Fortinet black logo

Overview

7.2.0
Copy Link
Copy Doc ID 6cfa7ee4-9b3d-11ed-8e6d-fa163e15d75b:833387
Download PDF

Overview

This document provides the steps necessary for establishing network visibility by modeling the network infrastructure in the FortiNAC Administration UI. It is intended to be used in conjunction with the Deployment Guide in the Fortinet Document Library.

What it Does

The network infrastructure is “discovered” and added to FortiNAC’s database. Network devices are identified as either L2 (e.g. switches) or L3 (e.g. routers). Once added, FortiNAC can gather connectivity information from these network devices to provide real-time inventory of what’s connected to the network and where.

How it Works

FortiNAC learns where endpoints are connected on the network using the following methods:

  • RADIUS communication

  • L2 Polling (reads the device’s MAC address table)

  • L3 Polling (reads the device’s ARP cache)

Overview

This document provides the steps necessary for establishing network visibility by modeling the network infrastructure in the FortiNAC Administration UI. It is intended to be used in conjunction with the Deployment Guide in the Fortinet Document Library.

What it Does

The network infrastructure is “discovered” and added to FortiNAC’s database. Network devices are identified as either L2 (e.g. switches) or L3 (e.g. routers). Once added, FortiNAC can gather connectivity information from these network devices to provide real-time inventory of what’s connected to the network and where.

How it Works

FortiNAC learns where endpoints are connected on the network using the following methods:

  • RADIUS communication

  • L2 Polling (reads the device’s MAC address table)

  • L3 Polling (reads the device’s ARP cache)