FortiNAC. Cisco Airespace Wireless Controller Integration. Version: 8.x. Date: 8/28/2018. Rev: B

Similar documents
FortiNAC. HiPath. Enterasys. Siemens. Extreme. Wireless Integration. Version: 8.x. Date: 8/28/2018. Rev: B

FortiNAC Motorola Wireless Controllers Integration

FortiNAC. Aerohive Wireless Access Point Integration. Version 8.x 8/28/2018. Rev: E

FortiNAC ADTRAN vwlan Wireless Controllers Integration

P ART 3. Configuring the Infrastructure

Configuring Hybrid REAP

CounterACT Wireless Plugin

Vendor: Cisco. Exam Code: Exam Name: Implementing Advanced Cisco Unified Wireless Security (IAUWS) v2.0. Version: Demo

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Configuring FlexConnect Groups

Identity Services Engine Guest Portal Local Web Authentication Configuration Example

Deployment Guide for Cisco Guest Access Using the Cisco Wireless LAN Controller, Release 4.1

ForeScout CounterACT. Configuration Guide. Version 1.8

Cisco Exam Implementing Advanced Cisco Unified Wireless Security v2.0 Version: 9.0 [ Total Questions: 206 ]

Configuring Client Profiling

ISE Version 1.3 Hotspot Configuration Example

Configure 802.1x Authentication with PEAP, ISE 2.1 and WLC 8.3

Wireless Integration Overview

Cisco Questions & Answers

Securing Wireless LAN Controllers (WLCs)

Securing Cisco Wireless Enterprise Networks ( )

Manage Your Inventory

ISE Version 1.3 Self Registered Guest Portal Configuration Example

Configuring OfficeExtend Access Points

Verify Radius Server Connectivity with Test AAA Radius Command

Cisco TrustSec How-To Guide: Universal Configuration for the Cisco Wireless LAN Controller

Cisco Deploying Basic Wireless LANs

Universal Wireless Controller Configuration for Cisco Identity Services Engine. Secure Access How-To Guide Series

LAB: Configuring LEAP. Learning Objectives

Manage Your Device Inventory

Cisco Exactexams Questions & Answers

Cisco Exam Questions and Answers (PDF) Cisco Exam Questions BrainDumps

Configuring FlexConnect Groups

Manage Your Inventory

Lightweight AP (LAP) Registration to a Wireless LAN Controller (WLC)

OmniVista 3.5 Discovery Help

Wireless LAN Controller (WLC) Design and Features FAQ

Configuring Repeater and Standby Access Points and Workgroup Bridge Mode

Configuring a VAP on the WAP351, WAP131, and WAP371

Configuring Layer2 Security

Central Web Authentication on the WLC and ISE Configuration Example

CCIE Wireless v3 Lab Video Series 1 Table of Contents

Configure Devices Using Converged Access Deployment Templates for Campus and Branch Networks

Workgroup Bridges. Cisco WGBs. Information About Cisco Workgroup Bridges. Cisco WGBs, page 1 Third-Party WGBs and Client VMs, page 9

Discover Your Network

CertifyMe. CISCO EXAM QUESTIONS & ANSWERS

Configure Site Network Settings

ISE Express Installation Guide. Secure Access How -To Guides Series

CCIE Wireless v3.1 Workbook Volume 1

Symbols. Numerics I N D E X

Troubleshooting Web Authentication on a Wireless LAN Controller (WLC)

AAA Administration. Setting up RADIUS. Information About RADIUS

The Discovery Wizard now provides the ability to create SNMP Setups that can be selected for individual discoveries. An SNMP Setup specifies:

TECHNICAL NOTE UWW & CLEARPASS HOW-TO: CONFIGURE UNIFIED WIRELESS WITH CLEARPASS. Version 2

Quick Start Guide for Standalone EAP

CCIE Wireless v3 Workbook Volume 1

Integrating Meraki Networks with

RADIUS Configuration Note WINS : Wireless Interoperability & Network Solutions

Web Authentication Proxy on a Wireless LAN Controller Configuration Example

Configure Controller and AP Settings

"Charting the Course... Implementing Cisco Unified Wireless Networking Essentials v2.0 (IUWNE) Course Summary

