Lab Guide
Lab Guide
Lab Guide
FFT-FortiNAC r3-1716496942
Table of contents
1. Introduction .................................................................................................................................. 3
1.1. Fast Track Overview .......................................................................................................... 4
1.2. Agenda ................................................................................................................................ 5
1.3. Topology .............................................................................................................................. 6
2. Visibility ......................................................................................................................................... 7
2.1. Modeling Network Infrastructure ................................................................................... 8
2.2. Configuring Polling .......................................................................................................... 11
2.3. Identifying Devices .......................................................................................................... 13
2.4. Leveraging Network Visibility Views ............................................................................ 18
3. Control ......................................................................................................................................... 20
3.1. Onboarding Guest Devices ............................................................................................. 21
3.2. Create Guest Template and User/Host Profile ............................................................ 22
3.3. Create Endpoint Compliance and Network Access Policy ......................................... 25
3.4. Enforcing Access Control ................................................................................................ 28
3.5. Request Access ................................................................................................................ 31
3.6. Verify Access Control ...................................................................................................... 33
3.1. Security Fabric & Tags .................................................................................................... 35
3.1.1. Creating Firewall Tags, FSSO Configuration, and Logical Networks ........................... 36
3.1.2. Integrating FortiNAC into Security Fabric, Configuring FSSO and Firewall Policy on
FortiGate ....................................................................................................................... 39
3.1.3. Registering a Contractor Device ................................................................................ 42
4. Response ..................................................................................................................................... 44
4.1. Creating Automated Responses for Rapid Threat Mitigation .................................. 45
4.2. Validating Security Events, Alarms and Actions ........................................................ 48
5. Conclusion ................................................................................................................................... 49
5.1. Continued Education ....................................................................................................... 50
Background
The proliferation of Internet of Things (IoT) devices, has made it necessary for organizations to improve their visibility into
what is attached to their networks. They need to know every device and every user accessing this expensive business tool.
IoT devices enable digital transformation initiatives and improve efficiency, flexibility, and optimization. However, they are
inherently untrustworthy, with designs that prioritize low cost over security. FortiNAC provides the network visibility to see
everything connected to the network, as well as the ability to control those devices and users, including dynamic, automated
responses.
Attend this technical training workshop to gain hands-on experience configuring FortiNAC to secure IoT devices within the
Fortinet Security Fabric.
Tasks
The blue button at the top of this page is the primary action button. When there is an action that can be completed on the
page, this button will change accordingly.
When ready, click the blue Continue button in the menu at the top of the page to get started.
The Fast Track program is a collection of free, instructor-led, hands-on workshops that introduce Fortinet solutions for
securing your digital infrastructure.
These workshops are only an introduction to what Fortinet security solutions can do for your organization.
For more in-depth training, we encourage you to investigate our full portfolio of NSE training courses at
https://training.fortinet.com.
Background
Workshops often include more hands-on activities than time permits, and not every exercise suits every opportunity. To
allow for customization, some exercises are optional, giving instructors the flexibility to exclude or rearrange the workshop
flow as needed. Average execution times are provided as an aid in planning and to help instructors ensure their Fast Track
session will stay within the available timeframe. Please take advice from your instructor if you have any questions.
Agenda
In the case of this workshop, the exercises are organized like this:
Tasks
Background
This diagram is a useful reference tool while working on the lab exercises. The following topology diagram shows the
starting layout for this workshop.
Topology
Tasks
This will be the last time we specifically state to click on the Continue button, from now on it is assumed the Continue
button will be used to move forward in the lab.
The proliferation of Internet of Things (IoT) devices, has made it necessary for organizations to improve their visibility into
what is attached to their networks.
They need to know every device and every user accessing their networks. FortiNAC can see every device and user when it
connects to the network, providing complete visibility to what is connecting and connected. This visibility includes not just
seeing an IP address but profiling the devices and identifying what type of device it is so that IT knows what is connecting to
the network.
In this lab objective, you create topology containers for modeling network infrastructure, configure layer 3 polling, and
device profiling rules to identify connected network devices.
