Most Liked Posts Recent Solutions
No Content Available

User Activity

Description This article provides examples of which tools can be leveraged in FortiNAC-F to classify IoT/OT devices. Scope FortiNAC-F, FortiNAC. Solution The device profiler feature in FortiNAC is used to classify unknown (rogue) devices by using mul...
Description This article describes how we can leverage the 'Security Access Value' User attribute to apply control through NAC policies in addition to using the group membership and roles as criteria. Scope FortiNAC-F, FortiNAC. Solution The 'Securit...
Description This article describes how to resolve the synchronization issue after enabling the FortiNAC control Manager proxy configuration. Scope FortiNAC-M, FortiNAC, SQUID. Solution The Control Manager proxy configuration limits the FortiNAC serve...
Description This article describes the options in FortiNAC endpoint compliance configuration that allows administrators to Restrict Host connections to only whitelisted SSIDs/APs and additionally check for Dual Homes connections when there are multip...
Description This article describes how to debug and identify missing configurations when Customers have configured Google Authentication accounts to onboard new devices via the FortiNAC Captive Portal using Google credentials. Scope FortiNAC. Solutio...