VLAN trunking on each port connected to an AP and you need a VLAN subinterface for each VLAN to allow the Fortigate to route/NAT for each VLAN.
0
 

Author Comment

by:Subhashis Sahoo
ID: 40503159
As for domain users, we have a SSID created and need to configure for Guest. The domain users are in default vlan 1.
Pls correct me if I am wrong:
We need to create one more vlan for Guests users on Fortigate firewall.
Create a Guest SSID on both AP's. Associate to the Guest Vlan and map it to the port.
make the port as trunk port on Fortigate firewall (connected to AP) allowing both the vlans to pass through.
Create access rules on Fortigate firewall 60 D.
Assume the domain users are in subnet 192.168.1.0/24. gateway of firewall is 192.168.1.99. and Guest Users to be in 172.168.10.0/24

My question:
How do we make it as trunk port on Forigate firewall 60D. Any documents supporting the config for Fortigate 60 D will be helpful,.

Thanks
Subhashis
0
 
LVL 10

Accepted Solution

by:
tmoore1962 earned 500 total points
ID: 40503192
Don't forget you will have to configure dhcp for the vlan on the fortigate or configure it for dhcp relay and create a scope on your dhcp server for the subnet of your guest vlan.
0

Featured Post

What does it mean to be "Always On"?

Is your cloud always on? With an Always On cloud you won't have to worry about downtime for maintenance or software application code updates, ensuring that your bottom line isn't affected.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Suggested Courses

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question