Sample configurations
The port- and host-based CLI configurations shown below are samples of different types of configurations that may help you develop your own.
Example 1: Port based configuration - port speed
The configuration shown below modifies the speed and duplex configuration of the port and then returns it to its normal state.
Commands |
CLI configuration |
---|---|
Set |
config t interface %port% speed 10 duplex half exit exit |
Undo |
config t interface %port% speed auto duplex auto exit exit |
Example 2: Host based CLI configuration - IP address
The configuration shown below modifies an IP address ACL on the device to switch access for the host’s IP address from the FortiNAC software DNS server to the production DNS server. When the host is restricted to the FortiNAC software DNS server, it is essentially in isolation and can be forced to register. When the host has access to the production DNS server, it can connect to the network and access the Internet.
Commands |
CLI configuration |
---|---|
Set |
|
Undo |
|
In the example above 192.168.34.2 is the production DNS server and 192.168.105.2 is the FortiNAC software DNS server. In the second line, Nac is the name of the ACL. ACL name is case sensitive. If the name is not correct, the ACL is not modified.
The ip access-list resequence Nac 10 1
command is important because it controls the sequence in which the host IP addresses are entered into the ACL. Starting with line 10, each IP address is added to the beginning of the list. Addresses already in the list are incremented by one.
If FortiNAC cannot determine the IP or any data substitution value of the host, the CLI will not be run. A CLI Substitution Failure Event is generated describing the data which could not be substituted.
Example 3: Host based CLI configuration - MAC address
The configuration shown below modifies a MAC filtering ACL on the device to deny access to a particular MAC address sent by FortiNAC.
Commands |
CLI configuration |
---|---|
Set |
|
Undo |
|
In the example above, Nac is the name of the ACL. ACL name is case sensitive. If the name is not correct, the ACL is not modified.
The mac access-list resequence Nac 10 1
command is important because it controls the sequence in which the host MAC addresses are entered into the ACL. Starting with line 10, each MAC address is added to the beginning of the list. Addresses already in the list are incremented by one.