Overview
Visibility, Zero Trust Access, and Incident Response for Connected Assets and Users FortiNAC™ continues to be a cutting-edge network access control solution, enabling organizations to enforce network access policies and assure adherence to security protocols in light of increasingly sophisticated threats. It provides a comprehensive snapshot of all devices and users on the network, facilitating granular control of access based on user roles, device types, network locations, and now the behavioral patterns of devices and users. The solution's capability now extends beyond automated onboarding of new endpoints; it incorporates real-time threat intelligence and continuous risk assessment of devices, leveraging machine learning and AI technologies from FortiGuard Services. Given the rising prominence of BYOD (Bring Your Own Device) and IoT (Internet of Things), FortiNAC's continuous monitoring and immediate remediation of non-compliant devices have become even more crucial. Moreover, FortiNAC's integration goes beyond third-party security solutions; it integrates with a wide range of cloud-based platforms and DevOps tools to ensure seamless and secure network operations in hybrid IT environments. FortiNAC leverages its integration with FortiAnalyzer to gain deep insight into network security posture, encompassing realtime visibility, predictive analytics, and more robust compliance reporting. With FortiNAC, organizations can more effectively secure their network against unauthorized access, potential threats, and increasingly, the insider threats, aligning with the emerging Zero Trust security model that emphasizes "never trust, always verify".
Highlights
- Granular Visibility Across the Network for Every Device and User, the FortiNAC leverages AI and machine learning from FortiGuard Security Services to provide detailed profiling of devices, including headless devices and IoT assets on your network. This profiling incorporates multiple information sources, behavior patterns, and real-time threat intelligence to accurately identify and assess what is on your network.
- Seamless Integration and Control Across Diverse Environments, with the power of micro-segmentation and Zero Trust policies, FortiNAC allows for configuration changes on switches and wireless products from an extended range of vendors. It amplifies the reach of the Security Fabric across multi-cloud, hybrid IT, and heterogeneous environments, implementing "never trust, always verify" principles.
- Automated Responsiveness, the FortiNAC reacts to network events in real-time to contain threats before they spread, utilizing a broad and customizable set of automation policies. Leveraging AI, these policies can instantly trigger configuration changes and remediation actions when targeted behavior or anomalies are observed, aligning with the Zero Trust model's dynamic and proactive approach.
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Financing for AWS Marketplace purchases
Pricing
Vendor refund policy
Please bring your own license
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
Support for Remote Group Mapping for Entra ID
Groups configured in Microsoft Entra ID are now available for policy matching and appear under Who/What > Groups when building User/Host Profiles. See Microsoft Entra ID Authentication Cookbook. MFA/SSO Access to FortiNAC Administrator Interface
Admin MFA (multi-factor authentication) enforces a second factor for administrator logins to the FortiNAC GUI. FortiNAC sends a token code by SMS or email that is required to complete login. See Multi-factor Authentication. Backup IP (Shared/Non-shared) for N+1 Failover Group
The Backup IP acts as the IP for both the primary and secondary servers upon failover. This removes the need to configure separate primary and secondary IPs on managed network devices integrated with FortiNAC for services such as SNMP traps, RADIUS, and Administration GUI access. See N+1 Failover Group and Load Balancing. Self-Registration Guest Login Option in the Authentication Portal Enhanced External Ethernet Adapter Management
Better control of external adapters (such as USB docking stations and Ethernet dongles) that are shared among users:
Identify external adapters that may be shared. Authenticate users connecting to an external adapter before granting network access. Provision network access based on criteria that include the external adapter connection.See Docking Station Management. Allowed Hosts Granular Control
