FortiNAC: Network Access Control

Security for networks with IoT

web product icon fortinac

FortiNAC Overview

The proliferation of Internet of Things (IoT) devices, has made it necessary for organizations to improve their visibility into what is attached to their networks. They need to know every device and every user accessing their networks. IoT devices enable digital transformation initiatives and improve efficiency, flexibility, and optimization. However, they are inherently untrustworthy, with designs that prioritize low-cost over security. FortiNAC provides the network visibility to see everything connected to the network, as well as the ability to control those devices and users, including dynamic, automated responses.


FortiNAC News


FortiNAC Product Details:

The IoT revolution has raised a new challenge for network owners. How can you see and protect against a myriad of devices showing up on the network? Network Access Control has come back to the forefront of security solutions to address that challenge. This technology was deployed to assist with bring-your-own-device (BYOD) policies and is now getting renewed focus as a means to safely accommodate headless IoT devices in the network. FortiNAC enables three key capabilities to secure IoT devices:

  • Network visibility to see every device and user as they join the network
  • Network control to limit where devices can go on the network
  • Automated response to speed the reaction time to events from days to seconds

Collectively, these three capabilities provide the tools that network owners need to secure a world that is embracing IoT. The FortNAC solution protects both wireless and wired networks with a centralized architecture that enables distributed deployments with automated responsiveness.      


FortiNAC Product Details:

Introduction to FortiNAC

Gain Visibility, Control, and Automated Response across your wired and wireless network using network access control.

Watch Now


monitoring icon

Agentless scanning

Detect and identify headless devices as they connect to the network

analytics icon

17 profiling methods

Utilize up to 17 different ways of determining the identity of a device

icon benefits management

Simplified onboarding

Automate onboarding process for large number of endpoints, users, and guests


segmentation icon


With identified devices, FortiNAC can narrowly restrict network access for those devices to only necessary network assets

platform support icon

Extensive multi-vendor support

Interact with and configure network devices (switches, wireless access points, firewalls, clients) from more than 150 vendors



FortiNAC architecture enables effective scaling to multi-site locations and supporting millions of devices

Building a Cybersecurity Workforce

Advanced training for security professionals, technical training for IT professionals, and awareness training for teleworkers.

Learn More

FortiNAC Models and Specifications

The FortiNAC product line includes hardware appliances, virtual machines and licenses.  The licenses can run on either the hardware appliance or the virtual machine.  Each FortiNAC deployment requires both a Control and Application server.  Note that if your deployment is larger than what a single server can support, you can stack servers for more capacity.  The FortiNAC solution has no upper limit on the number of concurrent ports it can support.

Control and Application Server
Each server manages up to 2,000 ports in the network
Control and Application Server
Each server manages up to 15,000 ports in the network
Control and Application Server
Each server manages up to 25,000 ports in the network
Management Server
See datasheet for details
Endpoint Visibility and Auto Provisioning
Device Count
100, 1K, 10K, or 50K concurrent endpoint device per license
Visibility and Control
Device Count
100, 1K, 10K, or 50K concurrent endpoint device per license
Visibility, Control, and Response
Device Count
100, 1K, 10K, or 50K concurrent endpoint device per license

Our Customers Emphasize the Value of FortiNAC in Gartner Peer Insights Reviews


“Fit Our Needs As A K-12 Organization That Wanted To Do BYOD Minus Issue With Registration”

Director of Media and Technology
Role: CTO
Firm Size: <50M USD

“This solution fits our needs because it allows for network segmentation, filtering, and user management within the product. It also interoperates with our directory, our firewall, and our filtering solutions seamlessly."

“Implementation Was Smooth And Product Runs With Very Few Problems”

VP Networking
Industry: Finance
Role: Infrastructure and Operations
Firm Size:1B - 3B USD

“Our company has been using the FortiNAC product for around 6 years and it has been a good experience. We use it to manage around 13K devices across 3 data centers and 260+ locations.”

“Solid NAC Solution... Some Room To Improve Interface And Support”

Sr Director, Network Operations
Industry: Miscellaneous
Role: Infrastructure and Operations
Firm Size: <50M USD

“Once we got the hang of managing it, it's really been a god-send having visibility of all devices connected across our entire network.”

“Flexible Product, Vendor Agnostic, A Great Value In Device Registration On The Network”.

LAN Admin
Industry: Education
Role: Infrastructure and Operations
Firm Size: Gov't/PS/ED <5,000 Employees

“Flexible product, can get very detailed as to what you want to check/analyze/scan or can be setup very simplistic for on-boarding purposes. Is vendor agnostic on the hardware side and implementation was very smooth. We have been using this product for 11 years.”

“Seemless With No Customer Impact”

Industry: Healthcare
Role: CIO

"The product is easy to use and understand and the support team helped whenever asked. The protection of the network cannot happen without Port security and this product does that and gives you visibility."

“Solid Products, But Needs Persistent Agent For Chromebooks”

Network Administrator
Industry: Education
Role: System Integrator
Firm Size: Gov't/PS/ED <5,000 Employees

“The overall experience has been great.”