Configure to Secure a Flexconnect AP Switchport with Dot1x

Configuring the Switch for Access Point Discovery

Cisco Actualtests Exam Questions & Answers

Cisco Exam Questions & Answers

Wireless LAN Controller Web Authentication Configuration Example

FlexConnect. Information About FlexConnect

Configuring Settings on the Cisco Unified Wireless IP Phone

WAP9112/9114 Quick Start Guide

Cisco Troubleshooting Cisco Wireless Enterprise Networks WITSHOOT v1.1

Release Notes for Avaya WLAN 9100 AOS-Lite Operating System WAP9112 Release WAP9114 Release 8.1.0

PassCollection. IT certification exam collections provider, High pass rate

TECHNICAL NOTE MSM & CLEARPASS HOW TO CONFIGURE HPE MSM CONTROLLERS WITH ARUBA CLEARPASS VERSION 3, JUNE 2016

What Is Wireless Setup

Configuring NAC Out-of-Band Integration

WLC 7.0 and Later: VLAN Select and Multicast Optimization Features Deployment Guide

Multicast VLAN, page 1 Passive Clients, page 2 Dynamic Anchoring for Clients with Static IP Addresses, page 5

NXC Series. Handbook. NXC Controllers NXC 2500/ Default Login Details. Firmware Version 5.00 Edition 19, 5/

Wireless LAN Controller Module Configuration Examples

HP0-Y44. Implementing and Troubleshooting HP Wireless Networks.

Configuring Settings on the Cisco Unified Wireless IP Phone 7921G

CONFIGURE MAC NOTIFICATION TRAPS ON CISCO SWITCHES

Wireless LAN Controller (WLC) Mobility Groups FAQ

UNIFIED ACCESS POINT ADMINISTRATOR S GUIDE

!! Configuration of RFS4000 version R!! version 2.3!! ip access-list BROADCAST-MULTICAST-CONTROL permit tcp any any rule-precedence 10

Software Update C.09.xx Release Notes for the HP Procurve Switches 1600M, 2400M, 2424M, 4000M, and 8000M

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Deploying Cisco Wireless Enterprise Networks. Version 1.

MSM320, MSM410, MSM422, MSM430,

The information in this document is based on these software and hardware versions:

Table of Contents X Configuration 1-1

Cisco Aironet 1815T (Teleworker) Access Point Deployment Guide

Configuring the Access Point/Bridge for the First Time

Cisco Wireless LAN Controller Module

Real4Test. Real IT Certification Exam Study materials/braindumps

Add and Organize Devices

FortiNAC Citrix XenMobile Device Integration

Software-Defined Access Wireless

Certkiller q. Cisco Implementing Advanced Cisco Unified Wireless Security v2.0

Configuring Port-Based and Client-Based Access Control (802.1X)

Configuring Auto-Anchor Mobility

Transcription:

FortiNAC Cisco Airespace Wireless Controller Integration Version: 8.x Date: 8/28/2018 Rev: B

FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO GUIDE http://video.fortinet.com FORTINET KNOWLEDGE BASE http://kb.fortinet.com FORTINET BLOG http://blog.fortinet.com CUSTOMER SERVICE & SUPPORT http://support.fortinet.com http://cookbook.fortinet.com/how-to-work-with-fortinet-support/ FORTINET COOKBOOK http://cookbook.fortinet.com FORTINET TRAINING AND CERTIFICATION PROGRAM http://www.fortinet.com/support-and-trainingt/training.html NSE INSTITUTE http://training.fortinet.com FORTIGUARD CENTER http://fortiguard.com FORTICAST http://forticast.fortinet.com END USER LICENSE AGREEMENT http://www.fortinet.com/doc/legal/eula.pdf Tuesday, August 28, 2018

Contents Overview 1 Requirements 1 Other Devices 1 Configuration 2 Cisco Device Configuration 2 RADIUS Server 2 VLANs /Interfaces 3 WLANs 3 Authentication 4 SNMP 4 FlexConnect 4 Default CLI Prompt Requirements 6 Guest Access Services 6 FortiNAC Software Configuration 8 FortiNAC Software Device Model Configuration 8 Device Properties 10 Discover Access Points 10 Device Groups 11 Troubleshooting 13 SNMP 13 Resynchronize VLANs 13 FlexConnect Troubleshooting 13 Cisco Wireless Integration i

