Podcast
Questions and Answers
Where can access control be implemented if using a FortiGate device within the zone?
Where can access control be implemented if using a FortiGate device within the zone?
What needs to be placed and secured behind a firewall when using FortiAuthenticator as a remote authentication server?
What needs to be placed and secured behind a firewall when using FortiAuthenticator as a remote authentication server?
In the Purdue model, where can the authentication servers be implemented under the protection of the Edge-FortiGate?
In the Purdue model, where can the authentication servers be implemented under the protection of the Edge-FortiGate?
What can be used for remote users for VPN authentication on the Edge-FortiGate?
What can be used for remote users for VPN authentication on the Edge-FortiGate?
Signup and view all the answers
What is recommended in most cases regarding the use of a separate authentication server from O.T?
What is recommended in most cases regarding the use of a separate authentication server from O.T?
Signup and view all the answers
What can FortiGate be configured for if using remote authentication within the zone?
What can FortiGate be configured for if using remote authentication within the zone?
Signup and view all the answers
What can be restricted by using FortiGate within the zone, floor, or plant?
What can be restricted by using FortiGate within the zone, floor, or plant?
Signup and view all the answers
What can be used in the policy to implement access control in the whole O.T network?
What can be used in the policy to implement access control in the whole O.T network?
Signup and view all the answers
What can FortiAuthenticator be used as for the entire O.T network if placed under the protection of the Edge-FortiGate?
What can FortiAuthenticator be used as for the entire O.T network if placed under the protection of the Edge-FortiGate?
Signup and view all the answers
What is recommended when using FortiAuthenticator and any other authentication servers for O.T?
What is recommended when using FortiAuthenticator and any other authentication servers for O.T?
Signup and view all the answers
What is used for the entire O.T network if using FSSO in the policy to implement access control?
What is used for the entire O.T network if using FSSO in the policy to implement access control?
Signup and view all the answers
What are the authentication methods configured in FortiAuthenticator?
What are the authentication methods configured in FortiAuthenticator?
Signup and view all the answers
What type of authentication is configured on Edge-FortiGate?
What type of authentication is configured on Edge-FortiGate?
Signup and view all the answers
What does FortiNAC provide in an O.T environment?
What does FortiNAC provide in an O.T environment?
Signup and view all the answers
What does FortiNAC enable in terms of network access?
What does FortiNAC enable in terms of network access?
Signup and view all the answers
What is the purpose of network micro-segmentation in FortiNAC?
What is the purpose of network micro-segmentation in FortiNAC?
Signup and view all the answers
What is the second part (after visibility) to securing a network environment according to the text?
What is the second part (after visibility) to securing a network environment according to the text?
Signup and view all the answers
What is the purpose of creating granular policies in network access control?
What is the purpose of creating granular policies in network access control?
Signup and view all the answers
What is the benefit of knowing and trusting each endpoint in a network environment?
What is the benefit of knowing and trusting each endpoint in a network environment?
Signup and view all the answers
What is the role of FortiToken in the network environment?
What is the role of FortiToken in the network environment?
Signup and view all the answers
What type of access is granted to endpoints in the network environment?
What type of access is granted to endpoints in the network environment?
Signup and view all the answers
What can be dynamically adjusted in the network environment according to the text?
What can be dynamically adjusted in the network environment according to the text?
Signup and view all the answers
What is the function of network access policies in the network environment?
What is the function of network access policies in the network environment?
Signup and view all the answers