Podcast
Questions and Answers
What is the purpose of the configuration wizard in a FortiNAC deployment?
What is the purpose of the configuration wizard in a FortiNAC deployment?
Which type of connectivity does FortiNAC require for modeling devices in the network?
Which type of connectivity does FortiNAC require for modeling devices in the network?
In FortiNAC, what happens during the device onboarding stage?
In FortiNAC, what happens during the device onboarding stage?
What is the purpose of policy configuration in FortiNAC?
What is the purpose of policy configuration in FortiNAC?
Signup and view all the answers
Why are certain names like 'nac' and 'isolation' not recommended for use in FortiNAC?
Why are certain names like 'nac' and 'isolation' not recommended for use in FortiNAC?
Signup and view all the answers
What is the significance of having devices communicate with ETH1 only in Isolation VLANs?
What is the significance of having devices communicate with ETH1 only in Isolation VLANs?
Signup and view all the answers
What is the purpose of the Registration VLan in captive networks?
What is the purpose of the Registration VLan in captive networks?
Signup and view all the answers
Which logic column does FortiNAC key on when making the decision to isolate a host?
Which logic column does FortiNAC key on when making the decision to isolate a host?
Signup and view all the answers
How does FortiNAC determine if isolation is necessary for a host?
How does FortiNAC determine if isolation is necessary for a host?
Signup and view all the answers
What is the dissolvable agent in FortiNAC used for?
What is the dissolvable agent in FortiNAC used for?
Signup and view all the answers
What is the purpose of the Virtual Private Network (VPN) captive network type?
What is the purpose of the Virtual Private Network (VPN) captive network type?
Signup and view all the answers
What does the dissolvable agent do once it completes its task?
What does the dissolvable agent do once it completes its task?
Signup and view all the answers
In Logical Networks, what can you map with different access values on individual devices?
In Logical Networks, what can you map with different access values on individual devices?
Signup and view all the answers
What type of agent is the mobile agent in FortiNAC?
What type of agent is the mobile agent in FortiNAC?
Signup and view all the answers
What is a common method used for device detection through Layer-2 data in FortiNAC?
What is a common method used for device detection through Layer-2 data in FortiNAC?
Signup and view all the answers
What purpose do FortiNAC agents serve in the network?
What purpose do FortiNAC agents serve in the network?
Signup and view all the answers
How many network access policies have been developed in the given example of Logical Networks?
How many network access policies have been developed in the given example of Logical Networks?
Signup and view all the answers
How is a security alert processed in FortiNAC?
How is a security alert processed in FortiNAC?
Signup and view all the answers
What information does FortiNAC use to update host records for device detection?
What information does FortiNAC use to update host records for device detection?
Signup and view all the answers
What is a filter in the context of FortiNAC security rules?
What is a filter in the context of FortiNAC security rules?
Signup and view all the answers
Which captive network type is used for clients connecting through devices managed by access point management?
Which captive network type is used for clients connecting through devices managed by access point management?
Signup and view all the answers
What happens if no filter is matched in FortiNAC's security rule processing?
What happens if no filter is matched in FortiNAC's security rule processing?
Signup and view all the answers
In FortiNAC, what triggers Layer-2 data polling for device detection?
In FortiNAC, what triggers Layer-2 data polling for device detection?
Signup and view all the answers
In FortiNAC, what is a security trigger composed of?
In FortiNAC, what is a security trigger composed of?
Signup and view all the answers
"User profiles and host profiles" in FortiNAC are used for what purpose?
"User profiles and host profiles" in FortiNAC are used for what purpose?
Signup and view all the answers
What type of actions can be associated with a security rule in FortiNAC?
What type of actions can be associated with a security rule in FortiNAC?
Signup and view all the answers
What does FortiClient-EMS use the information collected from clients for?
What does FortiClient-EMS use the information collected from clients for?
Signup and view all the answers
Which step does FortiGate take after verifying the certificate provided by FortiClient?
Which step does FortiGate take after verifying the certificate provided by FortiClient?
Signup and view all the answers
How can the issue of an untrusted certificate when configuring a new connection to FortiClient-EMS be resolved?
How can the issue of an untrusted certificate when configuring a new connection to FortiClient-EMS be resolved?
Signup and view all the answers
What action must be taken on FortiClient-EMS to authorize FortiGate?
What action must be taken on FortiClient-EMS to authorize FortiGate?
Signup and view all the answers
What should be done to allow access to the remote FortiClient endpoints?
What should be done to allow access to the remote FortiClient endpoints?
Signup and view all the answers
What does ZTNA CA use the default root CA certificate in FortiClient-EMS for?
What does ZTNA CA use the default root CA certificate in FortiClient-EMS for?
Signup and view all the answers
What is a key requirement for FortiNAC to be able to add devices to device inventory?
What is a key requirement for FortiNAC to be able to add devices to device inventory?
Signup and view all the answers
What is automatically synchronized by FortiGate after it connects to FortiClient-EMS?
What is automatically synchronized by FortiGate after it connects to FortiClient-EMS?
Signup and view all the answers
Which component can act as a ZTNA access proxy according to the text?
Which component can act as a ZTNA access proxy according to the text?
Signup and view all the answers
Which of the following is a recommended approach for FortiNAC SSL certificates used for the captive portal?
Which of the following is a recommended approach for FortiNAC SSL certificates used for the captive portal?
