Hatibi
Staff
Staff
Last activity: Not Available
80 Profile 80% Complete
Most Liked Posts Recent Solutions
No Content Available

User Activity

Description This article describes how to leverage 'Host' and 'User' group types' in Network Access Policies, depending on how the endpoint is registered. Scope FortiNAC-F v7.6 and greater. Solution As of FortiNAC version F7.6.0, FortiNAC will automa...
Description This article describes how the TCP/UDP device profiling method works and how to check profiling results when the rule does not match. Scope FortiNAC-F. Solution When TCP or UDP methods are used for device profiling, FortiNAC will utilize ...
Description This article describes the steps and verification procedures required to profile devices using the SNMP method. Scope FortiNAC. Solution When profiling with the SNMP method, FortiNAC will send a SNMP Get Request to the Isolated device and...
Description This article describes the concept of 'Ports in the Network' in FortiNAC. This is required to properly understand the scope of the network environment to adjust resources allocated to FortiNAC for optimal performance. Scope FortiNAC, Fort...
Description This article describes the steps required to fully restore a FortiNAC server after a system failure or when redeployment is needed. Scope FortiNAC-F v7.4.X, v7.6.X. Solution The full restoration of FortiNAC requires that administrators al...
My Accepted Solutions