Skip to content Skip to navigation Skip to footer

Network Access Control (NAC)

Security for networks with IoT

Free Product Demo
Network Access Control (NAC) banner background banner dots


What is Network Access Control (NAC)?

Network access control, or NAC, is a zero-trust access solution that provides users with enhanced visibility into the Internet of Things (IoT) devices on their enterprise networks. 

This NAC security technology has been around for nearly two decades, but a new generation of its tools is helping organizations meet today’s ever-expanding attack surface, delivering not only visibility of the network environment, but also enforcement and dynamic policy control.  Whether devices are connecting from inside or outside the network, it can automatically respond to compromised devices or anomalous activity.

Modern solutions also provide a clear view into network assets to support regulatory certifications and security best practices that require organizations to establish and maintain an accurate inventory of all connected devices—even in virtual environments where assets are constantly connecting and disconnecting from the network. The monitoring and response capabilities are especially critical since many devices open users to additional risk via compromised, poorly written and un-patchable software, unadvertised back doors hardwired into firmware, and other factors.

Network access control solutions are an important part of a Zero Trust Access model for security, in which trust is no longer implicit for users, applications, or devices attempting to access the network, and for which IT teams can easily know who and what are accessing the network, as well as how to protect corporate assets both on and off the network.

Introduction to FortiNAC

Gain Visibility, Control, and Automated Response across your wired and wireless network using network access control.

Watch Now

The FortiNAC product line includes hardware appliances, virtual machines and licenses.  The licenses can run on either the hardware appliance or the virtual machine.  Each FortiNAC deployment requires both a Control and Application server.  Note that if your deployment is larger than what a single server can support, you can stack servers for more capacity.  The FortiNAC solution has no upper limit on the number of concurrent ports it can support.


View by:

Control and Application Server
Each server manages up to 2,000 ports in the network
Control and Application Server
Each server manages up to 15,000 ports in the network
Control and Application Server
Each server manages up to 25,000 ports in the network
Management Server
FortiNAC Control and Application VM Server (VMware/ Hyper-V/AWS/Azure/KVM)
FortiNAC Manager VM Server (VMware or Hyper-V)
FortiNAC Base License
Functionality Endpoint Visibility and Auto Provisioning
Perputual Licenses (Concurrent endpoint devices per license)
10,000 LIC-FNAC-BASE-10K
50,000 LIC-FNAC-BASE-50K
Subscription Licenses
25 FC1-10-FNAC1-215-01-DD
500 FC2-10-FNAC1-215-01-DD
10,000 FC3-10-FNAC1-215-01-DD
FortiNAC Plus License
Functionality Visibility and Control
Perputual Licenses (Concurrent endpoint devices per license)
10,000 LIC-FNAC-PLUS-10K
50,000 LIC-FNAC-PLUS-50K
Subscription Licenses
25 FC1-10-FNAC1-213-01-DD
500 FC2-10-FNAC1-213-01-DD
10,000 FC3-10-FNAC1-213-01-DD
FortiNAC Pro License
Functionality Visibility, Control and Response
Perputual Licenses (Concurrent endpoint devices per license)
100 LIC-FNAC-PRO-100
10,000 LIC-FNAC-PRO-10K
50,000 LIC-FNAC-PRO-50K
Subscription Licenses
25 FC1-10-FNAC1-209-01-DD
500 FC2-10-FNAC1-209-01-DD
10,000 FC3-10-FNAC1-209-01-DD

Our Customers Emphasize the Value of FortiNAC in Gartner Peer Insights Reviews


“Fit Our Needs As A K-12 Organization That Wanted To Do BYOD Minus Issue With Registration”

Director of Media and Technology
Role: CTO
Firm Size: <50M USD

“This solution fits our needs because it allows for network segmentation, filtering, and user management within the product. It also interoperates with our directory, our firewall, and our filtering solutions seamlessly."

