Fortinet GURU

Fortigate guides and more.

Fortinet GURU

WIFI Dynamic user VLAN assignment

Dynamic user VLAN assignment

Clients connecting to the WiFi network can be assigned to a VLAN. You can do this with RADIUS attributes when the user authenticates or with VLAN pooling when the client associates with a particular FortiAP. You cannot use both of these methods at the same time.

VLAN assignment by RADIUS

You can assign each individual user to a VLAN based on information stored in the RADIUS authentication server. If the user’s RADIUS record does not specify a VLAN ID, the user is assigned to the default VLAN for the SSID.

The RADIUS user attributes used for the VLAN ID assignment are:

IETF 64 (Tunnel Type)—Set this to VLAN.

IETF 65 (Tunnel Medium Type)—Set this to 802

IETF 81 (Tunnel Private Group ID)—Set this to the VLAN ID.  To configure dynamic VLAN assignment, you need to:

  • Configure access to the RADIUS server.
  • Create the SSID and enable dynamic VLAN assignment.
  • Create a FortiAP Profile and add the local bridge mode SSID to it.
  • Create the VLAN interfaces and their DHCP servers.
  • Create security policies to allow communication from the VLAN interfaces to the Internet.
  • Authorize the FortiAP unit and assign the FortiAP Profile to it.

To configure access to the RADIUS server

  • Go to User & Device > RADIUS Servers and select Create New .
  • Enter a Name , the name or IP address in Primary Server IP/Name , and the server secret in Primary Server Secret .
  • Select OK .

To create the dynamic VLAN SSID

  • Go to WiFi & Switch Controller > SSID , select Create New > SSID and enter:
An identifier, such as dynamic_vlan_ssid.
Local bridge or Tunnel, as needed.
An identifier, such as DYNSSID.
WPA2 Enterprise
RADIUS Server. Select the RADIUS server that you configured.
  • Enable dynamic VLAN in the CLI. Optionally, you can also assign a VLAN ID to set the default VLAN for users without a VLAN assignment.

config wireless-controller vap edit dynamic_vlan_ssid set dynamic-vlan enable set vlanid 10

To create the FortiAP profile for the dynamic VLAN SSID

  • Go to WiFi & Switch Controller > FortiAP Profiles , select Create New and enter:
A name for the profile, such as dyn_vlan_profile.
The FortiAP model you are using. If you use more than one model of FortiAP, you will need a FortiAP Profile for each model.
Select the SSID you created (example dynamic_vlan_ssid). Do not add other SSIDs.
  • Adjust other radio settings as needed.

To create the VLAN interfaces

  • Go to Network > Interfaces and select Create New > Interface .
A name for the VLAN interface, such as VLAN100.
The physical interface associated with the VLAN interface.
The numeric VLAN ID, for example 100.
Select Manual and enter the IP address / Network Mask for the virtual interface.
Enable and then select Create New to create an address range.
  • Repeat the preceding steps to create other VLANs as needed.

Security policies determine which VLANs can communicate with which other interfaces. These are the simple Firewall Address policy without authentication. Users are assigned to the appropriate VLAN when they authenticate.

To connect and authorize the FortiAP unit

  • Connect the FortiAP unit to the FortiGate unit.
  • Go to WiFi & Switch Controller > Managed FortiAPs .
  • When the FortiAP unit is listed, double-click the entry to edit it.
  • In FortiAP Profile , select the FortiAP Profile that you created.
  • Select Authorize .

VLAN assignment by VLAN pool

In an SSID, you can define a VLAN pool. As clients associate to an AP, they are assigned to a VLAN. A VLAN pool can

l assign a specific VLAN based on the AP’s FortiAP Group, usually for network configuration reasons, or l assign one of several available VLANs for network load balancing purposes (tunnel mode SSIDs only)

To assign a VLAN by FortiAP Group – CLI

In this example, VLAN 101, 102, or 103 is assigned depending on the AP’s FortiAP Group.

config wireless-controller vap edit wlan set vlan-pooling wtp-group config vlan-pool edit 101 set wtp-group wtpgrp1

next edit 102 set wtp-group wtpgrp2

next edit 101 set wtp-group wtpgrp3

Configuring user authentication

Load balancing

There are two VLAN pooling methods used for load balancing: The choice of VLAN can be based on any one of the following criteria:

l round-robin – from the VLAN pool, choose the VLAN with the smallest number of clients l hash – choose a VLAN from the VLAN pool based on a hash of the current number of SSID clients and the number of entries in the VLAN pool

If the VLAN pool contains no valid VLAN ID, the SSID’s static VLAN ID setting is used.

