<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: MR44 + fortigate in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/mr44-fortigate/m-p/5522762#M308691</link>
    <description>&lt;P&gt;is in bridge mode&lt;/P&gt;</description>
    <pubDate>Wed, 07 Aug 2024 18:45:07 GMT</pubDate>
    <dc:creator>CristianIDL</dc:creator>
    <dc:date>2024-08-07T18:45:07Z</dc:date>
    <item>
      <title>MR44 + fortigate</title>
      <link>https://community.cisco.com/t5/wireless/mr44-fortigate/m-p/5522760#M308689</link>
      <description>&lt;P&gt;hello everyone,&lt;/P&gt;&lt;P&gt;I have connected MR44 access points connected to a cisco switch and this one with an output to the internet through fortigate.&lt;BR /&gt;I have the following problem... I can not ping between the devices connected by WIFI. the dhcp server is delivered by the fortigate. when making a VPN IPSEC connection I only reach the local IP of the fortigate, not the remaining IPs of the lan network.&lt;/P&gt;&lt;P&gt;I would appreciate your help in resolving this.&lt;/P&gt;&lt;P&gt;Translated with &lt;A href="http://www.DeepL.com/Translator" target="_blank" rel="nofollow noopener noreferrer"&gt;www.DeepL.com/Translator&lt;/A&gt; (free version)&lt;/P&gt;</description>
      <pubDate>Wed, 07 Aug 2024 18:11:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/mr44-fortigate/m-p/5522760#M308689</guid>
      <dc:creator>CristianIDL</dc:creator>
      <dc:date>2024-08-07T18:11:19Z</dc:date>
    </item>
    <item>
      <title>Re: MR44 + fortigate</title>
      <link>https://community.cisco.com/t5/wireless/mr44-fortigate/m-p/5522761#M308690</link>
      <description>&lt;P&gt;Is the MR running nat mode or bridge mode?&lt;/P&gt;&lt;P&gt;Also check the firewall settings of the MR, it can block traffic using L2 clients isolation or L3 rules&lt;/P&gt;</description>
      <pubDate>Wed, 07 Aug 2024 18:19:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/mr44-fortigate/m-p/5522761#M308690</guid>
      <dc:creator>ww^</dc:creator>
      <dc:date>2024-08-07T18:19:17Z</dc:date>
    </item>
    <item>
      <title>Re: MR44 + fortigate</title>
      <link>https://community.cisco.com/t5/wireless/mr44-fortigate/m-p/5522762#M308691</link>
      <description>&lt;P&gt;is in bridge mode&lt;/P&gt;</description>
      <pubDate>Wed, 07 Aug 2024 18:45:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/mr44-fortigate/m-p/5522762#M308691</guid>
      <dc:creator>CristianIDL</dc:creator>
      <dc:date>2024-08-07T18:45:07Z</dc:date>
    </item>
    <item>
      <title>Re: MR44 + fortigate</title>
      <link>https://community.cisco.com/t5/wireless/mr44-fortigate/m-p/5522763#M308692</link>
      <description>&lt;P&gt;Make sure you have allowed local LAN access in the Firewall page for the SSID:&lt;/P&gt;&lt;P&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1000011397.jpg" style="width: 784px;"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="image.jpeg"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/274199i7F30A3D527562A93/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.jpeg" alt="image.jpeg" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Wed, 07 Aug 2024 20:26:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/mr44-fortigate/m-p/5522763#M308692</guid>
      <dc:creator>CMR</dc:creator>
      <dc:date>2024-08-07T20:26:25Z</dc:date>
    </item>
  </channel>
</rss>

