FortiAP
FortiAP devices are thin wireless access points (AP) supporting the latest Wi-Fi technologies (multi-user MIMO 802.11ac Wave 1 and Wave 2, 4x4), as well as 802.11n, 802.11AX , and the demand for plug and play deployment.
laltuzar
Staff
Staff
Article Id 267603
Description

 

This article describes how to configure NAC policies for Wireless devices.

 

Scope

 

FortiGate 100E 7.2.5.
FortiSwitch 108E-POE 7.4.0.
FortiAP 221E 7.2.2.

 

Solution

 

Network Access Control (NAC) facilitates the implementation of network policies to regulate devices and users accessing a network. The wireless NAC policy is established based on identifiable patterns associated with users and devices.

 

These patterns may involve user groups and device hardware information. The NAC can be activated for SSIDs operating in either tunnel or bridged mode and requires a minimum of 2 VLANs for setting up the onboarding segment and the appropriate VLAN for the Wireless Devices. These VLANs must have L3 settings, including DHCP and network device detection services.

 

Devices that conform to an NAC policy will be allocated to the VLAN configured within the NAC policy for the wireless controller section. Moreover, the NAC policy can also be utilized for FortiSwitch NAC.

 

In this case, let's create four VLANs:

  1. Onboarding VLAN (vap_v300 – VLAN ID 100).
  2. VLAN for Android OS (vap_v400 – VLAN ID 400).
  3. VLAN for Windows OS despite its version (vap_v500 – VLAN ID 500).
  4. VLAN for Apple iOS (vap_600 - VLAN ID 600).

The steps to configure are as follows:

 

  1. Configure VAP SSID:

    config wireless-controller vap
        edit "wifi.vap.01" <--
            set ssid "laltuzar-nac"
            set passphrase *********
            set schedule "always"
        next
    end​

  2. Create three VLAN interfaces under the VAP created in step 1:

    config system interface
        edit "vap_v300" <--
            set vdom "root"
            set ip 10.100.1.1 255.255.255.0
            set allowaccess ping
            set description "Onboarding VLAN"
            set device-identification enable
            set role lan
            set interface "wifi.vap.01"
            set vlanid 100
        next
        edit "vap_v400" <--
            set vdom "root"
            set ip 10.101.1.1 255.255.255.0
            set allowaccess ping https ssh http speed-test
            set device-identification enable
            set role lan
            set interface "wifi.vap.01"
            set vlanid 400
        next
    end
        edit "vap_v500" <--
            set vdom "root"
            set ip 10.102.1.1 255.255.255.0
            set allowaccess ping https ssh http speed-test
            set device-identification enable
            set role lan
            set interface "wifi.vap.01"
            set vlanid 500
        next
         edit "vap_v600" <--
            set vdom "root"
            set ip 10.103.1.1 255.255.255.0
            set allowaccess ping https ssh http speed-test
            set device-identification enable
            set role lan
            set interface "wifi.vap.01"
            set vlanid 600
        next
    end​

  3. Create the Wireless NAC profile and assign the onboarding VLAN:

    config wireless-controller nac-profile
        edit "wifi-nac-profile-1"
            set onboarding-vlan "vap_v300"
        next
    end​

  4. Select the wireless NAC profile in the VAP:

    config wireless-controller vap
        edit "wifi.vap.01"
            set nac enable
            set nac-profile "wifi-nac-profile-1"
        next
    end​

  5. Create the SSID policy:

    config wireless-controller ssid-policy
        edit "wifi-sssid-policy-1"
            set vlan "vap_v400"
        next
        edit "NACPolicyWindows"
            set vlan "vap_v500"
        next
        edit "NACPolicyiPhone"
            set vlan "vap_v600"
        next
    end​

  6. Create the NAC policies based on the STA's OS. In this case, vap_v400 will be used for Android devices, vap_v500 for Windows, and vap_600 for iOS users.

    NAC Policy for Android UsersNAC Policy for Android Users
    NAC Policy for Windows UsersNAC Policy for Windows Users
    Captura NACPOLICYIPHONE.pngNAC Policy for Windows Users.

 

Once finished, the interfaces should look like this:

WIFI_INTERFACE.png

With the corresponding DHCP settings:

 

DHCP_VAP_300.png

DHCP_VAP_400.png

DHCP_VAP_500.png

DHCP_VAP_600.png

Finally, the SSID should look something like this:

 

FINAL_SSID.png

 

SSID in Bridge Mode:

 

How to configure NAC Policies for WLAN with Bridge Mode:

 

The previous example uses SSIDs in Tunnel mode with the IP addressing on the VLANs configured under the SSID.

 

However, when using SSIDs in Bridge mode, the IP addressing instead is configured on the switch VLANs, which need to use the same VLAN number as the VLANs defined under the SSID. The connection to the FortiAPs then need to be configured as trunks.

Consequently, this configuration would instead look like the following, assuming that 'fortilink' is the interface for the FortiSwitches:

 

Create three VLAN interfaces under the VAP created in step 1:

 

config system interface

    edit "fsw_v300"

        set vdom "root"

        set ip 10.100.1.1 255.255.255.0

        set allowaccess ping

        set description "Onboarding VLAN"

        set device-identification enable

        set role lan

        set interface "fortilink"

        set vlanid 100 <-- This must match the corresponding vap vlanid

    next

    edit "fsw_v400"

        set vdom "root"

        set ip 10.101.1.1 255.255.255.0

        set allowaccess ping https ssh http speed-test

        set device-identification enable

        set role lan

        set interface "fortilink"

        set vlanid 400

    next

end

    edit "fsw_v500"

        set vdom "root"

        set ip 10.102.1.1 255.255.255.0

        set allowaccess ping https ssh http speed-test

        set device-identification enable

        set role lan

        set interface "fortilink"

        set vlanid 500

    next

     edit "fsw_v600"

        set vdom "root"

        set ip 10.103.1.1 255.255.255.0

        set allowaccess ping https ssh http speed-test

        set device-identification enable

        set role lan

        set interface "fortilink"

        set vlanid 600

    next

    edit "vap_v300"

        set vdom "root"

        set ip 0.0.0.0 0.0.0.0

        set allowaccess ping

        set description "Onboarding VLAN"

        set device-identification enable

        set role lan

        set interface "wifi.vap.01"

        set vlanid 100

    next

    edit "vap_v400"

        set vdom "root"

        set ip 0.0.0.0 0.0.0.0

        set allowaccess ping https ssh http speed-test

        set device-identification enable

        set role lan

        set interface "wifi.vap.01"

        set vlanid 400

    next

end

    edit "vap_v500"

        set vdom "root"

        set ip 0.0.0.0 0.0.0.0

        set allowaccess ping https ssh http speed-test

        set device-identification enable

        set role lan

        set interface "wifi.vap.01"

        set vlanid 500

    next

     edit "vap_v600"

        set vdom "root"

        set ip 0.0.0.0 0.0.0.0

        set allowaccess ping https ssh http speed-test

        set device-identification enable

        set role lan

        set interface "wifi.vap.01"

        set vlanid 600

    next

end

Comments
ehamud
Staff
Staff

Great!!