Check Point Cloud
FortiNAC controls access to the remote user’s device connecting over the VPN. In order for the device to be able to gain access the network, FortiNAC must know about the connecting device and verify the device is in good standing.
1. When a device initially connects over a VPN tunnel, the device is restricted.
2. FortiNAC identifies the device as known and trusted.
3. The device is unrestricted.
4. If configured for endpoint compliance, the device’s security posture is evaluated. Network access is restricted upon failure.
Relevant Documentation