FortiLink NAC

FortiLink NAC Whiteboard

Below is a fun simulated example of how FortiLink NAC works

FortiLink NAC

Switch Controller & Device Onboarding

FortiGate

NAC Policy: "Corp-Laptops" -> VLAN 10
NAC Policy: "IOT-Devices" -> VLAN 20

FortiSwitch

FortiLink

Corp Laptop

VLAN: Onboarding

IP Camera

VLAN: Onboarding

Onboarding Flow:

  1. 1. Device Plugs In
  2. 2. Switch reports MAC/OUI
  3. 3. FGT matches NAC Policy
  4. 4. FGT pushes VLAN to Port
SWITCH-CONTROLLER CLI
FGT # config switch-controller security-policy nac-policy
FGT (nac-policy) # edit "Corp-Access"
FGT (Corp-Access) # set vlan "VLAN10"
FGT (Corp-Access) # set mac-address 00:0c:29:*
FGT (Corp-Access) # end
FGT # _

Why FortiLink NAC?

It extends the Security Fabric down to the physical port. You don't configure VLANs on switch ports manually; you define what a "Trusted Device" looks like, and the FortiGate handles the rest.

Advanced Capabilities

OS Profiling & Device Inventory

FortiLink NAC doesn't just look at MAC addresses. It also uses DHCP fingerprinting and LLDP to profile exactly what is connecting. It can distinguish between a Windows laptop, an iPhone, or a specialized medical device, allowing for granular policy application without manual intervention.

ZTNA Tags for Device Profiles

Once a device is identified, FortiGate can apply Zero Trust Network Access (ZTNA) tags. These tags follow the device throughout the Security Fabric. If a device is tagged as "Vulnerable" due to a missing patch, NAC can dynamically shift its port to a Remediation VLAN until it is compliant.

Dynamic Port Segmentation

Traditional NAC required complex RADIUS setups. FortiLink NAC simplifies this by using the FortiGate as the single point of management. Ports are "dead" or assigned to a restricted "Onboarding" VLAN until the device is verified, preventing unauthorized physical access to sensitive network segments.

Seamless Fabric Integration

Because FortiSwitch is an extension of the FortiGate, security features like IPS, Antivirus, and Sandbox can be applied directly to the traffic entering the switch port. This creates a "Micro-Segmentation" environment where threats are stopped at the edge.

Comments

Popular posts from this blog

Following Design Processes

ExtremeCloud IQ Instant Port