Description This article describes cases where Wired 802.1x
Authentication scenarios would bring a failure in VLAN change through
Radius due to incompatibility of the NAS format used by Huawei even
though there is an Accept-Accept along with attribut...
Description This article will show an example of leveraging the
'Who/what by RADIUS Request Attribute' in FortiNAC User/Host Profiles in
order to match Domain Machines and give them specific network access.
Scope FortiNAC, Computer/Machine authentica...
Description This article describes how FortiNAC-M manages server nodes
(FortiNAC-CA) and explains the concept of Global Objects. Scope
FortiNAC-M, FortiNAC-CA Solution FortiNAC Control Manager is used to add
individual FortiNAC servers to provide sca...
Description This article describes how to use FortiAuthenticator as
TACACS+ server for Juniper remote user authorization. FortiAuthenticator
can perform central authentication as TACACS+ Server by authorizing
remote users to different user templates ...
Description This article describes how to make Cisco ASA ports visible
on GUI when the integration is successful but the Interfaces are not
available in Port View. Scope FortiNAC Cisco ASA integration. Solution
To retrieve information from the ASA ap...
Hi Jeremy, regarding the scenario where FortiAuthenticator will act as
radius server you can use the following documentation:
Hi, what events do you get from the Domain Manager debug logs? You can
check at https:///debug On the top left
services select FSSO Domain Manager. Check the timestamp to see events
that correlate to the events in DC/TS Agent service. When you select...
Hi Nowolf, Self-Signed - FortiNAC issues its own certificate. This type
of certificate cannot be used for the Persistent Agent certificate
target (for Persistent Agent communication) or the Portal target when
using Dissolvable Agents. You can check t...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.