Description This article describes some easy API calls to add
information in FortiNAC and its syntax. Scope All supported versions of
FortiNAC. Solution Adding hosts and adapters This example shows how to
put a single host with one or multiple adapte...
Description This article describes that In cases where authentication is
required to use MSCHAPv2 (usually in Microsoft Windows environments), in
order for RADIUS authentication to succeed FortiNAC needs to be domain
joined. This requirement comes fr...
Description This article describes an example of how to set up FortiNAC
in a simplified network. It additionally covers how to connect the ports
and how to handle IP addressing. This is an example of Stage 2 from this
article: Technical Tip: Comprehe...
Description This article describes some cases where some hosts (IoT or
other static systems) that are manually registered need to override the
global aging timer set on System -> Settings -> User/Host Management ->
Aging [Registered Hosts] to avoid t...
Description This article provides some general recommendations for
improving FortiNAC's day-to-day operations. This includes disabling
forgotten debugs, checking for enabled logs, and specific configurations
that can add extra load to FortiNAC perfor...
Yes, LACP will allow to use/aggregate both interfaces as shown in the
guide, but that can not be mixed with different speed 2.5Gbps and 1Gbps.
In your case this switch will build the LACP using 2x1Gbps. I'm not
aware of FSW using auto-isl with AP, I ...
Hi, If I get it right, you want to use FNAC to do RADIUS authentication
only without checking any enforcement just to respond to authentication
with a user group as RADIUS attribute (Fortinet-Group-Name)?
Some information is covered in the admin guide here by default in later
version all ports are enabled to auto discover config switch
interfaceedit "port1"set auto-discovery-fortilink enable remove the auto
discovery on port level for one or both swit...
The full OID should be like this: .220.127.116.11.4.1.12318.104.22.168.22.214.171.124.1.6
where .126.96.36.199.4.1.123188.8.131.52.184.108.40.206.1[.6] the number "6" is the
policy ID The OID value: 09/29/2023 14:24 (20 second(s) ago)
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.