“Effective Tool That Works Well”

Lead Network Architect Engineer
Industry: Government
Role: Infrastructure and Operations
Firm Size: Gov't/PS/ED <5,000 Employees

“The Network Sentry - Network Access Control aka NAC, has been critical in the control of access to our environment. It has allowed us to keep those who don't belong out, it alerts on attempts, and allowed us to catch audit penetration attempts.”

Gartner Peer Insights reviews constitute the subjective opinions of individual end users based on their own experiences, and do not represent the views of Gartner or its affiliates.


Fuse Community

Product Demo

The surge in deployment of IoT devices requires advanced network security. Specifically, network operators need to be able to identify every user and device that connects to the network and then grant or limit network access appropriately. Furthermore, the network needs constant supervision to ensure ongoing safe operation with automated responses to threats as they are detected.  FortiNAC from Fortinet can provide those capabilities so that network operators can confidently know who and what is on their network. Come and see how FortiNAC can provide visibility, control, and response for your network.

Demo Videos

Fortinet FortiNAC - Security Fabric Integration with FortiGate
Fortinet FortiNAC - Guest/BYOD/Contractor Onboarding
Fortinet FortiNAC - Automated Incident Response Demo
Fortinet FortiNAC - PLC Device Discovery, Identification, and Management
Catching Domain Machines in the Captive Portal
FortiNAC Demo

FortiNAC Integrations Alliance Partners

FortiNAC has integrations with more than 150 vendors, enabling it to integrate with virtually every switch, wireless access point, and firewall in your network.  The below companies are examples of Fortinet Fabric partners with integrations.  For a complete list of vendors with integrations, please see the data sheet

FortiNAC Use Cases

Branch have grown in complexity with more devices, including headless IoT devices, getting connected to the network-without a corresponding increase in staff. To maintain visibility, control, and responsiveness in Branch Offices, FortiNAC is part of the Fortinet's Secure SD-Branch Solution. Learn more here.

Fortinet sd-branch

FortiNAC Videos

Secure SD-Branch overview


Below are answers to common questions regarding FortiNAC and related services:

How does FortiNAC identify a new device on the network?
FortiNAC uses the network characteristics of the device to classify the devices. There are up to 20 different attributes and techniques that FortiNAC can utilize such as Vendor OUI and DHCP fingerprinting, to profile a device.

Does FortiNAC analyze device behavior (EUBA) to identify a device?
No, FortiNAC does not perform behavior analysis but does collect network data about a device, utilizing up to 20 methods to profile a device.

Do I need a FortiNAC in every location?
No, FortiNAC’s architecture enables complete visibility even from remote locations. There are many organizations that deploy FortiNAC in a cloud such as Amazon Web Services (AWS) to provide NAC for their network.

What is the upper limit of how many devices FortiNAC can support?
There is no upper limit for how large a network can be. The FortiNAC servers can be stacked and managed as a group.

What form factor does FortiNAC come in?
The FortiNAC solution requires a server to run the Control and Application functions. Those can run in one server for smaller deployments while larger organizations might need several servers. Severs can be either hardware appliances or Virtual Machines (VMs). Licenses that run on the servers determine the level of functionality of the solution.

What are the most popular form factor?
The VM form factor is most commonly deployed.

Do you need a server at each location?
No, the architecture of FortiNAC means that you can centrally deploy and provide coverage for several sites. FortiNAC is not sniffing the traffic directly, so it does not need to be on the network. This greatly enhances FortiNAC’s ability to scale to multi-site locations.

What are the different license levels for FortiNAC?
FortiNAC offers three levels of capability:

  • Base - offering visibility and network lockdown (does not permit new devices to join without permission)
  • Plus - offering the Base capabilities and adds user identification and segmentation.
  • Pro - offering the Plus capabilities and add automatic response

Can you move from one license level to another?  Or do you have to buy a whole new license?
Fortinet offers upgrade FortiNAC licenses so that if you want to move from Base to Plus, or Plus to Pro, you can simply buy the upgrade license.

Are the FortiNAC licenses incremental in their features?  Do you need to buy Base if you buy Pro?
No, the FortiNAC licenses are all-inclusive so you only need to purchase the level that you want.

Are the FortiNAC licenses subscriptions?
FortiNAC licenses are offered in both perpetual and subscription forms.

Are the license measured by user?
No, the licenses are counted by active port or wireless device. For example, if you have 300 users in your network, but only 100 are active at any one time, you only need licenses for 100 active ports.

Are the FortiNAC licenses shared across locations?
Yes, when deployed with a Management Server, the FortiNAC licenses can be shared across the locations, as well as across stacked servers.

Does FortiNAC do end-user behavior analysis (EUBA)?
No, FortiNAC does not perform behavior analysis but does collect network data about a device, utilizing up to 20 methods to profile a device. When deployed with a FortiGate, ForitNAC can use the traffic sensing capabilities in the FortiGate to watch for anomalies in traffic patterns.

How does FortiNAC protect against MAC-spoofing if it does not do EUBA?
FortiNAC can protect against MAC-spoofing both on initial network access and after a MAC address has been granted permission. FortiNAC will look at 18 other factors to see if the device matches the appropriate profile for that MAC address and OUI. FortiNAC can quarantine a device with a suspicious profile for a network administrator to investigate and resolve.