Fortinet black logo
9.4.0

What it Does

What it Does

FortiNAC controls access to the remote user’s device connecting over the VPN. In order for the device to be able to gain access the network, FortiNAC must know about the connecting device and verify the device is in good standing.

  1. When a user connects to the VPN tunnel, the device is restricted.

  2. FortiNAC identifies the device as known and trusted.

  3. FSSO tags are sent to the FortiGate so the correct policy is matched and device is unrestricted.

  4. If configured for endpoint compliance, the device’s security posture is evaluated. Network access is restricted upon failure.

For more details on this process, see How it works in the Appendix.

What it Does

FortiNAC controls access to the remote user’s device connecting over the VPN. In order for the device to be able to gain access the network, FortiNAC must know about the connecting device and verify the device is in good standing.

  1. When a user connects to the VPN tunnel, the device is restricted.

  2. FortiNAC identifies the device as known and trusted.

  3. FSSO tags are sent to the FortiGate so the correct policy is matched and device is unrestricted.

  4. If configured for endpoint compliance, the device’s security posture is evaluated. Network access is restricted upon failure.

For more details on this process, see How it works in the Appendix.