Description | This article describes how to check Network Events and identify enforcement actions performed on Hosts connecting Wireless. |
Scope | FortiNAC. |
Solution |
When enforcement is applied by FortiNAC in wireless connections it is possible to use the Network -> Network Events in FortiNAC GUI to check the connection logs and the Logical Network/Access VLAN applied on each stage starting from Rogue entry creation to Host registration. This can assist administrators in verifying timestamps and control actions performed by FortiNAC.
Example. The user connects to the Guest SSID under FortiNAC control.
In this case, the user registers using the Guest Self Registration template and the following happens upon initial connection:
In Network Events it is possible to verify the host/user network events for this example.
To investigate it is helpful to add as Filter the Wireless Adapter MAC address in 'MAC Address'. This will only show connection logs for the specific host.
While expanding the drop-down '+' on the left it is possible to see the history of the Rogue entry created until registration to the Guest user. The results provide information about the Logical Networks applied during each Host state and the Access Value 'Net ID' sent on each case with RADIUS Accept-Accept.
Related Documentation: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.