Hi, We are using Fortigate, Fortiswitch and Fortinac.
They are using static ip configuration in their client system.
We wanted to push Dynamic access control lists via fortinac.
Can someone please guide in this case.
Solved! Go to Solution.
Hello @ganesh,
you can use DACLs enabled on 802.1x ports in FSW to apply different configurations using Attributes set per logical network in FortiNAC.
Fortswitch configuration:
You can use one of the following:
NAS-Filter-Rule += â<deny | permit> in <ip | ip-protocol-value> from any to <any | host | <ip-addr> | ipv4-addr/mask> [<tcp/udp-port | tcp/udp-port range>] [cnt]
You will create the Radius Server attribute in FNAC by following this guide:
https://docs.fortinet.com/document/fortinac-f/7.4.0/administration-guide/239599/attribute-groups
So once a host matches a policy with a Logical configuration you can add an Attribute group that sends "Filter-ID" with the Isolation or production ACL name or you can use "NAS-Filter-Rule" with the permitted criteria.
Regards
Hello @ganesh,
you can use DACLs enabled on 802.1x ports in FSW to apply different configurations using Attributes set per logical network in FortiNAC.
Fortswitch configuration:
You can use one of the following:
NAS-Filter-Rule += â<deny | permit> in <ip | ip-protocol-value> from any to <any | host | <ip-addr> | ipv4-addr/mask> [<tcp/udp-port | tcp/udp-port range>] [cnt]
You will create the Radius Server attribute in FNAC by following this guide:
https://docs.fortinet.com/document/fortinac-f/7.4.0/administration-guide/239599/attribute-groups
So once a host matches a policy with a Logical configuration you can add an Attribute group that sends "Filter-ID" with the Isolation or production ACL name or you can use "NAS-Filter-Rule" with the permitted criteria.
Regards
User | Count |
---|---|
2428 | |
1303 | |
778 | |
556 | |
455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.