Introduction to FortiNAC
Gain Visibility, Control, and Automated Response across your wired and wireless network using network access control.
Watch NowNetwork access control, or NAC, is a zero-trust network access solution that provides users with enhanced visibility into the Internet of Things (IoT) devices on their corporate networks.
This technology has been around for nearly two decades, but a new generation of its solutions is helping organizations keep up with today’s ever-expanding attack surface, delivering not only visibility of the network environment, but also enforcement and dynamic policy control. Whether devices are connecting from inside or outside the network, it can automatically respond to compromised devices or anomalous activity.
Modern solutions also provide a clear view into network assets to support regulatory certifications and security best practices that require organizations to establish and maintain an accurate inventory of all connected devices—even in virtual environments where assets are constantly connecting and disconnecting from the network. The monitoring and response capabilities are especially critical since many devices open users to additional risk via compromised, poorly written and un-patchable software, unadvertised back doors hardwired into firmware, and other factors.
NAC is an important part of a Zero Trust Network Access model for security, in which trust is no longer implicit for users, applications, or devices attempting to access the network, and for which IT teams can easily know who and what are accessing the network, as well as how to protect corporate assets both on and off the network.
NAC provides visibility over everything connected to the network, as well as the ability to control those devices and users, including dynamic, automated responses. It plays a role in strengthening overall network security infrastructure.
A properly functioning solution can deny access to noncompliant users or devices, place them in quarantine, or restrict access to a small number of network resources, separated from the rest of the network. NAC generally supports the following:
The adoption of IoT devices is growing exponentially, especially in high-risk markets such as healthcare and retail where even a few years ago there were far fewer network-connected devices. Converging with this trend is BYOD (Bring Your Own Device), which over more than a decade has brought an influx of new mobile devices connecting to corporate networks. Both create substantial new security risks and open new threat vectors, and unsecured devices dramatically increase the risk of intrusion, breach, and a catastrophic cyberattack. The right NAC solutions ensure compliance for all devices connecting to networks, checking that proper controls are in place before corporate network resources are accessible.
There are now billions of non-traditional compute, IP-enabled devices that are connecting to networks. (This means basically everything on the network that isn't a laptop or mobile phone, from IP cameras, to VoIP phones, printers, HVAC controls, temperature sensors, badge readers, digital displays, bluetooth sensors, and many more examples.)
The role of NAC in incident response is often significant. Solutions can be configured to automatically enforce security policies, share contextual information, and isolate unsecure devices from accessing other parts of a network.
Contractors, partner employees, and other guest workers need specialized access only to those parts of the corporate network that enable a good user experience and allow them to do their jobs. NAC plays a key role in maintaining access privileges while ensuring guest users have smooth connectivity and a good overall experience.
Healthcare is an industry rapidly embracing the Internet of Medical Things (IoMT) and now many new networked devices are coming online to support advances in medicine and medical care. But as more medical devices access the corporate network, it is critical to employ NAC solutions that can help protect devices and massive troves of sensitive personal data, including medical records. This can help improve healthcare security overall and keep medical facilities and other healthcare institutions safe from ransomware and other prevalent threats.
Regulatory compliance isn’t optional, and organizations can receive serious fines and create myriad other problems if access controls aren’t implemented or aren’t demonstrably effective. NAC solutions have long been thought of as risk mitigation technology—which they certainly are—but the right ones can also help enforce compliance controls under regulations such as HIPAA, SOX, or PCI-DSS, and ensure smooth compliance audits.
FortiNAC is the Fortinet network access control solution. It enhances the overall Fortinet Security Fabric with visibility, control, and automated response for everything that connects to the network. It provides protection against IoT threats, extends control to third-party devices, and orchestrates automatic responses to a wide range of networking events.
FortiNAC enables three key capabilities to secure IoT devices:
The FortiNAC solution protects both wireless and wired networks with a centralized architecture that enables distributed deployments with automated responsiveness.
FortiNAC is an ideal solution for any stage or maturity level of a security strategy. Using FortiNAC, organizations can:
Explore Models and Specs
Request the Product Demo.
Gain Visibility, Control, and Automated Response across your wired and wireless network using network access control.
Watch NowAgentless scanning
Detect and identify headless devices as they connect to the network
17 profiling methods
Utilize up to 17 different ways of determining the identity of a device
Simplified onboarding
Automate onboarding process for large number of endpoints, users, and guests
Micro-segmentation
With identified devices, FortiNAC can narrowly restrict network access for those devices to only necessary network assets
Extensive multi-vendor support
Interact with and configure network devices (switches, wireless access points, firewalls, clients) from more than 150 vendors
Scalability
FortiNAC architecture enables effective scaling to multi-site locations and supporting millions of devices
The FortiNAC product line includes hardware appliances, virtual machines and licenses. The licenses can run on either the hardware appliance or the virtual machine. Each FortiNAC deployment requires both a Control and Application server. Note that if your deployment is larger than what a single server can support, you can stack servers for more capacity. The FortiNAC solution has no upper limit on the number of concurrent ports it can support.
Function |
Control and Application Server |
Capacity |
Each server manages up to 2,000 ports in the network |
Function |
Control and Application Server |
Capacity |
Each server manages up to 15,000 ports in the network |
Function |
Control and Application Server |
Capacity |
Each server manages up to 25,000 ports in the network |
Function |
Management Server |
Capacity |
Unlimited |
Capacity |
See datasheet for details |
Capacity |
Unlimited |
Capacity |
n/a |
Functionality |
Endpoint Visibility and Auto Provisioning |
Device Count |
100, 1K, 10K, or 50K concurrent endpoint device per license |
Functionality |
Visibility and Control |
Device Count |
100, 1K, 10K, or 50K concurrent endpoint device per license |
Functionality |
Visibility, Control, and Response |
Device Count |
100, 1K, 10K, or 50K concurrent endpoint device per license |
★★★★★
“Fit Our Needs As A K-12 Organization That Wanted To Do BYOD Minus Issue With Registration”
Director of Media and Technology
Industry: Education
Role: CTO
Firm Size: <50M USD
“This solution fits our needs because it allows for network segmentation, filtering, and user management within the product. It also interoperates with our directory, our firewall, and our filtering solutions seamlessly."
★★★★★
“Implementation Was Smooth And Product Runs With Very Few Problems”
VP Networking
Industry: Finance
Role: Infrastructure and Operations
Firm Size:1B - 3B USD
“Our company has been using the FortiNAC product for around 6 years and it has been a good experience. We use it to manage around 13K devices across 3 data centers and 260+ locations.”
★★★★★
“Solid NAC Solution... Some Room To Improve Interface And Support”
Sr Director, Network Operations
Industry: Miscellaneous
Role: Infrastructure and Operations
Firm Size: <50M USD
“Once we got the hang of managing it, it's really been a god-send having visibility of all devices connected across our entire network.”
★★★★★
“Flexible Product, Vendor Agnostic, A Great Value In Device Registration On The Network”.
LAN Admin
Industry: Education
Role: Infrastructure and Operations
Firm Size: Gov't/PS/ED <5,000 Employees
“Flexible product, can get very detailed as to what you want to check/analyze/scan or can be setup very simplistic for on-boarding purposes. Is vendor agnostic on the hardware side and implementation was very smooth. We have been using this product for 11 years.”
★★★★★
“Seemless With No Customer Impact”
CIO - CISO
Industry: Healthcare
Role: CIO
"The product is easy to use and understand and the support team helped whenever asked. The protection of the network cannot happen without Port security and this product does that and gives you visibility."
★★★★★
“Solid Products, But Needs Persistent Agent For Chromebooks”
Network Administrator
Industry: Education
Role: System Integrator
Firm Size: Gov't/PS/ED <5,000 Employees
“The overall experience has been great.”
★★★★★
“Effective Tool That Works Well”
Lead Network Architect Engineer
Industry: Government
Role: Infrastructure and Operations
Firm Size: Gov't/PS/ED <5,000 Employees
“The Network Sentry - Network Access Control aka NAC, has been critical in the control of access to our environment. It has allowed us to keep those who don't belong out, it alerts on attempts, and allowed us to catch audit penetration attempts.”
The surge in deployment of IoT devices requires advanced network security. Specifically, network operators need to be able to identify every user and device that connects to the network and then grant or limit network access appropriately. Furthermore, the network needs constant supervision to ensure ongoing safe operation with automated responses to threats as they are detected. FortiNAC from Fortinet can provide those capabilities so that network operators can confidently know who and what is on their network. Come and see how FortiNAC can provide visibility, control, and response for your network.
FortiNAC has integrations with more than 150 vendors, enabling it to integrate with virtually every switch, wireless access point, and firewall in your network. The below companies are examples of Fortinet Fabric partners with integrations. For a complete list of vendors with integrations, please see the data sheet.
Cisco is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected.
Coupling CyberMDX detection and identification capabilities with Fortinet, healthcare organizations are equipped with unmatched IoMT & IoT asset visibility, classification and attack-prevention enforcement tools.
CyGlass is an AI based SaaS security platform that uses network data to uncover, pinpoint, and respond to advanced cyber threats that have evaded traditional security controls.
The Cynerio-Fortinet joint solution equips healthcare IT security teams with comprehensive security and remediation policies that ensure uninterrupted clinical services. Armed with detailed insights into medical device behavior, impact, and criticality, hospitals can enforce customized cybersecurity policy using ACLs, VLANs, NAC and firewalls.
Extreme Networks, Inc. delivers software-driven networking solutions that help IT departments everywhere deliver the ultimate business outcome: stronger connections with customers, partners, and employees.
Google Cloud Platform is a secure, dedicated public cloud computing service operated by Google which provides a range of infrastructure and application services that enable deployments in the cloud. Fortinet provides critical firewalling, advanced security and scalable BYOL protection for elastic compute, container, and machine-learning workloads in Google’s innovative public cloud.
Hewlett Packard Enterprise is an industry-leading technology company that enables customers to go further, faster. With the industry’s most comprehensive portfolio, HPE's technology and services help customers around the world make IT more efficient, more productive, and more secure.
Intel invents at the boundaries of technology to make amazing experiences possible for business and society, and for every person on Earth. To learn more about Intel and our technologies, please visit: www.intel.com
Jamf automates Apple device deployment, management and security without impacting the end-user experience or requiring IT to touch the device. Jamf preserves the native and consistent Apple experience that people expect at work, while fulfilling the security and compliance requirements of the enterprise.
McAfee is one of the world’s leading independent cybersecurity companies. Inspired by the power of working together, McAfee creates business and consumer solutions that make the world a safer place.
Together, Medigate and Fortinet deliver the deep clinical visibility and cybersecurity intelligence needed to accurately detect real-time threats in healthcare networks and automate effective policy enforcement to keep patient data and operations safe.
Microsoft is the leading platform and productivity company for the mobile-first, cloud-first world, and its mission is to empower every person and every organization on the planet to achieve more.
Nozomi Networks is a leading provider of real-time visibility, advanced monitoring capabilities, and strong security for industrial control networks supporting critical infrastructure. Nozomi has been deployed in some of the largest industrial installations, providing some of the fastest return-on–investment in the industry.
Nutanix makes infrastructure invisible, elevating IT to focus on the applications and services that power their business. The Nutanix enterprise cloud platform leverages web-scale engineering and consumer-grade design to natively converge compute, virtualization and storage into a resilient, software-defined solution that delivers any application at any scale.
Ordr delivers comprehensive proactive protection for the hyper-connected enterprise. The Ordr Systems Control Engine utilizes sophisticated machine learning and artificial intelligence to provide complete visibility and exhaustive control over every class of connected device and system.
RAD is a global Telecom Access solutions and products vendor, at the forefront of pioneering technologies. For critical infrastructure, our Service Assured Networking solutions include best-of-breed products for cyber-secure industrial IoT (IIoT) backhaul with edge/fog computing and seamless migration to modern packet-switched OT WANs.