Requirements Overview The information in this document provides guidance for configuring the wireless device to be managed by FortiNAC. The order of the topics presented in the Device Configuration section of this document does not represent the order in which the configuration must be done. Due to firmware upgrades, the configuration order is subject to change. Therefore, this document simply details the items that must be configured. It is recommended that you also read the Wireless Integration Overview document available in the Fortinet online Resource Center or in your online help. Note: We attempt to provide as much information as possible about the integration of this device with your FortiNAC software. However, your hardware vendor may have made modifications to the device s firmware that invalidate portions of this document. If you are having problems configuring the device, contact the vendor for additional support. Requirements To integrate the Cisco wireless controller with your Administrative software, you must meet the requirements listed in this table. Component Device Firmware Requirement Version 3.0.100 or higher To implement the FlexConnect feature the controller must be running firmware version 7.2 or higher. FortiNAC Software Version: 8.1 or higher Note: In many cases previous versions of FortiNAC can be used, however, instructions are written based on the version noted here. Other Devices The wireless devices listed below are configured using the same instructions as the Cisco device. Airespace Wireless Controllers Cisco Wireless Integration 1

Cisco Device Configuration Configuration To integrate your device with your FortiNAC software, there are configuration requirements on both the device and FortiNAC. It is recommended that you configure the device first. Note: Use only letters, numbers and hyphens (-) when creating names for items in the device configuration. Other characters may prevent FortiNAC from reading the device configuration. Network devices should have static IP addresses (or dynamic IP addresses that are reserved). Once a device that provides network services had been identified in FortiNAC there is no mechanism to automatically update the IP address for that device if there is a change. If the IP address on the device itself is changed, the device appears in FortiNAC to be offline or to have a communication error. Cisco Device Configuration Before integrating a device with FortiNAC set the device up on your network and ensure that it is working correctly. Take into account the VLANs you will need for Production and Isolation. Confirm that hosts can connect to the device and access the network. When the device is running on your network, then begin the integration process with FortiNAC. FortiNAC supports individual SSID configuration and management for this device. Refer to the Wireless Integration Overview document available in the Fortinet online Resource Center or in your online help for additional information. Use a browser to log into the Cisco controller. Make sure the following items are configured. Note: When configuring security strings on network devices or names for items within the configuration, it is recommended that you use only letters, numbers and hyphens (-). Other characters may prevent FortiNAC from communicating with the device, such as #. Some device manufacturers prohibit the use of special characters. For example, Cisco prohibits the use of @ and #. RADIUS Server Define the FortiNAC Server or FortiNAC Control Server as the RADIUS server for the devices you want to manage with FortiNAC. Use the management IP Address of your FortiNAC Server as the IP of the RADIUS Server. The FortiNAC software is preconfigured to use port 1812 for authentication. If you are setting up FortiNAC as the RADIUS server for a device in a Fortinet High Availability environment, you must use the actual IP address of the primary control server, not the Shared IP address. Set up the secondary control server as a secondary RADIUS server using its actual IP address. Regardless of the environment, you may also want to set up your actual RADIUS server to be used in the event that Cisco Wireless Integration 2