“Implementation Was Smooth And Product Runs With Very Few Problems”

VP Networking
Industry: Finance
Role: Infrastructure and Operations
Firm Size:1B - 3B USD

“Our company has been using the FortiNAC product for around 6 years and it has been a good experience. We use it to manage around 13K devices across 3 data centers and 260+ locations.”

“Solid NAC Solution... Some Room To Improve Interface And Support”

Sr Director, Network Operations
Industry: Miscellaneous
Role: Infrastructure and Operations
Firm Size: <50M USD

“Once we got the hang of managing it, it's really been a god-send having visibility of all devices connected across our entire network.”

“Flexible Product, Vendor Agnostic, A Great Value In Device Registration On The Network”.

LAN Admin
Industry: Education
Role: Infrastructure and Operations
Firm Size: Gov't/PS/ED <5,000 Employees

“Flexible product, can get very detailed as to what you want to check/analyze/scan or can be setup very simplistic for on-boarding purposes. Is vendor agnostic on the hardware side and implementation was very smooth. We have been using this product for 11 years.”

“Seemless With No Customer Impact”

Industry: Healthcare
Role: CIO

"The product is easy to use and understand and the support team helped whenever asked. The protection of the network cannot happen without Port security and this product does that and gives you visibility."

“Solid Products, But Needs Persistent Agent For Chromebooks”

Network Administrator
Industry: Education
Role: System Integrator
Firm Size: Gov't/PS/ED <5,000 Employees

“The overall experience has been great.”

“Effective Tool That Works Well”

Lead Network Architect Engineer
Industry: Government
Role: Infrastructure and Operations
Firm Size: Gov't/PS/ED <5,000 Employees

“The Network Sentry - Network Access Control aka NAC, has been critical in the control of access to our environment. It has allowed us to keep those who don't belong out, it alerts on attempts, and allowed us to catch audit penetration attempts.”


Gartner Peer Insights reviews constitute the subjective opinions of individual end users based on their own experiences, and do not represent the views of Gartner or its affiliates.


View by:

Related Links

FortiNAC Integrations Alliance Partners

FortiNAC has integrations with more than 150 vendors, enabling it to integrate with virtually every switch, wireless access point, and firewall in your network.  The below companies are examples of Fortinet Fabric partners with integrations.  For a complete list of vendors with integrations, please see the data sheet

The surge in deployment of IoT devices requires advanced network security. Specifically, network operators need to be able to identify every user and device that connects to the network and then grant or limit network access appropriately. Furthermore, the network needs constant supervision to ensure ongoing safe operation with automated responses to threats as they are detected.  FortiNAC from Fortinet can provide those capabilities so that network operators can confidently know who and what is on their network. Come and see how FortiNAC can provide visibility, control, and response for your network.

Demo Videos

Fortinet FortiNAC - Security Fabric Integration with FortiGate
Fortinet FortiNAC - Guest/BYOD/Contractor Onboarding
Fortinet FortiNAC - Automated Incident Response Demo
Fortinet FortiNAC - PLC Device Discovery, Identification, and Management
Catching Domain Machines in the Captive Portal
FortiNAC Demo

FortiNAC Use Cases

Branch have grown in complexity with more devices, including headless IoT devices, getting connected to the network-without a corresponding increase in staff. To maintain visibility, control, and responsiveness in Branch Offices, FortiNAC is part of the Fortinet's Secure SD-Branch Solution. Learn more here.

Fortinet sd-branch

FortiNAC Videos

Secure SD-Branch overview

Features and Benefits

Agentless scanning

Detect and identify headless devices as they connect to the network

17 profiling methods

Utilize up to 17 different ways of determining the identity of a device

Simplified onboarding

Automate onboarding process for large number of endpoints, users, and guests


With identified devices, FortiNAC can narrowly restrict network access for those devices to only necessary network assets

Extensive multi-vendor support

Interact with and configure network devices (switches, wireless access points, firewalls, clients) from more than 150 vendors


FortiNAC architecture enables effective scaling to multi-site locations and supporting millions of devices

How Network Access Control Secures Your Network

NAC network security provides visibility over everything connected to the network, as well as the ability to control those devices and users, including dynamic, automated responses. It plays a role in strengthening overall network security infrastructure.

