Podcast
Questions and Answers
What is used to dynamically provision access to connecting endpoints based on matched user/host profiles?
What is used to dynamically provision access to connecting endpoints based on matched user/host profiles?
- Network access policies (correct)
- Device-specific configurations
- Globalization
- Logical networks
What are logical networks used for in FortiNAC?
What are logical networks used for in FortiNAC?
- Apply network access policies and translate logical access values to physical values (correct)
- Perform device-specific configurations for network infrastructure devices
- Enable global administration in distributed environments
- Provision devices to different networks
What does FortiNAC use to provision the appropriate network access?
What does FortiNAC use to provision the appropriate network access?
- Decoupled configuration values (correct)
- Globalization
- Device-specific network access values
- Centralized device configurations
What simplifies the configuration of network access policies by reducing the number of policies?
What simplifies the configuration of network access policies by reducing the number of policies?
What is used to define the Layer 2 access and the firewall policies enforced from a single access policy?
What is used to define the Layer 2 access and the firewall policies enforced from a single access policy?
What is used to associate configuration to device(s) and perform device-specific network access values for each logical network?
What is used to associate configuration to device(s) and perform device-specific network access values for each logical network?
What enables global administration in distributed environments for network access policy support?
What enables global administration in distributed environments for network access policy support?
What is used to apply network access policies and translate logical access values to physical values?
What is used to apply network access policies and translate logical access values to physical values?
What is used to define the logical network to be used for provisioning?
What is used to define the logical network to be used for provisioning?
What evaluates endpoints as they connect to the network and determines if a network access policy should be assigned?
What evaluates endpoints as they connect to the network and determines if a network access policy should be assigned?
What is used to dynamically provision access to connecting endpoints based on matched user/host profiles?
What is used to dynamically provision access to connecting endpoints based on matched user/host profiles?
What allows a single network access policy to provision devices to any number of different networks?
What allows a single network access policy to provision devices to any number of different networks?
What are the two pieces that compose a network access policy?
What are the two pieces that compose a network access policy?
What are user/host profiles in FortiNAC based on?
What are user/host profiles in FortiNAC based on?
How are location components added to user/host profiles?
How are location components added to user/host profiles?
What logic operators can be applied across the user/host profiles?
What logic operators can be applied across the user/host profiles?
When does a user/host profile match during the 'When' criteria?
When does a user/host profile match during the 'When' criteria?
What happens when more than one port group is added to the location component?
What happens when more than one port group is added to the location component?
What does FortiNAC do when it identifies a match with a user/host profile?
What does FortiNAC do when it identifies a match with a user/host profile?
What does the 'Where' criteria in user/host profiles verify?
What does the 'Where' criteria in user/host profiles verify?
What range can user/host profiles cover?
What range can user/host profiles cover?
What is the main purpose of the configuration piece in a network access policy?
What is the main purpose of the configuration piece in a network access policy?
What does the 'Who/What' criteria in user/host profiles verify?
What does the 'Who/What' criteria in user/host profiles verify?
What happens if the location is set to 'Any' in user/host profiles?
What happens if the location is set to 'Any' in user/host profiles?