FortiNAC
NOTE: FortiNAC is now named FortiNAC-F. For post-9.4 articles, see FortiNAC-F. FortiNAC is a zero-trust network access solution that provides users with enhanced visibility into the Internet of Things (IoT) devices on their enterprise networks.
sjerry
Staff
Staff
Article Id 337645
Description This article describes how to use attributes from a RADIUS Request to create a condition for a user host profile.
Scope FortiNAC, CentOS, nacOS.
Solution

Enable debugs if needed:

CentOS.

 

nacdebug -name FingerprintServer true

 
> tail -F output.master | grep -i FingerprintServer

NacOS.

 

execute-enter shell

nacdebug -name FingerprintServer true

 

Examine logs if needed.

 

godzilla # diagnose tail -F output.master | grep -i FingerprintServer

 

Example below include MSCHAPv2, PEAP, and EAP TLS. 

MSCHAPv2, PEAP: 

 

mschapv2.png

 

The syntax must exactly be the same as what receiving or it is possible to do a '*' if needed. 

 

EAP-Type-Name = MSCHAPv2*  

UHP_radius.png


Validate: 
Go to users & hosts -> host -> 'right click' -> policy details.

Policy detail.png

 

EAP TLS.


EAP_TLS.png

 

EAP_TLS_Att.PNG

 

Validate: 
Go to users & hosts -> host -> 'right click' -> policy details.

 

eap_TLS_Policy.PNG

 

Radius Attributes can also be used to register the hosts using a device profiling rule as shown in screenshot below 

  1. Users and Hosts -> Device Profiling rules -> Add -> General.

device profiler general.png

 

  1. Select Methods -> RADIUS -> Fill in RADIUS type and other details as in the example screenshot below:

 

DPR methods.png

 

  1. A users and hosts rule can be created using role information the host will receive from step 1.

 

TLS radius host role.png