We are getting ready to implement our FortiNAC in production but there is one thing our managers would like set up. They want all Rogue devices to still be allowed internet access, but just to be blocked from all internal network access. We have VLANs in place with ACLs to do this, but users don't get any type of notification about this.
Is there a way that we implement some type of portal page notification that says something to the effect of "Your network access has been restricted to internet access only with no access to company resources"? So far we have only been able to get a portal popup to work for the isolation VLAN, but the isolation VLAN does not allow internet access.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Hello @muels7
Please follow these technical documents.
regards,
Sheikh
This would work if we were having these rogue devices register as guests. However many of the rogue devices are devices without a web browser, such as streaming media devices and smart TVs that would be unable to register. At this time we don't plan on having guests register their devices.
I guess your rogue hosts are WiFi connected, right? In this case create a SSID "Guest" and don't control it with FortiNAC. As per my experience all companies I know don't manage guest WiFi with FortiNAC in order to save license for Corporate hosts.
Regarding the notification/welcome message, usually this can be configured at WiFi controller level.
The majority of our rogues are wireless yes, but in this case I want to do this with wired devices. We already have an isolated vlan for our guest wireless that all personal devices can connect to.
What I want to do is setup a "guest" access for the wired network without forcing clients to register. I am in the education sector so we constantly have staff bringing devices in from home and plugging them in to the network (no matter what our policy says about it). My director and assistant director are under the mentality that they don't care as long as they can't access internal network resources. I could setup the NAC to put these devices straight through to a guest vlan, which we already have configured, but I haven't found a way to show them a message in this case. It seems they are only notified that they have been isolated if they are in the default isolation vlan.
There is a feature in FortiNAC for this Allowed domains, but its main scope is the opposite of your requirements. It will work by whitelisting some of the domains and block others. As I know is not possible to inverse this function (block some domains and allow the rest) since the main scope of it is for handling isolated devices not giving network access.
Rouge devices should not be considered as guest hosts until they are registered. During the registration phase a disclaimer can be put on the web page explaining the limitations for this guest network.
Yes, I found this feature as well. It could be an option, but we would prefer to allow them open web access. There would be too many sites to whitelist with this option. It is my understanding that this feature is mostly designed to allow hosts to access their update sites if they were isolated for being out of date so they could still update and remediate.
If this isn't possible so be it, we have a working solution in place. It unfortunately doesn't force open a web page though informing the user that they are isolated from the main network. They wouldn't know until trying to access internal network resources, which is just going to create more helpdesk tickets which we are trying to avoid.
Yes correct. Basically all captive portal solutions can only achieve this at the beginning of the connection, offering a disclaimer to the users prior to give network access.
I don't think this can be done with FortiNAC. I think as you said the FNAC's banner is only doable when you are really in isolation network, not in other VLAN, and on the other hand the wildcard is not supported in "allowed domains".
For this special requirement you need another solution, much simpler than FortiNAC, and it should be based on DNS proxy server.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1665 | |
1077 | |
752 | |
446 | |
220 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.