To assign a VLAN by round-robin selection – CLI

In this example, VLAN 101, 102, or 103 is assigned using the round-robin method:

config wireless-controller vap edit wlan set vlan-pooling round-robin config vlan-pool edit 101 next edit 102 next edit 103 end

To assign a VLAN by hash-based selection – CLI

In this example, VLAN 101, 102, or 103 is assigned using the hash method:

config wireless-controller vap edit wlan set vlan-pooling hash config vlan-pool edit 101 next edit 102 next edit 103 end

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Tumblr (Opens in new window)
  • Click to share on Reddit (Opens in new window)

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Save my name, email, and website in this browser for the next time I comment.

Notify me of follow-up comments by email.

Notify me of new posts by email.

This site uses Akismet to reduce spam. Learn how your comment data is processed .

Linux, Fortinet, Life

dynamic vlan assignment fortigate

Fortigate – Dynamic VLAN (tunnel mode)

In this example we will create a wireless VAP in tunnel mode with dynamic VLAN assignment via radius server based on group membership.

First we create a new SSID, traffic mode is “Tunnel to wireless controller”, an IP address doesn’t need to be configured here unless some users/groups won’t be assigned a VLAN.

dynamic vlan assignment fortigate

Next we turn on dynamic vlan via cli:

Now we create a new VLAN (or several depending on the number of required groups), at the time of this writing it is not possible to associate a VLAN with a VAP interface in the GUI so this must be done via CLI:

Edit the newly created VLAN in the GUI to enable the DHCP server:

dynamic vlan assignment fortigate

Now we’re ready to test dynamic VLAN assignment with a wireless client.

Leave a Reply Cancel reply

You must be logged in to post a comment.

Get the Reddit app

Discussing all things Fortinet.

Dynamic VLAN assignment for VPN users

Goal: Users will receive a predefined VLAN access/IP when connecting to fortigate's VPN. The VLAN should be defined as a radius/ldap attribute of the user.

Architecture: We have a fortigate connected to a radius server to authenticate users. (FortiGate -> Freeradius -> OpenLDAP)

We can successfully authenticate users against our radius users using SSL VPN. I have seen multiple guides on how to dynamically assign VLAN for users using 802.1x but I could not find any resource how to achieve it over VPN.

Can this be done? If so, how?

  • Support Forum
  • Customer Service
  • Internal Article Nominations
  • FortiClient
  • FortiAnalyzer
  • FortiBridge
  • FortiAuthenticator
  • FortiCarrier
  • FortiConnect
  • FortiConverter
  • FortiDevSec
  • FortiDeceptor
  • FortiDirector
  • FortiGate Cloud
  • FortiExtender
  • FortiHypervisor
  • FortiInsight
  • FortiIsolator
  • FortiMonitor
  • FortiManager
  • FortiNDR (on-premise)
  • FortiNDRCloud
  • FortiPortal
  • FortiRecorder
  • FortiSandbox
  • FortiSwitch
  • FortiTester
  • Wireless Controller
  • FortiWebCloud
  • RMA Information and Announcements
  • FortiCloud Products
  • 4D Documents
  • Engage Services
  • The EPSP Platform
  • The ETSP Platform
  • Discussions & Onboarding Information
  • Technical Learning
  • Discussions
  • Knowledge Base
  • Idea Exchange
  • Announcements
  • Getting Started Resources
  • Fortinet Community
  • Re: Why is the same IP address assigned for VLAN S...
  • Subscribe to RSS Feed
  • Mark Topic as New
  • Mark Topic as Read
  • Float this Topic for Current User
  • Printer Friendly Page

jefazo92

Created on ‎06-24-2024 01:01 AM Edited on ‎06-24-2024 01:01 AM

  • Mark as New
  • Report Inappropriate Content

Why is the same IP address assigned for VLAN Switch interfaces in FG-100F?

  • All forum topics
  • Previous Topic

ebilcari

Created on ‎06-24-2024 08:07 AM

Created on ‎06-26-2024 12:00 AM

Created on ‎06-26-2024 12:09 AM

Created on ‎06-26-2024 12:34 AM

Created on ‎06-27-2024 12:38 AM

sub-interface.PNG

Select Forum Responses to become Knowledge Articles!

Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.

