30.11.2016 Views

FortiOS Handbook - Deploying Wireless Networks

wireless-54

wireless-54

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

What’s new in <strong>FortiOS</strong> 5.4<br />

GUI support for WiFi SSID schedules (276425 269695 269668 )<br />

WiFi SSIDs include a schedule that determines when the WiFi network is available. The default schedule is<br />

Always. You can choose any schedule (but not schedule group) that is defined in Policy & Objects > Objects ><br />

Schedules.<br />

CLI Syntax<br />

config wireless-controller vap<br />

edit vap-name<br />

set schedule always<br />

end<br />

The WiFi SSID list includes a Schedule column.<br />

SSID Groups<br />

An SSID Group has SSIDs as members and can be specified in any field that accepts an SSID.<br />

To create an SSID Group in the GUI, go to WiFi Controller > SSID and select Create New > SSID Group. Give<br />

the group a Name and choose Members (SSIDs, but not SSID Groups).<br />

To create an SSID Group in the CLI:<br />

config wireless-controller vap-group<br />

edit vap-group-name<br />

set vaps "ssid1" "ssid2"<br />

end<br />

RADIUS Change of Authorization (CoA) support<br />

The CoA feature enables the FortiGate to receive a client disconnect message from the RADIUS server. This is<br />

used to disconnect clients when their time, credit or bandwidth had been used up. Enable this on the RADIUS<br />

server using the CLI:<br />

config user radius<br />

edit <br />

set radius-coa enable<br />

end<br />

CAPWAP offloading to NPU<br />

On FortiGates with the NP6 processor, offloading of CAPWAP traffic to the NP6 is enabled by default.<br />

Administrative access to managed FortiAPs<br />

By default, telnet access to a FortiAP unit's internal configuration is disabled when the FortiAP is managed (has<br />

been authorized) by a FortiGate. You can enable administrative access in the FortiAP profile, like this:<br />

config wireless-controller wtp-profile<br />

edit FAP321C-default<br />

set allowaccess telnet<br />

end<br />

20 <strong>Deploying</strong> <strong>Wireless</strong> <strong>Networks</strong> for <strong>FortiOS</strong> 5.4<br />

Fortinet Technologies Inc.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!