Time to Complete
Estimated: 15 minutes
Background
In this exercise, you create a topology container to organize the infrastructure devices.
Then you model a FortiGate for enhanced endpoint visibility and future automated response integrations.
Tasks
1. From the Lab Activity: FortiNAC tab, access FortiNAC via the HTTPS option using the following credentials:
Username: admin Password: Fortinet1!
4. The Add Container dialog will appear. Use the following settings:
Name: Building 1
Note: Container for building 1 network switch
5. Click OK.
8. Click OK.
1. Locate the Building 1 container, right-click it, and click Add Device.
3. Click OK. The new device, called Building 1 Switch, appears within the container.
4. Expand the Building 1 branch and select the device. The Ports tab shows all physical ports discovered on the device as
well as the devices connected to each port.
Model FortiGate-Edge
1. Locate the Security Devices container, right-click, and click Add Device.
Model FortiGate-ISFW
1. Locate the Security Devices container, right-click, and click Add Device.
4. Expand FGT-ISFW
Note:FortiSwitch managed by FortiGate-ISFW should appear within the container.
Note: If you don’t see the FortiSwitch, please continue to the next lab objective. After a few minutes, FortiSwitch
would appear as FortiNAC polls the connected devices.
Question
Out of the following, which settings must be enabled on a switch to be successfully managed by FortiNAC? (Select all that
apply)
802.1x authentication
SMTP access
In this exercise, you configure the FortiNAC to gather layer 3 (IP Address) information from the FortiGate to enhance
endpoint visibility.
3. Right click FGT-EDGE and click Set Polling at the top of the screen.
4. Turn on the Enable Polling checkbox and use the following settings:
Interval: 5 Minutes
Priority: Low
5. Click OK.
6. Right click FGT-ISFW and click Set Polling at the top of the screen.
7. Turn on the Enable Polling checkbox and use the following settings:
Interval: 5 Minutes
Priority: Low
8. Click OK.
2. Right click FGT-ISFW and click Set Polling at the top of the screen.
3. Turn on the Enable Polling checkbox and use the following settings:
Interval: 5 Minutes
4. Click OK.
Question
How does FortiNAC gather host information from the network infrastructure? (Select all that apply)
L2 polling
L3 polling
Security triggers
Background
In this exercise, you configure FortiNAC to identify connected network devices using device profiling.
Tasks
Create a Device Profiling Rule for IP Phones
1. Click Users & Hosts > Device Profiling Rules. All existing rules should be disabled.
2. Click Add.
6. Select Vendor Code from the Field drop-down list. Set Value to 00:06:5B and click OK
7. Click Add.
8. Select Vendor Code from the Field drop-down. Set Value to 00:08:74 and click OK
9. Click OK
10. The new device profiling rule will appear in the rules list as the only enabled rule. Select the rule and use Set Rank to set
the rule rank to 1.
1. Click Add.
5. Select the Vendor Code from the Field drop-down list. Set Value to 00:10:8D and click OK
6. Click Add
7. Select Vendor Code from the Field drop-down. Set Value to 00:01:E6 and click OK
8. Click OK
9. Select the rule and use Set Rank to set the rule rank to 2
1. Click Add.
5. Select Vendor Code from the Field drop-down list. Set Value to 00:03:E3 and click OK
6. Click Add
7. Select Vendor Code from the Field drop-down. Set Value to 00:0D:56 and click OK
8. Click OK
9. Select the rule and use Set Rank to set the rule rank to 3.
1. Click Add.
6. Click OK.
7. Select the rule and use Set Rank to set the rule rank to 4
2. A dialog box appears asking if you are sure you want to evaluate all rogues. Click Yes.
3. The FortiNAC evaluates all rogues that currently exist in its database.
5. Click Update. Your FortiNAC has identified many of the devices on the network
Background
In this exercise, you utilize the host view to gather inventory information about network devices and export that information.
