Created on
09-20-2024
02:53 AM
Edited on
03-31-2025
01:40 AM
By
Jean-Philippe_P
Description | This article describes how to check Network Events and identify enforcement actions performed on Hosts connecting Wireless. |
Scope | FortiNAC. |
Solution |
When enforcement is applied by FortiNAC in wireless connections it is possible to use the Network -> Network Events in FortiNAC GUI to check the connection logs and the Logical Network/Access VLAN applied on each stage starting from Rogue entry creation to Host registration. This can assist administrators in verifying timestamps and control actions performed by FortiNAC.
Example. The user connects to the Guest SSID under FortiNAC control.
In this case, the user registers using the Guest Self Registration template and the following happens upon initial connection:
In Network Events, it is possible to verify the host/user network events for this example.
To investigate it is helpful to add as Filter the Wireless Adapter MAC address in 'MAC Address'. This will only show connection logs for the specific host.
While expanding the drop-down '+' on the left it is possible to see the history of the Rogue entry created until registration to the Guest user. The results provide information about the Logical Networks applied during each Host state and the Access Value 'Net ID' sent on each case with RADIUS Accept-Accept.
Using the FortiNAC CLI, it is possible to increase the verbosity and details provided by the Network Events view. This can be helpful during troubleshooting. To enable the feature, apply the following commands in FortiNAC CLI:
execute enter-shell globaloptiontool -name networkSession.captureSnapshots -set true
The event will be generated in the output:
Warning: There is no known option with name: networkSession.captureSnapshots New option added
Related Documentation: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.