Fortinet white logo
Fortinet white logo

Administration Guide

7.6.0

Check Point Cloud

Check Point Cloud

FortiNAC controls access to the remote user’s device connecting over the VPN. In order for the device to be able to gain access the network, FortiNAC must know about the connecting device and verify the device is in good standing.

1. When a device initially connects over a VPN tunnel, the device is restricted.

2. FortiNAC identifies the device as known and trusted.

3. The device is unrestricted.

4. If configured for endpoint compliance, the device’s security posture is evaluated. Network access is restricted upon failure.

Relevant Documentation

Check Point VPN Integration (Central Mode)

Check Point VPN Integration (Local Mode)

Check Point Cloud

Check Point Cloud

FortiNAC controls access to the remote user’s device connecting over the VPN. In order for the device to be able to gain access the network, FortiNAC must know about the connecting device and verify the device is in good standing.

1. When a device initially connects over a VPN tunnel, the device is restricted.

2. FortiNAC identifies the device as known and trusted.

3. The device is unrestricted.

4. If configured for endpoint compliance, the device’s security posture is evaluated. Network access is restricted upon failure.

Relevant Documentation

Check Point VPN Integration (Central Mode)

Check Point VPN Integration (Local Mode)