This article describes how to configure NAC policies for Wireless devices.
FortiGate 100E 7.2.5.
FortiSwitch 108E-POE 7.4.0.
FortiAP 221E 7.2.2.
Network Access Control (NAC) facilitates the implementation of network policies to regulate devices and users accessing a network. The wireless NAC policy is established based on identifiable patterns associated with users and devices.
These patterns may involve user groups and device hardware information. The NAC can be activated for SSIDs operating in either tunnel or bridged mode and requires a minimum of 2 VLANs for setting up the onboarding segment and the appropriate VLAN for the Wireless Devices. These VLANs must have L3 settings, including DHCP and network device detection services.
Devices that conform to an NAC policy will be allocated to the VLAN configured within the NAC policy for the wireless controller section. Moreover, the NAC policy can also be utilized for FortiSwitch NAC.
In this case, let's create four VLANs:
The steps to configure are as follows:
Once finished, the interfaces should look like this:
With the corresponding DHCP settings:
Finally, the SSID should look something like this:
SSID in Bridge Mode:
How to configure NAC Policies for WLAN with Bridge Mode:
The previous example uses SSIDs in Tunnel mode with the IP addressing on the VLANs configured under the SSID.
However, when using SSIDs in Bridge mode, the IP addressing instead is configured on the switch VLANs, which need to use the same VLAN number as the VLANs defined under the SSID. The connection to the FortiAPs then need to be configured as trunks.
Consequently, this configuration would instead look like the following, assuming that 'fortilink' is the interface for the FortiSwitches:
Create three VLAN interfaces under the VAP created in step 1:
config system interface
edit "fsw_v300"
set vdom "root"
set ip 10.100.1.1 255.255.255.0
set allowaccess ping
set description "Onboarding VLAN"
set device-identification enable
set role lan
set interface "fortilink"
set vlanid 100 <-- This must match the corresponding vap vlanid
next
edit "fsw_v400"
set vdom "root"
set ip 10.101.1.1 255.255.255.0
set allowaccess ping https ssh http speed-test
set device-identification enable
set role lan
set interface "fortilink"
set vlanid 400
next
end
edit "fsw_v500"
set vdom "root"
set ip 10.102.1.1 255.255.255.0
set allowaccess ping https ssh http speed-test
set device-identification enable
set role lan
set interface "fortilink"
set vlanid 500
next
edit "fsw_v600"
set vdom "root"
set ip 10.103.1.1 255.255.255.0
set allowaccess ping https ssh http speed-test
set device-identification enable
set role lan
set interface "fortilink"
set vlanid 600
next
edit "vap_v300"
set vdom "root"
set ip 0.0.0.0 0.0.0.0
set allowaccess ping
set description "Onboarding VLAN"
set device-identification enable
set role lan
set interface "wifi.vap.01"
set vlanid 100
next
edit "vap_v400"
set vdom "root"
set ip 0.0.0.0 0.0.0.0
set allowaccess ping https ssh http speed-test
set device-identification enable
set role lan
set interface "wifi.vap.01"
set vlanid 400
next
end
edit "vap_v500"
set vdom "root"
set ip 0.0.0.0 0.0.0.0
set allowaccess ping https ssh http speed-test
set device-identification enable
set role lan
set interface "wifi.vap.01"
set vlanid 500
next
edit "vap_v600"
set vdom "root"
set ip 0.0.0.0 0.0.0.0
set allowaccess ping https ssh http speed-test
set device-identification enable
set role lan
set interface "wifi.vap.01"
set vlanid 600
next
end
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.