Signup and view all the answers
How can compromised certificate private keys be handled by FortiClient-EMS?
How can compromised certificate private keys be handled by FortiClient-EMS?
Signup and view all the answers
What does FortiClient-EMS use to uniquely identify each managed endpoint?
What does FortiClient-EMS use to uniquely identify each managed endpoint?
Signup and view all the answers
What is the purpose of a Service-Account recommended for LDAP access in FortiNAC?
What is the purpose of a Service-Account recommended for LDAP access in FortiNAC?
Signup and view all the answers
What information is contained in certificates used by Windows Endpoints according to the text?
What information is contained in certificates used by Windows Endpoints according to the text?
Signup and view all the answers
How does FortiClient identify itself to FortiGate?
How does FortiClient identify itself to FortiGate?
Signup and view all the answers
Which type of VPN does FortiNAC recommend using certificates with SAN (subject alternate name) for?
Which type of VPN does FortiNAC recommend using certificates with SAN (subject alternate name) for?
Signup and view all the answers
What action does clicking the refresh button perform in FortiClient-EMS?
What action does clicking the refresh button perform in FortiClient-EMS?
Signup and view all the answers
What is one of the reasons for using SSL certificates signed by a public or private CA on FortiNAC?
What is one of the reasons for using SSL certificates signed by a public or private CA on FortiNAC?
Signup and view all the answers
What does FortiAuthenticator provide?
What does FortiAuthenticator provide?
Signup and view all the answers
In the context of network modeling, what does FortiNAC require to be able to add devices to its inventory?
In the context of network modeling, what does FortiNAC require to be able to add devices to its inventory?
Signup and view all the answers
What is a key advantage of ZTNA regarding access control?
What is a key advantage of ZTNA regarding access control?
Signup and view all the answers
Which interface is usually used to access the FortiNAC administration interface?
Which interface is usually used to access the FortiNAC administration interface?
Signup and view all the answers
What is included with FortiOS and FortiClient-EMS without requiring additional licenses?
What is included with FortiOS and FortiClient-EMS without requiring additional licenses?
Signup and view all the answers
What is a system reserved prefix that should not be used while labeling DHCP scopes in FortiNAC?
What is a system reserved prefix that should not be used while labeling DHCP scopes in FortiNAC?
Signup and view all the answers
Why is it important to have valid SNMP and CLI read-write access when adding devices to FortiNAC's inventory?
Why is it important to have valid SNMP and CLI read-write access when adding devices to FortiNAC's inventory?
Signup and view all the answers
What triggers FortiNAC to perform Layer-2 polling to update its awareness of devices connected to an edge device?
What triggers FortiNAC to perform Layer-2 polling to update its awareness of devices connected to an edge device?
Signup and view all the answers
How does FortiNAC collect MAC-address to IP-address correlation for Layer-3 devices?
How does FortiNAC collect MAC-address to IP-address correlation for Layer-3 devices?
Signup and view all the answers
What is a critical component for some FortiNAC capabilities in terms of network visibility?
What is a critical component for some FortiNAC capabilities in terms of network visibility?
Signup and view all the answers
Which method can be used for device registration in FortiNAC?
Which method can be used for device registration in FortiNAC?
Signup and view all the answers
What do the classification settings in device profiling rules outline?
What do the classification settings in device profiling rules outline?
Signup and view all the answers
Which authentication method in FortiNAC will override all other authentication methods configured?
Which authentication method in FortiNAC will override all other authentication methods configured?
Signup and view all the answers
What is the purpose of the authentication VLan in FortiNAC?
What is the purpose of the authentication VLan in FortiNAC?
Signup and view all the answers
Which RADIUS authentication mode in FortiNAC involves using another RADIUS server like Microsoft NPS or FortiAuthenticator for EAP requests?
Which RADIUS authentication mode in FortiNAC involves using another RADIUS server like Microsoft NPS or FortiAuthenticator for EAP requests?
Signup and view all the answers
What initiates the captive portal page presentation process for a host isolated on a wired port?
What initiates the captive portal page presentation process for a host isolated on a wired port?
Signup and view all the answers
Which file on FortiNAC allows it to respond with its own address when a host attempts to resolve a domain by name?
Which file on FortiNAC allows it to respond with its own address when a host attempts to resolve a domain by name?
Signup and view all the answers
What is NOT a component of a Security policy according to the text?
What is NOT a component of a Security policy according to the text?
Signup and view all the answers
What are the two main pieces that compose a Security policy?
What are the two main pieces that compose a Security policy?
Signup and view all the answers
What feature allows FortiNAC to gather application and compliance information?
What feature allows FortiNAC to gather application and compliance information?
Signup and view all the answers
Which agent type is recommended for BYOD and guests in FortiNAC?
Which agent type is recommended for BYOD and guests in FortiNAC?
Signup and view all the answers
What additional function can agents perform in FortiNAC besides device registration and application inventory?
What additional function can agents perform in FortiNAC besides device registration and application inventory?
Signup and view all the answers
How many different types of configurations can be associated with a user and/or host profile in FortiNAC?
How many different types of configurations can be associated with a user and/or host profile in FortiNAC?
Signup and view all the answers
'Endpoint Compliance and Risk Assessment' in FortiNAC can be done through an integration with which system?
'Endpoint Compliance and Risk Assessment' in FortiNAC can be done through an integration with which system?
Signup and view all the answers