Avoid unauthorised devices in your network.
Use Cases and Deployment Scope
We have implemented this protective layer of our network around 3 years ago and we are still so happy as our network now is fully protected from rogue or malicious devices as we believe there is no way how to avoid the FortiNAC system and connect unauthenticated devices to it. It was an easy to implement solution that required some architectural planning, however, it was a huge help from the manufacturer in the whole process of configuring the tool and needed connections to enable all the 811.1x functionality on top of other features.
Pros
- Protects network
- Provides reports
- Easy to configure and maintain
Cons
- Updates sometimes a bit buggy
Likelihood to Recommend
If you have a mid/large enterprise network and you need to comply with any of the IT security standards, FortiNAC will help you as it provides complete protection and will provide you needed reports, like logins, times, tries of unauthorized connections. All that can be passed to your existing siem or integrated with other forti products.