A properly functioning solution can prevent access to noncompliant users or devices, place them in quarantine, or restrict access to a small number of network resources, separated from the rest of the network. A network access control policy generally supports the following:

  1. Authentication and authorization of users and devices
  2. User and device profiling
  3. Denial of unsecured devices
  4. Quarantine of unsecured devices
  5. Restricting access to unsecured devices
  6. Policy lifecycle management
  7. Overall security posture assessment
  8. Incident response through policy enforcement
  9. Guest networking access


Network Access Control Benefits and Use Cases

IoT and BYOD

The adoption of IoT devices is growing exponentially, especially in high-risk markets such as healthcare and retail where even a few years ago there were far fewer network-connected devices. Converging with this trend is BYOD (Bring Your Own Device), which over more than a decade has brought an influx of new mobile devices connecting to corporate networks. Both technologies create substantial new security risks and open new threat vectors, and unsecured devices dramatically increase the risk of intrusion, breach, and a catastrophic cyberattack. The right NAC solutions ensure compliance for all devices connecting to networks, checking that proper controls are in place before corporate network resources are accessible.

There are now billions of non-traditional compute, IP-enabled devices that are connecting to public networks. (This means basically everything on the network that isn't a laptop or mobile phone, from IP cameras, to VoIP phones, printers, HVAC controls, temperature sensors, badge readers, digital displays, bluetooth sensors, and many more examples.)

Incident Response

The role of NAC in incident response is often significant. Network access control solutions can be configured to automatically enforce security policies, share contextual information, and isolate unsecure devices from accessing other parts of a network.


Contractors, partner employees, and other guest workers need specialized access only to those parts of the corporate network that enable a good user experience and allow them to do their jobs. NAC plays a key role in maintaining access privileges while ensuring guest users have smooth connectivity and a good overall experience.


Healthcare is an industry rapidly embracing the Internet of Medical Things (IoMT) and now many new networked devices are coming online to support advances in medicine and medical care. But as more medical devices access the corporate network, it is critical to employ NAC computer solutions that can help protect devices and massive troves of sensitive personal data, including medical records. This can help improve healthcare security overall and keep medical facilities and other healthcare institutions free from ransomware and other prevalent threats.


Regulatory compliance isn’t optional, and organizations can receive serious fines and create myriad other problems if access controls aren’t implemented or aren’t demonstrably effective. NAC solutions have long been thought of as risk mitigation technology—which they certainly are—but the right ones can also help enforce compliance controls under regulations such as HIPAA, SOX, or PCI-DSS, and ensure smooth compliance audits.

FortiNAC: Network Access Security Solution

FortiNAC is the Fortinet network access control solution. NAC computer security enhances the overall Fortinet Security Fabric with visibility, control, and automated response for everything that connects to the network. It provides protection against IoT threats, extends control to third-party devices, and orchestrates automatic responses to a wide range of networking events.

FortiNAC enables three key capabilities to secure IoT devices:

  • Network visibility to see every device and user as they join the network
  • Network control to limit where devices can go on the network
  • Automated response to speed reaction time to events from days to seconds

The FortiNAC solution protects both wireless and wired networks with a centralized architecture that enables distributed deployments with automated responsiveness.

FortiNAC is an ideal solution for any stage or maturity level of a security strategy. Using FortiNAC, organizations can:

  • Deliver agent and agentless scanning of the network for discovery and classification of devices
  • Create an inventory of all devices on the network and assess the risk of every endpoint connected to the network
  • Use a centralized architecture for easy deployment and management
  • Leverage extensive support for third-party network devices to ensure overall effectiveness
  • Enforce dynamic access control
  • Prepare for incident response and reduce containment time to seconds, sometimes from as long as days or weeks
  • Integrate with SIEM solutions to provide detailed contextual data and reduce investigation time
  • Automate the onboarding and permissions process for large numbers of endpoint devices, users, and guests

Explore Models & Specs
Request the Product Demo.

FortiNAC News