Where do you look to determine when and why the FortiNAC made an automated network access change?
What would occur if both an unknown (rogue) device and a known (trusted) device simultaneously appeared on a port that is a member of the Forced Registration port group?
In an isolation VLAN. which three services does FortiNAC supply? (Choose three.)
What capability do logical networks provide?
NTM also includes reporting utilities such as network and inventory reports. You can generate reports for subnets, switch ports, and VLANs.
In a wireless integration, how does FortiNAC obtain connecting MAC address information?
Intelligent Access Points (IAPs) and controllers support two methods of RADIUS based authentication: RADIUS MAC authentication and 802.1x authentication.