Cisco Device Configuration none of your FortiNAC appliances can be reached. This would allow users to access the network, but they would not be controlled by FortiNAC. Important: The RADIUS Secret used must be exactly the same on the wireless device, on the RADIUS server and in the FortiNAC software under RADIUS Settings and Model Configuration. Important: You must set the Auth Call Station ID Type to AP Eth MAC Address:SSID. This setting is required to satisfy location-based policies. If AP Eth MAC Address:SSID is not available in your Device Firmware version, select AP MAC Address:SSID. VLANs /Interfaces On this device VLANs are assigned to Interfaces. When hosts attach to the wireless network, FortiNAC assigns the hosts to those interfaces. Create the interfaces that correspond to the host states you wish to enforce. These connection states include default (production) and isolation states including: registration, quarantine, authentication, and dead-end (disabled). When creating these interfaces you must provide the IP address of a DHCP server for each one. FortiNAC typically provides DHCP services for the isolation networks. If you choose to use FortiNAC as the DHCP server the IP address should correspond to FortiNAC Isolation Interface or eth1. WLANs A WLAN characterizes a wireless network on the Cisco controller. You can create one or more WLANs on the controller and you may choose to have FortiNAC manage any number of them. For those WLANs you wish to have FortiNAC manage, the following configuration values must be set. Select Allow AAA Override Deselect Client Exclusion On the Advanced tab, deselect the Aironet IE check box. Choose the default interface. Hosts connecting to a managed WLAN are only assigned the default interface by the controller if the WLAN authenticates users to a RADIUS server other than FortiNAC or if FortiNAC has been configured without a default interface value. You can configure the WLAN for either RADIUS MAC authentication or 802.1x. - For 802.1x, select the appropriate encryption type in the Layer 2 security drop-down. - For RADIUS MAC, select the MAC Filtering option. 3 Cisco Wireless Integration

Cisco Device Configuration Authentication Two forms of authentication are supported by FortiNAC: MAC Authentication and 802.1x. On the Cisco controller, the authentication method is configured with each WLAN, along with an encryption type, and other related parameters. It is possible to have multiple WLANs supported simultaneously, some using one method and others using another. When configured in this way FortiNAC only allows a single Interface mapping for each isolation state per device. MAC Authentication If you choose to use MAC Authentication, the FortiNAC Server or Control Server should be configured as the RADIUS server on your device in the MAC Authentication Servers section. Use the primary interface IP address of the FortiNAC Server. 802.1x Authentication 802.1 x is configured in much the same way, however, you must also configure the necessary EAP types and encryption settings for the WLANs. See the section on 802.1x in the Wireless Integration Overview. SNMP You must select an SNMP setting on the device to allow FortiNAC to discover and manage the device. Both SNMPv1 or SNMPv3 are supported. If you are not using SNMPv3, enable both SNMPv1 and SNMPv2C in the controller. Note: You must create SNMP credentials with read/write privileges. FlexConnect Cisco Wireless Controllers running firmware version 7.2 or higher include FlexConnect (previously known as Hybrid Remote Edge Access Point or H-REAP) is a wireless solution for branch office and remote office deployments. It enables customers to configure and control access points in a branch or remote office from the corporate office through a wide area network (WAN) link without deploying a controller in each office. The FlexConnect access points can switch client data traffic locally and perform client authentication locally when their connection to the controller is lost. When they are connected to the controller, they can also send traffic back to the controller. In the connected mode, the FlexConnect access point can also perform local authentication. FortiNAC does not support this feature on prior firmware versions. FortiNAC manages wireless users on the Cisco controllers by assigning VLANs to those users as they connect to the network during the authentication process. FortiNAC s integration with these controllers includes the ability to read the configured interfaces and VLANs from the controllers to make them available for assignment through both FortiNAC policies and client states. When using FlexConnect with local switching, Cisco does not require that all remote VLANs be defined at the central controller. However, FortiNAC needs visibility Cisco Wireless Integration 4

Cisco Device Configuration to all VLANs that it may be configured to assign. Therefore, all VLANs that an administrator may want to assign to a wireless client through FortiNAC must be configured on the controller. A centralized network is not required for each VLAN, but an interface entry must exist for the VLAN with a real or fictitious IP address. This allows FortiNAC to read the interface and VLAN and make it available for the configuration process. Since traffic is now being presented to the network on the switch port connecting the AP, that port must be configured as an uplink and must be marked as an uplink. To configure FlexConnect with local switching on the Cisco controller, you must follow all the guidelines in the Cisco documentation for using the AAA Override for FlexConnect feature on the controller. AAA Override allows FortiNAC to perform VLAN assignments. (see http://www.cisco.com/en/us/docs/wireless/controller/7.2/configuration/guide/cg_ flexconnect.html#wp1247954). The requirements outlined by Cisco are provided below: VLAN overrides for FlexConnect are applicable for both centrally and locally authenticated clients. Before configuring an AAA override, the VLAN must be created on the access points. These VLANs can be created on the access points by using the existing WLAN-VLAN mappings. VLANs can be configured on FlexConnect groups. VLANs are pushed to the access points belonging to the FlexConnect group. At any given point, an AP has a maximum of 16 VLANs. The VLANs are selected based on the WLAN-VLAN mapping in the AP. The remaining VLANs will be pushed from the FlexConnect group in the order that they are configured/shown in the FlexConnect group. If the VLAN slots are full, an error message is logged. If the VLAN on the AP is configured using the WLAN-VLAN, the AP configuration of the ACL is applied. If the VLAN is configured using the FlexConnect group, the ACL configured on the FlexConnect group is applied. If the same VLAN is configured on the FlexConnect group and also at the AP, the AP configuration with its ACL takes precedence. If there is no slot for a new VLAN from the WLAN-VLAN mapping, the latest FlexConnect group VLAN is replaced. If the VLAN that was returned from the AAA is not present on the AP, the client falls back to the default VLAN configured for the WLAN. AAA for locally switched clients only supports VLAN overrides. 5 Cisco Wireless Integration

Cisco Device Configuration Default CLI Prompt Requirements FortiNAC must be able to communicate effectively with the device in order to read the session table to determine which hosts are connected and to disassociate or disconnect a host when necessary. To accomplish these tasks FortiNAC uses the device s command line interface. FortiNAC expects to see prompts that end as follows: Prompt Type Characters Required User Login > Prompt must end with this character or FortiNAC will not be able to communicate with the device. Guest Access Services When using Guest Access Services on the WLC with FortiNAC, special considerations apply. Guest services involve the use of anchor and foreign controllers deployed in the customer network. In such deployments, guest interfaces providing internet access are configured on the anchor controllers which are placed in the DMZ on a customer network. However, guest session management is handled on foreign controllers, located on the enterprise network. Guest traffic is tunneled to the anchors using EoIP (Ethernet over IP). This session management function includes AAA services. In simplified terms, what this means is that while multiple anchor and foreign controllers may be deployed to support guest networking, FortiNAC manages all such users solely through the foreign controllers and need not be aware of the anchor controllers, other than to avoid seeing them as rogues on the network. Due to this centralized management of sessions on the foreign controllers, support for policy-based authorization (e.g., VLAN assignment), requires that all guest interfaces must be configured on the foreign controllers. This allows FortiNAC to present them for configuration and provide proper client visibility. This does not imply that all guest VLANs must be trunked from the anchor controllers back to the foreign ones, only that interfaces must be created as placeholders for each of the anchor guest VLANs to enable FortiNAC to recognize the VLANs on the controllers being managed. With regard to WLAN configuration, these guidelines are provided by the "Cisco Unified Wireless Guest Access Services" section of the Cisco Enterprise Mobility 4.1 Design Guide: The guest WLAN is configured on every foreign WLC that manages APs where guest access is required. Even though the anchor WLC(s) is not specifically used to manage LAPs associated with a guest WLAN, it must also be configured with the guest WLAN because the anchor WLC is a logical extension of the WLAN where user traffic is ultimately bridged (using LWAPP between the AP and the foreign controller, and EoIP between the Cisco Wireless Integration 6

Cisco Device Configuration foreign controller and the anchor controller) to an interface/vlan on the anchor WLC. Note: It is extremely important to note that all parameters defined in the WLAN Security, QoS, and Advanced settings tabs, must be configured identically in both the anchor and foreign WLC(s). Controller Configuration The WLAN that FortiNAC will control must be configured on both the Foreign and Anchor Controllers. The WLAN on the Foreign Controller must be configured to send Radius to FortiNAC. All interfaces intended to be assigned by FortiNAC (for both isolation and production networks) must be configured on both the foreign and anchor controllers. On the foreign controllers, they act as placeholders only, and are not required to be routed anywhere. Ensure that the Preauthentication ACL setting for each guest WLAN to be managed by FortiNAC is set to "None". FortiNAC configuration Create model or discover the foreign controllers. Creating or discovering the anchor controllers is optional. However, the implications of not modeling them is that all host models in FortiNAC appear connected to the foreign controllers rather than the anchors. Note: If it is required to know which anchor controller hosts are connected to, anchor controllers must be modeled, and in such cases, L2 polling should be disabled on the foreign controller instead. When configured in this way, hosts will appear connected to the foreign controllers immediately after authenticating (since authentication always occurs through the foreign controller), but after the first L2 poll of the anchor, hosts will be moved over to the anchor. 7 Cisco Wireless Integration