  • FortiGate/FortiManager communication over NAT 156 Views
  • Why is the same IP address... 241 Views
  • What da heck is going on... 340 Views
  • FortiManager-Add device by pre shared key 192 Views
  • FortiGate 7.4.4 VM IPv6 Prefix Delegation... 205 Views
  • Alphabetical
  • FortiGate 7,205
  • FortiClient 1,422
  • FortiManager 621
  • FortiAnalyzer 462
  • FortiAP 377
  • FortiSwitch 376
  • FortiClient EMS 291
  • FortiMail 281
  • FortiAuthenticator v5.5 234
  • FortiWeb 177
  • FortiNAC 129
  • FortiGuard 117
  • SSL-VPN 109
  • FortiGateCloud 97
  • FortiSIEM 94
  • FortiCloud Products 90
  • FortiToken 77
  • Customer Service 71
  • Wireless Controller 66
  • FortiProxy 49
  • FortiEDR 46
  • FortiADC 45
  • Fortivoice 44
  • FortiDNS 40
  • FortiGate v5.4 36
  • FortiExtender 35
  • FortiAuthenticator 35
  • Firewall policy 35
  • FortiSandbox 34
  • FortiSwitch v6.4 32
  • High Availability 32
  • FortiWAN 24
  • FortiConnect 24
  • FortiConverter 23
  • Certificate 21
  • FortiGate v5.2 20
  • Interface 19
  • FortiPortal 18
  • FortiSwitch v6.2 17
  • Authentication 17
  • FortiLink 16
  • FortiMonitor 15
  • FortiGate v5.0 14
  • Fortigate Cloud 14
  • FortiDDoS 14
  • SSL SSH inspection 12
  • FortiCASB 12
  • Web profile 11
  • Traffic shaping 11
  • Virtual IP 11
  • Application control 11
  • FortiRecorder 10
  • FortiWeb v5.0 9
  • FortiManager v5.0 9
  • WAN optimization 9
  • RMA Information and Announcements 8
  • FortiSOAR 8
  • IP address management - IPAM 8
  • FortiAnalyzer v5.0 8
  • FortiBridge 8
  • FortiGate v4.0 MR3 8
  • Security profile 7
  • Proxy policy 7
  • FortiAP profile 7
  • Automation 7
  • Web application firewall profile 7
  • Static route 6
  • Traffic shaping policy 6
  • IPS signature 5
  • Packet capture 5
  • System settings 5
  • DNS Filter 5
  • FortiCache 5
  • FortiManager v4.0 5
  • FortiDeceptor 4
  • FortiDirector 4
  • Web rating 4
  • Intrusion prevention 4
  • Port policy 4
  • Antivirus profile 4
  • Traffic shaping profile 4
  • Fortinet Engage Partner Program 4
  • FortiCarrier 4
  • FortiTester 4
  • FortiScan 4
  • DLP sensor 4
  • Email filter profile 3
  • Fabric connector 3
  • NAC policy 3
  • Multicast routing 3
  • FortiToken Cloud 3
  • Application signature 3
  • DLP Dictionary 3
  • DLP profile 3
  • DoS policy 3
  • FortiInsight 2
  • Protocol option 2
  • FortiHypervisor 2
  • Authentication rule and scheme 2
  • VoIP profile 2
  • Explicit proxy 2
  • Internet Service Database 2
  • Multicast policy 1
  • Subscription Renewal Policy 1
  • Replacement messages 1
  • FortiManager-VM 1
  • SDN connector 1
User Count
1079
892
529
441
152

fortinet

The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.

  • Threat Research
  • FortiGuard Labs
  • Threat Briefs
  • Security Fabric
  • Certifications
  • Industry Awards
  • Social Responsibility
  • News Releases
  • News Articles

Copyright 2024 Fortinet, Inc. All Rights Reserved.

  • Terms of Service
  • Privacy Policy
  • Cookie Settings

COMMENTS

  1. Dynamic VLAN assignment for SSID clients ...

    Make sure to enable dynamic VLAN assignment. GUI: Navigate to WiFi & Switch Controller -> SSIDs -> Create New. CLI: config wireless-controller vap. ... Because the tunnel mode SSID creates a layer 3 virtual interface on the FortiGate and thus VLANs would be matched that are bound to that SSID interface. When SSID is in bridge mode.

  2. FortiGate WiFi WPA2-Enterprise dynamic VLANs assignment

    The FortiGate as wireless controller can be set up to manage FortiAPs and to do WPA enterprise authentication. Allow user access to a single Wi-Fi more granular though can be done with Dynamic VLAN Assignments. Dynamic VLAN assignment is available for both tunnel and bridge mode. Tunnel mode as traffic will be centrally managed by the FortiGate ...

  3. How to Dynamic Vlan Assignment

    Dynamic VLAN provison for wifi user... 376 Views; Port-Based 802.1x Security Policy and IP... 1180 Views; 802.1x dynamic vlan assignment in fortilink 406 Views; Allowing Inter-Vlan Communication 842 Views

  4. Dynamic VLAN name assignment from RADIUS attribute

    To configure dynamic VLAN name assignment: Configure a RADIUS server: Set Tunnel-Type to "VLAN". Set Tunnel-Medium-Type to "IEEE-802". Set Tunnel-Private-Group-Id to "my.vlan.10". Designate the VLAN name instead of VLAN ID. Configure the FortiGate: config system interface. edit "my.vlan.10".