Tasks
6. In the Misc section, turn on Device Type, select Camera from the drop-down list, and click OK
7. From the Quick Search drop-down list, select the IP Cameras filter.
Note: Hosts view displays all the IP cameras.
8. Select one IP camera and click Show Adapters to see the Device Location, Physical Address, Connected Container,
Vendor Name, etc. information.
1. Change the filter and select the Quick Search filter from the drop-down list.
Question
Which view would you use to locate a host and gain access to detailed host information?
Topology view
Host view
Profiling view
Control of connecting and connected devices allows network administrators to enforce strict access policies.
An environment without efficient and timely control capabilities could be at the mercy of untrusted, potentially malicious
devices impacting productivity and straining IT resources. FortiNAC supplies comprehensive control at the point of
connection, both pre-connect and post-connect, blocking untrusted devices while granting precise access to trusted devices.
Once the devices are profiled, FortiNAC can segment the network to restrict device access to only those assets it needs to
reach.
This level of network segmentation protects against hacked IoT devices searching through the network and attacking
sensitive corporate data.
Time to Complete
Estimated: 35 minutes
Introduction
With network infrastructures changing via digital transformation (e.g., bring your own device [BYOD], Internet of Things
[IoT], and cloud) and targeted threats against endpoints growing more frequent and sophisticated, outdated access controls
are exposing enterprise networks to undue risk.
First-generation NAC products functioned to authenticate and authorize endpoints (primarily managed PCs) using simple
scan and block technology.
The evolution to second-generation NAC solutions addressed the emerging demand for managing guest access, such as
visitors, contractors, and business partners, to corporate networks.
FortiNAC offers a third-generation NAC solution that identifies, validates, and controls every wired, wireless, or VPN
connection before access is granted.
Tasks
1. From the web browser, access FortiNAC using the web console.
4. Click Add
6. Click the Data Fields tab, and set the following fields using the drop-down list:
First Name: Required
Last Name: Required
Email: Required
Person Visiting: Required
8. Click OK
5. Click Apply
8. Continue from Who/What Attributes to configure another Attribute, click + at the bottom.
5. From the Scan drop-down tab, Click the pencil icon beside OS-Anti-Virus-Check
7. Make sure the Category is set to Anti-Virus, and beside Validate, make sure Any is set from the drop-down list.
14. Under the Operating System Agent/Treatment section, make sure Windows is set to the Latest Dissolvable Agent
15. Click OK
17. For User/Host Profile, choose Self Registered Guest Users from the drop-down list.
18. Click OK
6. Click OK
9. From the User/Host Profile drop-down list, choose Self Registered Guest Users
10. Click OK
1. From the Lab Activity: FortiNAC tab, access FGT-ISFW via the HTTPS option using the following credentials
Username: admin Password: Fortinet1!
1. From the web browser, access FortiNAC using the web console.
6. Under the Logical Network Configuration section, click +Create New and use the following information:
Logical Network: Guest (Choose from the drop-down list)
VLAN ID: 195 (Choose from the drop-down list)
Note: Any guest device that successfully registers to the network will be assigned VLAN ID 195.
7. Click OK
10. Click OK
11. Click OK
3. Click Modify
5. Locate the FGT-ISFW and Click the checkmark box beside it to select all the ports.
6. Click the > arrow button to move the FGT-ISFW ports to the Selected Members list.
7. Click OK
8. In the System > Groups, locate and select Role Based Access group.
9. Click Modify
12. Click the > arrow button to move the FGT-ISFW ports to the Selected Members list.
13. Click OK
1. From the Lab Activity: FortiNAC tab, access Bob's machine via the RDP option using the following credentials
Username: bob Password: Fortinet1!
2. Open Network & Sharing Center > Guest > Properties > IPv4 > Properties >Obtain IPv4 Address
automatically > Obtain DNS server address automatically.
Note:Close the browser in case an automatic Chrome browser tab pops up. You will have to click the right mouse
button to see the "Open Network & Sharing Center"
5. Open Chrome browser from the Desktop and click CNN browser bookmark.
Note: Ignore the certificate warning. Click Advanced and proceed to the website. A captive portal should be presented by
FortiNAC
9. Click Login
10. Clicking login will start the FortiNAC Dissolvable Agent download. Allow the download to happen by clicking Keep the file.
