Auto-configured data
To simplify the configuration process for the Wireless Security feature some required pieces of data are generated automatically. For example, if you configure an SSID for Guest Access, the underlying User/Host Profile and Network Access Policy are created for you.
If you modify auto-configured data after you have run the Quick Start wizard, running this tool again may undo the modifications you have made. |
Data Type |
Data |
Notes |
---|---|---|
Containers |
Container Names: Wireless Controllers Wireless APs |
Containers are used within FortiNAC to group devices together. As wireless devices are added using either Discovery or by entering them manually on the Network Devices View they are also added to Topology. |
Port Groups |
Group Names: Name of the Open or Secure SSID |
Groups are used to gather like items that require similar treatment. The groups created here are port groups and are used to map Network Access Policies for the Secure and Open SSIDs. When you configure an SSID a port group is created based on the name of the SSID. Each SSID is placed in a separate port group. For example if you add a SSID with the name MegaTech Secure, then a port group with the same name is automatically created and contains the MegaTech Secure SSID. |
Host Groups |
Group Names: Name of the group from the Directory |
Directory Groups are used to group users and their corresponding hosts. Group membership is used in User/Host profiles to determine which Network Access, Endpoint Compliance or Supplicant Policies to apply. |
Model |
Model Configuration: Name of the device |
When a device that provides network services is added to FortiNAC a model of that device's configuration is stored in the database. This model includes information such as CLI User Names, Passwords, communication protocol, RADIUS Server information and Isolation and Production VLANs. For devices configured through Wireless Security, the following settings are entered:
|
SSID |
SSID Configuration: Name of the SSID |
Individual SSIDs can be configured separately instead of inheriting settings from the device's Model Configuration, such as settings for default Isolation and Production VLANS. Use Network Devices View to select a device and access the SSID Configuration. For devices configured through Wireless Security, the following settings are entered for all SSIDs regardless of whether they are open or secure:
|
Polling |
L2 and L3 Polling settings |
Wireless devices are automatically added to the L2 and L3 Polling groups and polling is enabled for the device. The polling interval for L2 is every 10 minutes and L3 is set to every 30 minutes. Use Network Devices View, L2 Polling View or L3 Polling View to modify polling information. |
Roles |
Role Names: Name of Guest Template associated with guest. |
Roles are added as attributes to users or hosts. Role mapping is accomplished by creating a User/Host Profile configured with the SSID port group as the connection location and the Who/What by Attribute field set to one of these role names. A Network Access Policy maps this User/Host Profile to a Network Access Configuration containing the User Group/VLAN where the host will be placed.
|
User/Host Profile |
|
User/Host Profiles are created when a new SSID Mapping is added on the Network Devices view. Guest Management SSID Mappings — A User/Host profile is created for each SSID and Guest Template combination. Names of these User/Host profiles are based on the SSID name and the combination of data contained within the profile. Example: Mobile Security Wizard Profile: GuestAccess Production XR4830 Open
The User/Host Profile is configured as follows:
Device Onboarding SSID Mappings — A User/Host profile is created for each SSID, Directory Group and Operating System list combination. Names of these User/Host profiles are based on the SSID name and the combination of data contained within the profile. Example: XAM BYOD Profile: Domain Admins [Windows,macOS,iOS,Android,RIM,Windows Phone] Production XR4830 Secure
The User/Host Profile is configured as follows:
|
Network Access Configuration Network Access Policy |
|
Network Access Configurations and Network Access Policies are created when a new SSID Mapping is added using Wireless Security. Guest Management SSID Mappings — A Network Access Configuration and Network Access Policy are created for each SSID and Guest Template combination. Names are based on the SSID name and the combination of data the items contain. Example: Network Access Configuration = Mobile Security Wizard Configuration: GuestAccess Production XR4830 Open Network Access Policy = Mobile Security Wizard Access Policy: GuestAccess Production XR4830 Open
Device Onboarding SSID Mappings — A Network Access Configuration and Network Access Policy are created for each unique SSID, Directory Group and Host Operating System combination. Example: Network Access Configuration = XAM BYOD Configuration: Domain Admins [Windows,macOS,iOS,Android,RIM,Windows Phone] Production XR4830 Secure Network Access Policy = XAM BYOD Policy: Domain Admins [Windows,macOS,iOS,Android,RIM,Windows Phone] Production XR4830 Secure
The Network Access Configuration is configured as follows:
The Network Access Policy is configured as follows:
Network Access Policy maps the Network Access Configuration to a corresponding User/Host Profile also created when SSID Mappings are added. Connecting users that match the User/Host Profile are placed in the Access Group or VLAN in the Network Access Configuration. |
Endpoint Endpoint |
|
Endpoint Compliance Policies and Endpoint Compliance Configurations are created when a Device Onboarding SSID Mapping with a Supplicant Configuration is added on the Wireless Security View. Device Onboarding — An Endpoint Compliance Policy and Endpoint Compliance Configuration are created for each unique SSID, Directory Group, Host Operating System and Supplicant Configuration combination. Example: Endpoint Compliance Policy =XAM BYOD EPC Policy: AlansGroup [Windows,macOS,iOS,Android,Windows Phone] Isolation XR4830 Open Endpoint Compliance Configuration = XAM BYOD EPC Configuration: AlansGroup [Windows,macOS,iOS,Android,Windows Phone] Isolation XR4830 Open
The Endpoint Compliance Configuration is configured as follows:
The Endpoint Compliance Policy is configured as follows:
|
Supplicant EasyConnect Policy |
|
A Supplicant EasyConnect Policy is created when a Device Onboarding SSID Mapping with a Supplicant Configuration is added on the Wireless Security View view. Device Onboarding — A Supplicant EasyConnect Policy is created for each unique SSID, Directory Group, Host Operating System and Supplicant Configuration combination. Example: Supplicant EasyConnect Policy =XAM BYOD Supplicant Policy:AlansGroup [Windows,macOS,iOS,Android,Windows Phone] Isolation XR4830 Open Endpoint Compliance Configuration = XAM BYOD EPC Configuration: AlansGroup [Windows,macOS,iOS,Android,Windows Phone] Isolation XR4830 Open
The Supplicant EasyConnect Policy is configured as follows:
|
Portal Policy |
|
A Portal Policy is created if a portal other than the default portal is selected when adding an SSID Mapping on the Wireless Security View for either Guest Management or Device Onboarding. Portal Policy — A Portal Policy is created for each unique SSID, Directory Group, Host Operating System and Portal combination. Example: Portal Policy = XAM Portal Policy: -AlansGroup- [Windows,macOS,iOS,Android,RIM,Windows Phone] XAM-Access XirrusXMSOpen
|
Quarantine VLAN Switching |
Enable |
If a Guest Template or administrative profile limits network access by time, Quarantine VLAN Switching must be enabled. This allows FortiNAC to mark Guests and Admin Users as "At Risk" for the GuestNoAccess admin scan during the times they are not allowed to access the network. If Login Availability is set to Always for Guests and Administrative users, the Quarantine VLAN Switching option is not enabled. Access this setting under System > Settings > Control. |