Description This article describes a behavior observed in FortiNAC
Manager related to CA Management, where the FortiNAC CA status appears
as 'Failed' despite stable network communication and normal CA
functionality. This behavior is isolated to Stand...
Description This article describes the steps required to successfully
deploy the Persistent Agent on a Linux host. In this example, Ubuntu
24.04 is used as the test host. Scope FortiNAC and Linux hosts. Solution
This article is a follow-up to Technic...
Description This article describes how to create and use a Custom Script
to send customizable event content via Email. Scope FortiNAC. Solution
The scripts are located in the '/home/cm/scripts' directory and can be
reached after entering the shell. e...
Description This article describes the steps to create an additional
Winbind instance in FortiNAC that connects to a different domain and its
respective Domain Controllers. The reason why the configuration of
Winbind is required in FortiNAC is explai...
Description This article describes an issue that may affect setups that
are upgraded from firmware v9.x running in CentOS to firmware v7.x
running in FortiNAC-OS. The captive portal is not reachable, the reason
(error 503): 'Service Unavailable. The ...
You can create local user accounts in FNAC if needed, but you can also
register hosts as devices manually or through device profiling, and then
apply endpoint compliance policies.
You can start with this article to get an overall idea on how FNAC
integrates with the network: Technical Tip: Comprehensive guide for a
simple FortiNAC deploymentYou can also take a look at this solution
(based on MAC auth.): Technical Tip: A simple...
The RADIUS/EAP server certificate is usually signed by a private CA, but
it can also be signed by a public one. However, client certificates
(EAP-TLS) are rarely signed by public CAs because they are mainly used
inside an organization and it's easier...
A PKI infrastructure must be in place to issue and manage certificates,
which are then distributed to each endpoint. Typically, Microsoft
Certificate Authority (CA) is used for this purpose. Some details are
also shown in this configuration guide:
ht...