FortiNAC Software Configuration FortiNAC Software Configuration For the FortiNAC software to recognize your device, you must add it to the Topology View either by prompting the FortiNAC software to discover the device or by adding it manually. Refer to the Help files contained within your FortiNAC software for instructions on Discovery or Adding a Device. Regardless of how the device is added, the FortiNAC software must be able to communicate with it. To provide initial communication, you must indicate within the FortiNAC software whether to use SNMPv1 or SNMPv3 along with the appropriate SNMP access parameters. FortiNAC Software Device Model Configuration To manage a device, the FortiNAC software must have a model of the device in its database. First create or discover the device in the FortiNAC software. Once the device has been identified by FortiNAC, use the Model Configuration window to enter device information. The Model Configuration window allows you to configure devices that are connected to your network so that they can be monitored or managed. Data entered in this window is stored in the FortiNAC database and is used to allow interaction with the device. Table 1: Cisco Model Configuration Field Definitions Field Definition General User Name Password The user name used to log on to the device for configuration. This is for CLI access. The password required to configure the device. This is for CLI access. Protocol Type Telnet SSH2 Use either Telnet or SSHv2 if it is available on your device. RADIUS Primary Server Secondary Server The RADIUS server used for authenticating users connecting to the network through this device. Select the Use Default option from the drop-down list to use the server indicated in parentheses. Used only for 802.1x authentication. See RADIUS Settings in the Help system for information on configuring your RADIUS Servers. If the Primary RADIUS server fails to respond, this RADIUS server is used for authenticating users connecting to the network until the Primary RADIUS Server responds. Select the Use Default option from the drop-down list to use the server indicated in parentheses. Used only for 802.1 authentication. Cisco Wireless Integration 8

FortiNAC Software Configuration Field RADIUS Secret Definition The Secret used for RADIUS authentication. Click the Modify button to change the RADIUS secret. Used for both 802.1x and Mac authentication. VLAN ID Important: The RADIUS Secret used must be exactly the same on the wireless device, on the RADIUS server and in the FortiNAC software under RADIUS Settings and Model Configuration. Note: On this device VLANs are identified by Interface Name. Be sure to use the Name and not the VLAN ID when entering VLAN information in the Model Configuration. Default Registration Authentication Dead End Quarantine The Default VLAN value is stored in the database and is used when the VLAN is not determined by another method, such as a user, host or device role. Typically, if a VLAN is specified as the Default, it is the VLAN used for "normal" or "production" network access. The registration VLAN for this device. Isolates unregistered hosts from the production network during host registration. If left blank, unregistered hosts will be granted access to the network. The authentication VLAN for this device. Isolates registered hosts from the Production network during user authentication. Optional. The dead end VLAN for this device. Isolates disabled hosts by providing limited or no network connectivity. The quarantine VLAN for this device. Isolates hosts from the production network who pose a security risk because they failed a policy scan. If left blank, hosts that are at risk are granted access to the network. Wireless AP Parameters Preferred Container Name If this device is connected to any Wireless Access Points, they are included in the Topology View. Enter the name of the Container in which these Wireless Access Points should be stored. Containers are created in the Topology View to group devices. Set Up The Model Configuration Important: The RADIUS Secret used must be exactly the same on the wireless device, on the RADIUS server and in the FortiNAC software under RADIUS Settings and Model Configuration. Note: Because you are using 802.1x authentication, make sure you have a RADIUS Server configured. Select Network Devices > RADIUS Settings. See Configuring RADIUS Server Profiles in the Help system for additional information on adding a RADIUS Server. 1. After you have discovered or added the device in the Topology View, navigate to the Model Configuration window. Right-click on the device, select the device name, and then click Model Configuration. 2. Enter the User Name used for CLI access on this device. 3. Enter the Password used for CLI access on this device. 9 Cisco Wireless Integration