1. Once the agent downloads, click and Open the FortiNAC Dissolvable Agent.exe
Note: Click Yes to allow the app to make changes.
2. In case, the error ‘Unable to obtain configuration from server’ error pops up, enter the server
address, http://192.168.200.10 and click Next
Note: Due to some limitations in the lab, this would occur. In the typical field deployment, this would be a seamless
experience with automatic configuration download from FortiNAC.
4. Click Register
Note: FortiNAC Dissolvable Agent will run a quick compliance check scan in the background to verify the running
operating system and antivirus software on the guest machine based on the Endpoint Compliance policy configured
earlier.
5. Click Finish
7. Once the Windows device has an IP address 172.16.195.100, open the web browser and try accessing the CNN browser
bookmark.
Note: The device should have Internet access now; this means the device has been successfully on-boarded to the
network.
8. From the web browser, access FortiNAC using the web console.
Introduction
Outdated endpoint access security solutions leave mobile and Internet of Things (IoT) devices vulnerable to targeted attacks
that can put the entire network at risk.
To protect valuable data, organizations need next-generation network access control (NAC).
As part of the Fortinet Security Fabric, FortiNAC provides comprehensive device visibility, enforces dynamic controls, and
orchestrates automated threat responses that reduce containment time from days to seconds. It enables policy-based
network segmentation for controlling access to sensitive information.
In this lab use case, you integrate FortiNAC into Security Fabric, create firewall tags and FSSO Security Fabric connector to
automatically associate tags to devices/hosts, and pass them to FortiGate to enforce firewall policies utilizing FSSO groups.
Background
In this exercise, you create a firewall tag, enable FSSO settings, and configure logical networks with the firewall tags.
Tasks
1. From the web browser, access FortiNAC using the web console.
6. Click OK.
6. Click OK.
8. Click OK.
6. In the Create Network Access Configuration window, set Name to Contractor Network.
10. Click OK
12. For User/Host Profile, choose Contractor from the drop-down list.
Note: The user/host profile Contractor was pre-configured.
6. Under Logical Network Configuration, click + Create New and use the following information:
Logical Network: Contractor
Network Access: Deny
Firewall Tags: Click + and enter Contractor-Tag
8. Click OK
Question
Out of the following, what enables FortiNAC to automatically pass device and host tags to FortiGate and enforce firewall
policies utilizing FSSO groups?
Background
In this exercise, you configure the following on a FortiGate: Security Fabric devices, FSSO fabric connector, FSSO groups, and
an FSSO user group firewall policy.
Tasks
1. From the Lab Activity: FortiNAC tab, access FortiNAC via the HTTPS option using the following credentials:
Username: admin Password: Fortinet1!
5. Click OK
1. From the Lab Activity: FortiNAC tab, access FGT-Edge via the HTTPS option using the following credentials:
Username: admin Password: Fortinet1!
3. Click FortiNAC
4. Click Authorize
7. Move the mouse cursor over the newly added FortiNAC device to take a look at the Type, IP Address, Hostname, and
Status
Note: The screenshot below might be different from the actual lab.
5. Click OK
1. Click User & Authentication > User Groups and click Create New.
3. Click OK.
3. Click Source, then click the User tab and select the Contractors user group.
5. Click OK.
Question
Which components of the FortiGate and FortiNAC can be used to configure dynamic policies based on FortiNAC profiling?
(Select all that apply)
Firewall tags
Firewall groups
Identity-based policies
FSSO
Background
You will now register the Windows (Alice) machine as a contractor device and verify the FSSO tag, and user group, pulled in
by FortiGate from FortiNAC, and assigned to the host.
