<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: MR Access Point Integration with FortiGate in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/mr-access-point-integration-with-fortigate/m-p/5504880#M302495</link>
    <description>Thx for the quick answer.&lt;BR /&gt;with the authentication by RADIUS server, the FortiGate will decide only the access but the security policies will be settings on the Meraki cloud or will those on the fortigate be applied?</description>
    <pubDate>Mon, 16 Mar 2020 12:31:05 GMT</pubDate>
    <dc:creator>DavideUrsino</dc:creator>
    <dc:date>2020-03-16T12:31:05Z</dc:date>
    <item>
      <title>MR Access Point Integration with FortiGate</title>
      <link>https://community.cisco.com/t5/wireless/mr-access-point-integration-with-fortigate/m-p/5504878#M302493</link>
      <description>&lt;P&gt;Good Morning to all,&lt;/P&gt;&lt;P&gt;I have a question reguarding authentication with Firewall FortiGate as Access Control,&lt;/P&gt;&lt;P&gt;I would like the FortiGate took over the role of "WiFi controller" and centralized all the client authorization,&lt;/P&gt;&lt;P&gt;Is it also possible to tag traffic from clients with VLANs created on Fortigate?                   &lt;/P&gt;&lt;P&gt;Thanks in advance for your reply&lt;/P&gt;</description>
      <pubDate>Mon, 16 Mar 2020 10:22:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/mr-access-point-integration-with-fortigate/m-p/5504878#M302493</guid>
      <dc:creator>DavideUrsino</dc:creator>
      <dc:date>2020-03-16T10:22:30Z</dc:date>
    </item>
    <item>
      <title>Re: MR Access Point Integration with FortiGate</title>
      <link>https://community.cisco.com/t5/wireless/mr-access-point-integration-with-fortigate/m-p/5504879#M302494</link>
      <description>&lt;P&gt;If the Fortigate can be a radius server then you can use it for wireless client authentication.  You can't use it as a full wireless controller as the Meraki cloud is that.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Mar 2020 10:35:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/mr-access-point-integration-with-fortigate/m-p/5504879#M302494</guid>
      <dc:creator>CMR</dc:creator>
      <dc:date>2020-03-16T10:35:57Z</dc:date>
    </item>
    <item>
      <title>Re: MR Access Point Integration with FortiGate</title>
      <link>https://community.cisco.com/t5/wireless/mr-access-point-integration-with-fortigate/m-p/5504880#M302495</link>
      <description>Thx for the quick answer.&lt;BR /&gt;with the authentication by RADIUS server, the FortiGate will decide only the access but the security policies will be settings on the Meraki cloud or will those on the fortigate be applied?</description>
      <pubDate>Mon, 16 Mar 2020 12:31:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/mr-access-point-integration-with-fortigate/m-p/5504880#M302495</guid>
      <dc:creator>DavideUrsino</dc:creator>
      <dc:date>2020-03-16T12:31:05Z</dc:date>
    </item>
    <item>
      <title>Re: MR Access Point Integration with FortiGate</title>
      <link>https://community.cisco.com/t5/wireless/mr-access-point-integration-with-fortigate/m-p/5504881#M302496</link>
      <description>&lt;P&gt;You can either use the Tunnel-Private-Group-ID attribute to dynamically specify the VLAN the wireless user should be placed into:&lt;/P&gt;&lt;P&gt;&lt;A href="https://documentation.meraki.com/MR/Encryption_and_Authentication/Configuring_RADIUS_Authentication_with_WPA2-Enterprise#Supported_RADIUS_Attributes" target="_blank" rel="nofollow noopener noreferrer"&gt;https://documentation.meraki.com/MR/Encryption_and_Authentication/Configuring_RADIUS_Authentication_with_WPA2-Enterprise#Supported_RADIUS_Attributes&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Or you can create a Meraki group policies assigning whatever you want.  Then use the Filter-Id attribute to specify which group policies to assign to whatever users you want.&lt;/P&gt;&lt;P&gt;&lt;A href="https://documentation.meraki.com/MR/Group_Policies_and_Blacklisting/Using_RADIUS_Attributes_to_Apply_Group_Policies" target="_self" rel="nofollow noopener noreferrer"&gt;https://documentation.meraki.com/MR/Group_Policies_and_Blacklisting/Using_RADIUS_Attributes_to_Apply_Group_Policies&lt;/A&gt; &lt;/P&gt;</description>
      <pubDate>Mon, 16 Mar 2020 18:10:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/mr-access-point-integration-with-fortigate/m-p/5504881#M302496</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2020-03-16T18:10:27Z</dc:date>
    </item>
  </channel>
</rss>