  5. Configuring dynamic user VLAN assignment

    One VLAN ID per user. See Reserved VLAN IDs. To configure dynamic VLAN assignment, you need to: Configure access to the RADIUS server. Create the SSID and enable dynamic VLAN assignment. Create a FortiAP Profile and add the local bridge mode SSID to it. Create the VLAN interfaces and their DHCP servers.

  6. Assigning WiFi users to VLANs dynamically

    Web Application / API Protection. FortiWeb / FortiWeb Cloud; FortiADC / FortiGSLB; SAAS Security

  7. WIFI Dynamic user VLAN assignment

    To configure dynamic VLAN assignment, you need to: Configure access to the RADIUS server. Create the SSID and enable dynamic VLAN assignment. Create a FortiAP Profile and add the local bridge mode SSID to it. Create the VLAN interfaces and their DHCP servers. Create security policies to allow communication from the VLAN interfaces to the Internet.

  8. VLANs

    The FortiGate internal interface connects to the VLAN switch through an 802.1Q trunk. The internal interface has an IP address of 192.168.110.126 and is configured with two VLAN subinterfaces (VLAN_100 and VLAN_200). The external interface has an IP address of 172.16.21.2 and connects to the Internet.

  9. MAB Dynamic VLAN assignment with FortiGate, FortiSwitch and

    This video will be helpful to understand and configure basic MAC-based authentication with Dynamic VLAN assignment only to devices that have successfully bee...

  10. Assigning a VLAN via NAC policies control...

    This article describes how to perform configuration on FortiGate to assign a VLAN via NAC policies based on ZTNA tags synchronized from FortiClient EMS. Scope: ... The example below is using ZTNA tag from EMS, and Dynamic Address created by NAC Policy for source address: 5) Configure onboarding VLAN under 'WiFi & Switch Controller/NAC Policies ...

  11. Fortigate

    Fortigate - Dynamic VLAN (tunnel mode) In this example we will create a wireless VAP in tunnel mode with dynamic VLAN assignment via radius server based on group membership. First we create a new SSID, traffic mode is "Tunnel to wireless controller", an IP address doesn't need to be configured here unless some users/groups won't be ...

  12. How to Dynamic Vlan Assignment : r/fortinet

    Dynamic port assignment is for non-user ports; think access points, cameras, iot devices. Use NAC for your user ports; think desktop, laptops, kiosk. I think you can do both. Dynamic port policy is to my knowledge the old way. NAC is the new way and the way I will recommend you go. Hey guys, I'm trying to "Dynamic Vlan Assingment" on the ...

  13. Dynamic VLAN assignment without radius : r/fortinet

    Dynamic VLAN assignment without radius. Hi Fortinet Experts, We are working on phasing out our local onsite infrastructure and are going to full cloud, which means our domain controllers and radius will be phased out. Currently, we have our wireless network setup using 802.1x and radius. Because we are phasing out radius we need a new solution ...

  14. Troubleshooting Tip: Dynamic VLAN assignment featu ...

    FortiGate, SSID. By default, the Dynamic VLAN assignment is disabled. This feature is useful when users need to change the VLAN automatically after changing the connected AP. By default, it is disabled. However, it can be enabled connect to the RADIUS server to authenticate the user continually while the user is moving across different APs.

  15. Dynamic VLAN assignment for VPN users : r/fortinet

    Dynamic VLAN assignment for VPN users. Users will receive a predefined VLAN access/IP when connecting to fortigate's VPN. The VLAN should be defined as a radius/ldap attribute of the user. We have a fortigate connected to a radius server to authenticate users. We can successfully authenticate users against our radius users using SSL VPN.

  16. Dynamic VLAN assignment

    7.4.0. Dynamic VLAN assignment. Dynamic VLAN assignment. You can configure the RADIUS server to return a VLAN in the authentication reply message: On the FortiSwitch unit, select port-based authentication or MAC-based authentication and a security group. On the RADIUS server, configure the attributes.

  17. 802.1x dynamic vlan assignment in fortilink

    FGT/FSW in FortiLink mode can be configured for dynamic VLAN assignment via RADIUS. You have to create an apply a Security Policy at the switch port level, like shown below: Just keep in mind that even though the RADIUS configuration are done through FGT the RADIUS requests are originated from the FSW. Make sure the switch can reach the RADIUS ...

  18. Why is the same IP address assigned for VLAN ...

    Yes, assigning an IP to the interface will make it work as a routed interface, no extra steps required. Remember that FGT is a firewall and you need to add firewall policies (usually for each interface) to allow traffic. FGT supports both the sub interface and L2 VLAN (HW/SW switch) approach. As p...