Tasks
1. From the web browser, access FortiNAC using the web console.
3. In the search field, enter *93 and press Enter to display the Windows (Alice) client.
8. Click OK. The Host Role changes to Contractor and Status to Registered Host.
1. From the web browser, access FortiGate-Edge using the web console.
4. Click Show all FSSO Logons. If you do not see an FSSO logged-on user entry, click the Refresh icon. Verify the User
Name (MAC address) and the User Group.
1. From the Lab Activity: FortiNAC tab, access Alice's machine via the RDP option using the following credentials:
Username: alice Password: Fortinet1!
2. Open the web browser and try to visit Facebook using the browser bookmark, or visit any social media website.
3. The FortiGate blocks access to all social media and the browser displays a FortiGuard block page. On the block page, take
FortiNAC continuously watches the network and has extensive automation capabilities, so that when a triggering event is
observed, FortiNAC can take action in seconds.
For networks without automation, such triggers are often sent as alarms to the SOC, where a manual review is required
before action can be taken.
The delay before taking network action is minutes at best, and more frequently it is days or even months.
FortiNAC has extensive third-party support including vendors of firewalls, switches, wireless access points, authentication
servers, and endpoint security.
This extensive third-party support enables FortiNAC to restrict or quarantine devices that are behaving badly.
In this lab objective, you configure FortiGate integration allowing FortiNAC to automatically mark a host as at-risk.
Time to Complete
Estimated: 10 minutes
Background
In this exercise, you configure FortiGate integration allowing FortiNAC to receive input and automatically mark a host as at-
risk and generate notifications to administrators.
Tasks
1. From the web browser, access FortiNAC using the web console.
5. From the right of the Incoming Events, select Security Events. Select FortiOS5 in the drop-down menu
Note: You use FortiOS5 for devices running FortiOS 5.0 and later.
6. Click Save.
3. Click Add.
6. Set Name to FortiGate Security Risk Trigger. Leave the Time Limit set to 1 second and the Filter Match set
to All.
9. In the Custom Fields section, click Add and use the following information:
Name: SERVICE
Value: Security Risk
10. Click OK
17. Leave On Activity Failure set to Continue Running Activities and make sure the Perform Secondary Task(s) After
is turned off.
19. From the Activity drop-down list, select Send Alarm to External Log Hosts and click OK.
20. To add a second activity, click Add and select Disable Host from the drop-down list. Leave Secondary Task turned off
and click OK
21. Turn on Send Email when Rule is Matched. Use the Admin Group drop-down list and select All Management Group.
Question
To integrate FortiNAC with other security devices, the FortiNAC must model the other device in the topology view and have a
security rule.
What security rule component determines a rule match? (Select all that apply)
A security trigger
Tasks
2. Under Filter, set Event Date to show events generated in the Last 5 minutes. Click Update. The FortiNAC shows no
events.
3. From the Lab Activity: FortiNAC tab, access the Alice machine using the RDP option.
4. Open Google Chrome and click the Security Risk browser bookmark.
5. From the web browser, access FortiNAC using the web console.
6. Take a look at the security Events view. The FortiNAC now shows events.
7. Click Logs > Security Incidents > Alarms and click Update
8. Locate and select a security alarm that lists a date/time in the Action Taken Date column.
9. View the entry in the Events tab at the bottom and select the Actions Taken tab to validate that FortiNAC applied the
right action.
11. In the Search field, enter *93 (the last two of the MAC addresses noted in the security event) and press Enter. The host
record has an X through it in the Status column indicating the host is disabled.
Note: FortiNAC controls access at the point of connection. Since this particular lab objective is not using an actual real
switch, it is not possible to take action and remove the Windows client from the network. This is a limitation on the hosted
cloud environment of the lab and not of the product itself.
This concludes the Fast Track Workshop lab activity. We hope you found the information provided useful and the user
experience compelling.
2. Be able to configure and leverage network visibility, control, and response capabilities of FortiNAC in your environment.
Now that you've completed the Securely Embrace the IoT Revolution with NAC workshop, here are a few additional
resources and next steps.
For continued learning about the FortiNAC product utilized in this workshop, please consider looking at the following NSE
training courses:
Ask your instructor for more information about the following Fast Track workshops: