Administrators may encounter a situation where an unauthorized or unknown FortiAP, specifically model FP221E, appears in the managed Access Points list on a FortiGate. This phantom AP often shows a status of "Rejected" and can lead to High Availability (HA) synchronization issues if the FortiGate is part of a cluster.
This behavior is typically caused by having the Security Fabric Connection administrative access enabled on an untrusted external interface (such as wan1 or wan2).
wan interface has Security Fabric Connection (or fabric in CLI) enabled under Administrative Access.The "Security Fabric Connection" setting allows the FortiGate to listen for FortiTelemetry and downstream device discovery. If this is enabled on a public-facing WAN interface, the FortiGate may receive spoofed or illegitimate discovery packets from the internet. Attackers or automated scanners may send these packets to mimic a FortiAP (often defaulting to the FP221E profile) attempting to join the fabric.
While the FortiGate correctly "Rejects" the unauthorized AP, the creation of the object itself can disrupt HA sync and clutter the management console.
To resolve this issue and prevent its recurrence, follow these steps:
1. Disable Security Fabric Connection on WAN Interfaces
You should only enable the Security Fabric Connection on trusted internal interfaces where other Fabric devices (like FortiSwitches or FortiAPs) are physically located.
Via GUI:
wan1).Via CLI:
Plaintext
config system interface
edit "wan1"
set allowaccess ping <-- Remove 'fabric' from this list
next
end
2. Delete the Rejected Access Point
Once the WAN access is disabled, you must manually remove the "Rejected" entry to restore HA sync.
3. Verify HA Synchronization
After deleting the object, check the HA status:
diag sys ha checksum show output.By limiting the Security Fabric Connection access to internal, trusted interfaces, you reduce the attack surface of the FortiGate and prevent unauthorized external devices from impacting your configuration and HA stability.