| Description | This article describes how to configure FortiNAC to assign VLANs based on MAC address. |
| Scope | FortiNAC 9.4.x. |
| Solution |
Table of Contents:
Section 1. Enable RADIUS on the FortiNAC.
The authentication port should remain 1645. Change this on the FortiGate side.
FortiGate RADIUS settings:
config user radius edit "FortiNAC" set server [FortiNAC IP] set secret yourSecret set nas-ip [FortiGate IP] set radius-port 1645 set require-message-authenticator disable next end
Section 2. Create SSID on the FortiGate.
Using the 'WPA2 Personal' security mode will require users to enter pre-shared key to connect to the Wi-Fi. Client MAC Address Filtering using the RADIUS server, FortiNAC in this case, will assign VLANs to the user’s device based on user’s MAC address.
Section 3. Allow SSID to connect to the FortiNAC RADIUS server.
Section 4. Create a group that belongs to a VLAN.
Section 5: Create a User/Host Profile.
Section 6. Create Network Access Policy:
Use the tabs at the top right corner.
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.