MAC devices
Non-802.1X compliant devices can be identified and accepted onto the network using MAC address authentication. See Non-compliant devices for more information.
Go to Authentication > User Management > MAC Devices to view a list of configured MAC devices. From here, MAC devices can be created, imported, exported, edited, and deleted.
The following information is shown:
Create New |
Create a new MAC-based authentication devices. |
Import |
Import a list of MAC devices from a CSV file. |
Export |
Export a list of MAC devices to a CSV file. |
Delete |
Delete the selected MAC device(s). |
Edit |
Edit the selected MAC device. |
Once created/imported, MAC devices can be added to MAC user groups. See User groups for more information.
Importing MAC devices from a CSV file
To import MAC devices from a CSV file:
-
From the MAC devices list in Authentication > User Management > MAC Devices, select Import.
The Import MAC Devices window opens.
- Select Upload a file, locate the MAC devices CSV file on your management computer, and select Open.
- Optionally, from the Add MAC device(s) to group dropdown, select a MAC devices user group where the imported MAC devices are added to.
- Click Save.
Device tracking
When enabled, this feature allows end users to self-register their devices, and to have those devices tracked, based on the device MAC address.
An unregistered device is granted restricted network access, and is redirected to the FortiAuthenticator guest portal. The user enters valid credentials, then the FortiAuthenticator detects the unregistered device and offers the user an option to register it. If the user registers the device, it becomes part of their authorized device group and the user is granted network access on that device (if the user does not register the device, they are redirected to the guest portal login page).
To link a device to a user configuration, create a new MAC-based authenticaation device entry under Authentication > User Management > MAC Devices, and enable This device belongs to a user. Similarly, it is possible to link a device from a user configuration. In either case, names and MAC addresses must be unique.
To fully benefit from this feature, you must use a FortiAuthenticator in conjunction with a FortiGate running FortiOS 6.0+.