Description This article describes a simple method to quickly verify
database synchronization between two nodes in a High Availability (HA)
cluster. Scope FortiNAC. Solution When the primary node is in control
and the cluster is healthy, database syn...
Description This article describes the changes to the firmware update
procedure in newer versions of FortiNAC. Scope FortiNAC v7.6.3 and later
versions. Solution In newer versions of FortiNAC, the firmware file will
no longer be downloaded directly f...
Description This article describes the configuration steps required to
quickly isolate hosts that initially had the Persistent Agent
communicating, but are no longer doing so. The host's compliance status
may have changed during this time, and it may...
Description This article describes a behavior observed in FortiNAC
Manager related to CA Management, where the FortiNAC CA status appears
as 'Failed' despite stable network communication and normal CA
functionality. This behavior is isolated to Stand...
Description This article describes the steps required to successfully
deploy the Persistent Agent on a Linux host. In this example, Ubuntu
24.04 is used as the test host. Scope FortiNAC and Linux hosts. Solution
This article is a follow-up to Technic...
Than you should disable that option, if the requirement is to process
them locally.In recent version of FNAC, only a single authentication
port is used for local and proxy requests. The requests are than routed
accordingly.It is also suggested to hav...
You can try to follow the troubleshooting steps that are shown in this
article: Troubleshooting Tip: Failure to connect via SSL VPN with
'Credential or SSLVPN configuration is wrong. (-7200)' message with
'sslvpn_login_cert_checked_error'
Check if this setup has the option 'Proxy MAB Requests' enabled like
shown below: By default, this option is disabled. Authentication
policies are not related to RADIUS authentication requests originating
from NAS devices.
Host are isolated when its status is changed to At-Risk after a scan has
failed. You can use monitor for specific custom scans like shown here:
Technical Tip: Monitor Custom scans to ensure a quicker response to host
compliance
There is no reason to not enforce registration on all ports, if rogue
hosts are expected to be connected on a port. If registration is not
enforced, than the rogue hosts should fall in the Default VLAN and not
put in a production VLAN.