Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
AntonioMartins
New Contributor

FortiNAC - Profiling Static IP Devices

Trying to profile device with static IP and assigning VLAN ID based on the device profiling.

With the exception of Vendor OUI, I don't see any method that we can use in this scenario - as the equipment's IP address does not belong to the IP network initially assigned to the port, FortiNAC has no way of probing with the remaining methods, which require IP communication to/from profiled devices.

Are there any alternatives?

Antonio Martins
Antonio Martins
6 REPLIES 6
AEK
SuperUser
SuperUser

Hi Antonio

You are right, the client will lose any communication if it is in the wrong VLAN, furthermore one of the profiling information is DHCP requests.. your FortiNAC will collect some useful profiling info from these requests (OS, hostname and others), or your FortiGate can do it as well and send these info to FNAC.

When you deploy FortiNAC your clients must use DHCP otherwise it will not work as expected. The exception is for servers, which are usually in data center (physical security), so usually there is no need to NAC them.

For your case I think the good thing to do for any other rogue device that connects to your network with static IP should remain systematically in isolation, unless it is set to DHCP and properly profiled, otherwise it should remain in isolation.

AEK
AEK
AntonioMartins

If end customer wants to maintain static IP in this devices, will it be safe to perform manual profiling before connecting device to role base access ports (staging) and then rely on FortiNAC profiling to keep the network safe from mac-spoofing?

Antonio Martins
Antonio Martins
AEK

I think this is not so secure. While the new device is in the prod network for profiling even for few seconds it will have enough time to do many things.

That said some customers give priority to productivity (most of them) and others give priority to security.

AEK
AEK
ebilcari
Staff
Staff

Having hosts using DHCP is the normal way on FNAC configurations for many reasons already mentioned.

But in your conditions you can relay a bit to the firewall (FGT is preferred). In the DPR configuration guide, page 8,9 it's mentioned how to use firewall sessions or traffic flows in order to profile devices.

 

For the second part, access control without changing host IP address, you can refer to the Firewall tags integration also possible with FGT. Based on the host status, network access can be limited while the host keeps the same IP and VLAN/Subnet.

- Emirjon
If you have found a solution, please like and accept it to make it easily accessible for others.
AntonioMartins
New Contributor

In this setup, the switch ports are configured in registration VLAN by default. I guess it will not work because FGT IP is not in the same IP network of device.

Antonio Martins
Antonio Martins
ebilcari

As mentioned this is a limited scenario, for this to work you need to dedicate a switch to connect these hosts that have static IPs and use a single VLAN for Registration and production (the switch will work more like a hub, no VLAN switching). The network segmentation can be done through firewall tags while the hosts will share the same VLAN/Subnet.

- Emirjon
If you have found a solution, please like and accept it to make it easily accessible for others.
Labels
Top Kudoed Authors