FortiNAC Software Configuration 4. In the Protocol section select either Telnet or SSHv2 if it is available on your device model. 5. Click Apply. 6. Return to the Topology View. 7. Select the device and then right-click. From the menu select Network Access/ VLANS. 8. Click Read VLANS to retrieve the Current Device Interface settings. This creates the interface models. 9. Close the Network Access/ VLANS window. 10. Return to the Model Configuration window. Right-click on the device, select the device name, and then click Model Configuration. 11. Enter the Interface Name for each VLAN type. Note: The interface names must match the names of the WLANs. 12. If you are using MAC authentication, only the RADIUS Secret is required. If you are using 802.1x authentication, either the default RADIUS server or a pre-configured RADIUS server must be selected. RADIUS servers are configured on the RADIUS Settings window. 13. Enter the RADIUS Secret. This must match the value entered on the device itself and the value entered on the RADIUS settings window. 14. In the Preferred Container field, select the Container in which the Wireless Access Points should be placed as they are discovered. 15. Click Apply. Device Properties You must provide SNMP credentials with read/write access to allow FortiNAC to disassociate clients during VLAN transitions. Discover Access Points Access Points connected to the controller must be added to FortiNAC to allow FortiNAC to see and manage connected hosts. Refer to the Wireless Integration section of the FortiNAC online help or locate the PDF version of that document in the Fortinet online Resource Center. Cisco Wireless Integration 10

Device Groups To detect which hosts have disconnected from the wireless device, you must set up a frequent polling interval for your wireless devices. Devices are automatically added to the appropriate system group as they are added to the system. The default polling interval is 10 minutes. Devices are added automatically to the L2 Polling group, which polls for connected MAC addresses. You can set polling intervals on an individual device by going to the Device Properties window for that device. Cisco Wireless Integration 11

12 Cisco Wireless Integration

Troubleshooting If you are having problems communicating with the device, review the following: SNMP If the SNMP parameters set are not the same on both the device and the device configuration in your FortiNAC software, the two will not be able to communicate. You will not be able to discover or add the device. Resynchronize VLANs If you have modified the device configuration by adding or removing VLAN definitions, it is recommended that you read VLANs for that device again. 1. Select Network Devices > Topology. 2. Expand the Container that stores the device. 3. Select the device and right-click. From the menu select Network Access/VLANS. 4. Click Read VLANs. This resynchronizes the FortiNAC software and the device configuration. FlexConnect Troubleshooting When configuring FortiNAC with Cisco controllers using FlexConnect, use the following checklist to ensure that everything works correctly. Ensure that interfaces for all the VLANs you intend to assign through FortiNAC exist on the controller. Ensure that all the interfaces have been properly read by FortiNAC after having created the controller device in FortiNAC. Ensure that you have created all the ACL/VLAN mappings on the controller for the necessary AP groups. If VLANs are not configured for the remote APs in this way, any assigned VLAN values will be ignored by the AP. Ensure MAC-filtering has been selected for the WLAN. Ensure that MAC-filtering has been un-selected for WLANs configured for 802.1x. Ensure that the WLANs are enabled. Ensure FortiNAC is properly receiving RADIUS requests from the controller for connecting clients. Ensure that the source IP address of the RADIUS request is that of the controller. Ensure that the RADIUS secret values are all the same in all the necessary places. Cisco Wireless Integration 13

Ensure that FortiNAC is responding to RADIUS requests on the same network interface on which it received them. Ensure that the VLAN being returned corresponds to the interface name selected in the FortiNAC configuration views. Ensure that the switch port to which the remote AP is connected is an uplink. Otherwise, wireless client MAC addresses will appear on both the controller and on the switch port, and move back and forth depending on which device is polled for clients. Since the client policy and management behavior often depends on the location, an incorrect location will result in incorrect policy decisions. Problems have been encountered when using open WLANs with no encryption. VLAN assignment works best when using 802.1x with WPA/2 or MACauthentication with WPA/2 - PSK. 14 Cisco Wireless Integration