Fortinet Document Library

Version:

Version:

Version:


Table of Contents

Administration Guide

Download PDF
Copy Link

Forced registration group

This option allows you to place devices and ports into the Forced Registration group. Hosts connecting to ports in this group are forced to register if they have not already done so.

  1. Log into your administrator account.
  2. Click Network Devices > Topology.
  3. Right-click the Customer Icon and select Control Access.
  4. The Control Access screen opens with a list of all of the containers and devices. Click Expand All.
  5. In the Type field select the Registration system access group.
  6. From the Containers and Devices list, select the components for which you want to enforce access control. You can click Select All or select individual containers and devices. If you have already configured this group, removing devices here also removes them from the Forced Registration group.
  7. Click Next.
  8. A screen opens that describes what the Control Access function will do, and shows a list of all the selected containers and devices. Note that the view contains helpful general information above the list and in the Group Notes section below the list.
  9. The Known column indicates the number of connected hosts that are registered. The Unknown column indicates the number of rogues connected. Some rogues could be devices such as a gaming device or an IP Phone. Those devices are not capable of registering themselves. You may want to disable them or remove them from the network before placing ports in to Forced Registration. Use the Manage Hosts button to open the Host View and see your rogue hosts.
  10. Click Finish. In the confirmation screen, click OK.
  11. The Control Access Network Summary window displays showing you the access control status of the containers and devices you selected.

Forced registration group

This option allows you to place devices and ports into the Forced Registration group. Hosts connecting to ports in this group are forced to register if they have not already done so.

  1. Log into your administrator account.
  2. Click Network Devices > Topology.
  3. Right-click the Customer Icon and select Control Access.
  4. The Control Access screen opens with a list of all of the containers and devices. Click Expand All.
  5. In the Type field select the Registration system access group.
  6. From the Containers and Devices list, select the components for which you want to enforce access control. You can click Select All or select individual containers and devices. If you have already configured this group, removing devices here also removes them from the Forced Registration group.
  7. Click Next.
  8. A screen opens that describes what the Control Access function will do, and shows a list of all the selected containers and devices. Note that the view contains helpful general information above the list and in the Group Notes section below the list.
  9. The Known column indicates the number of connected hosts that are registered. The Unknown column indicates the number of rogues connected. Some rogues could be devices such as a gaming device or an IP Phone. Those devices are not capable of registering themselves. You may want to disable them or remove them from the network before placing ports in to Forced Registration. Use the Manage Hosts button to open the Host View and see your rogue hosts.
  10. Click Finish. In the confirmation screen, click OK.
  11. The Control Access Network Summary window displays showing you the access control status of the containers and devices you selected.