Skip to Content

How to enable SSH access to FortiAP managed by FortiGate

This article describes the steps to gain access through SSH to a FortiAP from FortiGate.

Scope

FortiAP.

Solution

By default, the profile created on FortiGate for the managed model FortiAP is created with no management access; that is, no HTTPS SSH nor SNMP access. Therefore, no access to CLI is available when ‘right-clicking’ the device:

Cannot connect to CLI of FortiAP from FortiGate

Most commonly, to fix this, there are two ways to allow SSH access:

  1. From GUI.
  2. From FortiGate CLI.

From GUI

Go to WiFi & Switch Controller > FortiAP Profiles, select the name of the FotiAP Profile used on the FortiAP, edit it through GUI, and select ‘OK’ on the bottom to save the changes.

GUI configuration.

GUI configuration.

From CLI

Open a new CLI on FortiGate and use the command ‘set allowaccess‘ under ‘config wireless-controller wtp-profile‘.

FG # config wireless-controller wtp-profile
FG (wtp-profile) # edit Test-233G
FG (Test-233G) # set allowaccess
https HTTPS access.
ssh SSH access.
snmp SNMP access.
FG (Test-233G) # set allowaccess ssh
FG (Test-233G) # next
FG (wtp-profile) # end

The configuration should be seen as follows:

FG # show wireless-controller wtp-profile Test-233G
config wireless-controller wtp-profile
edit "Test-233G"
config platform
set type 233G
end
set allowaccess ssh <---- Accesses allowed (in this case only SSH was granted permissions)
...
next
end

Once the changes have been saved, the result will be the following:

ForitAP can now be accessed through SSH.