FortiNAC
NOTE: FortiNAC is now named FortiNAC-F. For post-9.4 articles, see FortiNAC-F. FortiNAC is a zero-trust network access solution that provides users with enhanced visibility into the Internet of Things (IoT) devices on their enterprise networks.
cmaheu
Staff
Staff
Article Id 198790

Description

 

Cisco WLC 9800 Model Configuration tab does not include the drop down VLAN lists under Access Value.


Scope


FortiNAC.


Solution

 
  1. For proper integration, FortiNAC should successfully validate SNMP and CLI in the credential tab. This is needed in order for FNAC to perform L2/L3 polling and collect information from the device.
    1. For information about SNMP failure verifications, see the following articles:
      Technical Tip: Troubleshooting SNMP communication issues.
      Technical Tip: Configure and validate Cisco SNMPv3.
    2. CLI failure.
  2. If new SSIDs or VLAN changes are applied on the WLC, it is necessary to manually perform a resynchronization from the FortiNAC side.
    This is done by right-clicking the device in the Network Inventory and selecting 'Resync Interfaces'.
    For more details about this, see Technical Tip: Schedule Resync Interfaces for multiple Inventory devices.

 
Untitled.png
Figure 1: Cisco 9800 model configuration.
 
  1. If the credentials are successful but the VLAN list is still not available, a different mapping for the device can be tested. To do this, right-click the device in the Network Inventory and select 'Set Device Mapping'. Different OIDs will be available to test the modeling. After the change is applied, perform a 'Resync Interfaces' action to force FortiNAC to update the interface status.
 
Related documents: