Description This article describes the options in FortiNAC endpoint
compliance configuration that allows administrators to Restrict Host
connections to only whitelisted SSIDs/APs and additionally check for
Dual Homes connections when there are multip...
Description This article describes how to debug and identify missing
configurations when Customers have configured Google Authentication
accounts to onboard new devices via the FortiNAC Captive Portal using
Google credentials. Scope FortiNAC. Solutio...
Description The article describes how to write packets collected through
tcpdump to a .pcap file that can later be shared with Fortinet Support
to investigate specific issues. Scope FortiNAC-F. Solution In the
following example, the desired outcome i...
Description This article describes the usage of Anonymous Authentication
in the FortiNAC captive portal and the debugging needed to troubleshoot
Registration Failures. Scope FortiNAC. Solution The Anonymous
Authentication feature can be enabled in th...
Description This article describes the function of the 'Resync
Interfaces' option in FortiNAC and how to create a schedule to run it
periodically. Scope FortiNAC. Solution The 'Resync Interfaces' option
will have FortiNAC read and update port status ...
Hi adem_netsys, in this case double-check the External authentication
profile you have assigned to that external user in
Settings>General>External authentication profile. You must specify the
DN and port 389 for LDAP. If it still does not work check ...
Hi Christoph, the guide you shared actually specifiec the registry
settings to be applied: Configuring registry keys on clients If you are
trying to deploy these settings on a client machine that cannot retrieve
group policy updates, manually configu...
Hi imsail, please check the following guide related to your scenario:
Hi maxheadroom, following guide may help in your scenario:
Other: ZTNA for SMB applications is described in f...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.