What it Does
The following features operate independently of each other. Both can be configured, if desired.
Syslog Management
Syslog Integration enables FortiNAC to respond based on Syslog messages sent from the
Palo Alto firewall. These messages provide information FortiNAC can use to
send notifications (such as email), or take action against the associated host, such as disabling the host or marking it at risk.
Single Sign-On (SSO)
Provides automatic application of Palo Alto firewall policies to hosts connecting to the network. This is achieved through the use of XML API messaging sent from FortiNAC to a Single Sign-On Agent configured in the firewall. With this information, the firewall can apply user-specific policies.
VPN
FortiNAC controls access to the remote user’s device connecting over the VPN. In order for the device to be able to gain access the network, FortiNAC must know about the connecting device and verify the device is in good standing.
-
When a user connects to the VPN tunnel, the device is restricted.
-
FortiNAC identifies the device as known and trusted.
-
Firewall tags are sent to the Palo Alto so the correct policy is matched and device is
unrestricted.
If configured for endpoint compliance, the device’s security posture is evaluated. Network access is restricted upon failure. Click on the desired feature to proceed: