Fortinet black logo
7.2.0

Step 5: Configure Logical Networks

Step 5: Configure Logical Networks

Logical Networks are created in order to represent a specific level of network access. See section Logical networks of the Administration Guide for an overview of how they work. See Configuring logical networks for instructions.

Step 6: Develop Policies for Network Access (Optional)

Create Network Access Policies for dynamically provisioning network access for registered hosts when they connect to the network. Network Access Policies are very helpful when the VLAN assigned for unrestricted access can change depending upon the type of device connecting. See section Network access in the Administration Guide for an overview of how they work.

  1. Build the components:

    Network Access Configuration: Assigns the appropriate network access value. See section Add or modify a configuration of the Administration Guide for details.

    User/Host Profile: Defines the criteria that will be used for hosts to match the policy. See section User/host profiles of the Administration Guide for more information.

  2. Create the Network Access policy using the User/Host Profile and Network Access Configuration. For details, see Add or modify a policy of the Administration Guide.

    Adjust ranking as appropriate. Starting with rank 1, user and host data is compared to each policy until a match is found.

Step 5: Configure Logical Networks

Logical Networks are created in order to represent a specific level of network access. See section Logical networks of the Administration Guide for an overview of how they work. See Configuring logical networks for instructions.

Step 6: Develop Policies for Network Access (Optional)

Create Network Access Policies for dynamically provisioning network access for registered hosts when they connect to the network. Network Access Policies are very helpful when the VLAN assigned for unrestricted access can change depending upon the type of device connecting. See section Network access in the Administration Guide for an overview of how they work.

  1. Build the components:

    Network Access Configuration: Assigns the appropriate network access value. See section Add or modify a configuration of the Administration Guide for details.

    User/Host Profile: Defines the criteria that will be used for hosts to match the policy. See section User/host profiles of the Administration Guide for more information.

  2. Create the Network Access policy using the User/Host Profile and Network Access Configuration. For details, see Add or modify a policy of the Administration Guide.

    Adjust ranking as appropriate. Starting with rank 1, user and host data is compared to each policy until a match is found.