Siemens is a global powerhouse focusing on the areas of electrification, automation and digitalization.
Symantec Corporation (NASDAQ:SYMC), the world’s leading cyber security company, helps organizations, governments and people secure their most important data wherever it lives. The partnership with Fortinet combines Symantec’s endpoint protection leadership with Fortinet’s best-in-class network security and Fabric integration to deliver unparalleled security protection.
Tenable®, Inc. is the Cyber Exposure company. Over 30,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform.
Together with Fortinet, Wavespot helps Enterprises derive meaningful and actionable insights from Fortinet security and WIFI products. The Wavespot suite, powered by Fortinet services, includes Visitors and IoT analytics, captive portal and marketing automation.
Branch have grown in complexity with more devices, including headless IoT devices, getting connected to the network-without a corresponding increase in staff. To maintain visibility, control, and responsiveness in Branch Offices, FortiNAC is part of the Fortinet's Secure SD-Branch Solution. Learn more here.
Below are answers to common questions regarding FortiNAC and related services:
How does FortiNAC identify a new device on the network?
FortiNAC uses the network characteristics of the device to classify the devices. There are up to 20 different attributes and techniques that FortiNAC can utilize such as Vendor OUI and DHCP fingerprinting, to profile a device.
Does FortiNAC analyze device behavior (EUBA) to identify a device?
No, FortiNAC does not perform behavior analysis but does collect network data about a device, utilizing up to 20 methods to profile a device.
Do I need a FortiNAC in every location?
No, FortiNAC’s architecture enables complete visibility even from remote locations. There are many organizations that deploy FortiNAC in a cloud such as Amazon Web Services (AWS) to provide NAC for their network.
What is the upper limit of how many devices FortiNAC can support?
There is no upper limit for how large a network can be. The FortiNAC servers can be stacked and managed as a group.
What form factor does FortiNAC come in?
The FortiNAC solution requires a server to run the Control and Application functions. Those can run in one server for smaller deployments while larger organizations might need several servers. Severs can be either hardware appliances or Virtual Machines (VMs). Licenses that run on the servers determine the level of functionality of the solution.
What are the most popular form factor?
The VM form factor is most commonly deployed.
Do you need a server at each location?
No, the architecture of FortiNAC means that you can centrally deploy and provide coverage for several sites. FortiNAC is not sniffing the traffic directly, so it does not need to be on the network. This greatly enhances FortiNAC’s ability to scale to multi-site locations.
What are the different license levels for FortiNAC?
FortiNAC offers three levels of capability:
Can you move from one license level to another? Or do you have to buy a whole new license?
Fortinet offers upgrade FortiNAC licenses so that if you want to move from Base to Plus, or Plus to Pro, you can simply buy the upgrade license.
Are the FortiNAC licenses incremental in their features? Do you need to buy Base if you buy Pro?
No, the FortiNAC licenses are all-inclusive so you only need to purchase the level that you want.
Are the FortiNAC licenses subscriptions?
FortiNAC licenses are offered in both perpetual and subscription forms.
Are the license measured by user?
No, the licenses are counted by active port or wireless device. For example, if you have 300 users in your network, but only 100 are active at any one time, you only need licenses for 100 active ports.
Are the FortiNAC licenses shared across locations?
Yes, when deployed with a Management Server, the FortiNAC licenses can be shared across the locations, as well as across stacked servers.
Does FortiNAC do end-user behavior analysis (EUBA)?
No, FortiNAC does not perform behavior analysis but does collect network data about a device, utilizing up to 20 methods to profile a device. When deployed with a FortiGate, ForitNAC can use the traffic sensing capabilities in the FortiGate to watch for anomalies in traffic patterns.
How does FortiNAC protect against MAC-spoofing if it does not do EUBA?
FortiNAC can protect against MAC-spoofing both on initial network access and after a MAC address has been granted permission. FortiNAC will look at 18 other factors to see if the device matches the appropriate profile for that MAC address and OUI. FortiNAC can quarantine a device with a suspicious profile for a network administrator to investigate and resolve.