Created on 09-09-2024 01:25 AM Edited on 10-04-2024 05:46 AM By Jean-Philippe_P
This article describes how FortiNAC applies state-based control and the enforcement groups for each host state.
FortiNAC-F, FortiNAC.
FortiNAC will provide captive services to hosts based on their 'Not Trusted' state.
When the Host is 'Not Trusted' or 'Not Normal' it can be in one of the 4 following four states listed in the below table.
The fifth state (Online/Enabled) is applied when the host is already registered and marked as safe by FortiNAC. In this state, the VLAN changes are defined by the Network access policy configuration.
HOST STATE | System Group Membership for port/device | Logical Network/VLAN where the host will be moved | Description |
1. Rogue(not registered) |
Port is a member of 'Forced Registration' | REGISTRATION | 'Rogue' is the initial state before the host is registered and marked as a Trusted host. The host is not yet categorized/registered. |
2. Not Authenticated |
Port is a member of 'Forced Authentication' | AUTHENTICATION | The host is registered but has failed to authenticate with the defined configuration in the Authentication policy. The host remains in the Authentication VLAN until it authenticates. |
3. At Risk |
Port is a member of 'Forced Registration' | REMEDIATION/QUARANTINE | The host is registered but has failed a scan and marked 'At Risk'. The host remains in the Remediation VLAN until it successfully passes the compliance scans. |
4. Disabled |
The device is a member of 'Physical Address Filtering' | DEAD END | The host is registered but is disabled either manually by the administrator or from an automated security action. |
5. Online/Enabled |
The port where the host is connected is part of "Role Based Access" | Custom Logical Network | The host is registered and matches a Network Access policy that applies a logical network configuration with the VLAN specified in the model configuration. FortiNAC will change the VLAN based on the Policy configuration. |
If the requirement is to have FortiNAC be able to enforce all the above states then each Switchport or SSID where hosts will connect should be made members of the defined System groups in the table.
The following article describes with an example the steps needed to verify when the VLAN does not change based on state-based control:
Troubleshooting Tip: VLANs not changing on a wired switch
Related documentation:
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.