Podcast
Questions and Answers
What is used to dynamically provision access to connecting endpoints based on matched user/host profiles?
What is used to dynamically provision access to connecting endpoints based on matched user/host profiles?
What are logical networks used for in FortiNAC?
What are logical networks used for in FortiNAC?
What does FortiNAC use to provision the appropriate network access?
What does FortiNAC use to provision the appropriate network access?
What simplifies the configuration of network access policies by reducing the number of policies?
What simplifies the configuration of network access policies by reducing the number of policies?
Signup and view all the answers
What is used to define the Layer 2 access and the firewall policies enforced from a single access policy?
What is used to define the Layer 2 access and the firewall policies enforced from a single access policy?
Signup and view all the answers
What is used to associate configuration to device(s) and perform device-specific network access values for each logical network?
What is used to associate configuration to device(s) and perform device-specific network access values for each logical network?
Signup and view all the answers
What enables global administration in distributed environments for network access policy support?
What enables global administration in distributed environments for network access policy support?
Signup and view all the answers
What is used to apply network access policies and translate logical access values to physical values?
What is used to apply network access policies and translate logical access values to physical values?
Signup and view all the answers
What is used to define the logical network to be used for provisioning?
What is used to define the logical network to be used for provisioning?
Signup and view all the answers
What evaluates endpoints as they connect to the network and determines if a network access policy should be assigned?
What evaluates endpoints as they connect to the network and determines if a network access policy should be assigned?
Signup and view all the answers
What is used to dynamically provision access to connecting endpoints based on matched user/host profiles?
What is used to dynamically provision access to connecting endpoints based on matched user/host profiles?
Signup and view all the answers
What allows a single network access policy to provision devices to any number of different networks?
What allows a single network access policy to provision devices to any number of different networks?
Signup and view all the answers
What are the two pieces that compose a network access policy?
What are the two pieces that compose a network access policy?
Signup and view all the answers
What are user/host profiles in FortiNAC based on?
What are user/host profiles in FortiNAC based on?
Signup and view all the answers
How are location components added to user/host profiles?
How are location components added to user/host profiles?
Signup and view all the answers
What logic operators can be applied across the user/host profiles?
What logic operators can be applied across the user/host profiles?
Signup and view all the answers
When does a user/host profile match during the 'When' criteria?
When does a user/host profile match during the 'When' criteria?
Signup and view all the answers
What happens when more than one port group is added to the location component?
What happens when more than one port group is added to the location component?
Signup and view all the answers
What does FortiNAC do when it identifies a match with a user/host profile?
What does FortiNAC do when it identifies a match with a user/host profile?
Signup and view all the answers
What does the 'Where' criteria in user/host profiles verify?
What does the 'Where' criteria in user/host profiles verify?
Signup and view all the answers
What range can user/host profiles cover?
What range can user/host profiles cover?
Signup and view all the answers
What is the main purpose of the configuration piece in a network access policy?
What is the main purpose of the configuration piece in a network access policy?
Signup and view all the answers
What does the 'Who/What' criteria in user/host profiles verify?
What does the 'Who/What' criteria in user/host profiles verify?
Signup and view all the answers
What happens if the location is set to 'Any' in user/host profiles?
What happens if the location is set to 'Any' in user/host profiles?
Signup and view all the answers