Administrators can now control the maximum number of host records associated with a user at the user-group level. Previously, this was only available per user and globally. See Groups in the Administration Guide. The Host Inventory page is now a standalone URL accessible outside the registration process for host management. See Host inventory in the Administration Guide.Enhanced Network Device Management Security Options
Use Token for RESTful API Calls to FortiGate: For FortiGate integrations where "admin-restrict-local" is configured (enforces authentication via TACACS+ server whenever it is reachable). This reduces the number of logs generated by FortiNAC logins to FortiGate over SSH. SSH Public Key Authentication: New SSH Key Management page for generating keys. See SSH Key Management in the Administration Guide. New Credentials tab options to configure SSH keys and extract the public key selected. See Credentials in the Administration Guide.SSID Description Column in SSID Inventory View
A new Description column has been added next to the SSID name, allowing administrators to enter or edit descriptive text for each SSID. captive.apple.com Allowed DNS Configuration Exception
Improved user experience when using captive portal authentication with macOS devices. See Apple CNA Instructions Portal in the Administration Guide. GUI Option and API Parameter for OCSP Soft-fail Flag
Adds resilience when OCSP lookups fail due to high demand on the OCSP server. Applies to certificate-based RADIUS authentication with OCSP enabled. See Configure Local Server in the Administration Guide. FortiNAC VDOM Multi-Tenancy
FortiNAC now supports VDOM multi-tenancy for integrations where FortiGate provides shared infrastructure from FortiSwitch and FortiAP managed in the MGMT VDOM. The MGMT VDOM is the highest security zone and can share FortiSwitch ports/VLANs and FortiAP SSIDs to tenant VDOMs. See FortiGate Multitenancy Integration Guide Import PKCS#12 Certificates via FortiNAC GUI
Upload PKCS#12 certificates from the Certificate Management page. Support for FortiNAC Deployment in Alibaba Cloud
FortiNAC now supports deployment on Alibaba Cloud
See the Alibaba Reference Cloud Manual. LDAP Group Search Screen Enhancements
Improved LDAP Group/OU search with a search bar to filter LDAP groups/OUs. FortiNAC Captive Portal over NATted Infrastructure with FortiGate
Addresses challenges registering endpoints behind NAT via captive portal. Uses FortiGate's External Captive Portal to redirect endpoint requests to FortiNAC, including IP and MAC, to form a unique session identifier during portal interaction for registration.
See the Captive Portal over NATted Infrastructure Reference Manual. Display Actual Demo License Expiration Date
FortiNAC 7.6.5 adds a 3-day grace period for ITF license expiration. Support for ECC Certificates in FortiNAC
Supports certificates using Elliptic Curve Cryptography (ECC), providing strong security with smaller key sizes. Support FortiFlex VM
In FortiNAC 7.6.5, FortiFlex provides cloud-based license entitlement for NACOS VMs, enabling purchase, activation, and subscription management through FortiFlex. This streamlines activation, entitlement management, and resource monitoring via a point-based system.
See the FortiFlex VM Reference Manual. Support User Authentication Flows in Client Certificate Attribute Option
Allows selection of attribute ranking when FortiNAC obtains user information from a certificate. The first matched attribute is used for host registration. Whitespace is now accepted in certificate common names and usernames. Allow Configuring FortiADC IP Address via CLI
In addition to built-in Backup IPs, N+1 Failover Groups now support adding a FortiADC as a server health monitor and virtual IP manager.
Note: Backup IPs and FortiADC are not meant to be used together.
See the CLI Reference Manual.
See Key Configuration on FortiNAC in the N+1 Failover Group and Load Balancing Reference Manual. Enhancements to VLAN Switch Acknowledgment for Persistent Agent.
See Persistent Agent Properties in the Administration Guide.
VLAN Switch Acknowledgment will only popup if the user is switching out of remediation. When VLAN Switch Acknowledgment is enabled, if a user cancels the acknowledgment or if the acknowledgment times out, the VLAN switch will no longer proceed if switching from remediation. A new Event-to-Alarm Mapping for "User Canceled VLAN Switch" has been added. This ensures users are prompted for VLAN switch acknowledgment again after canceling it the first time. See Events and alarms list in the Administration Guide.Integrations Support for ServiceNow CMDB Integration as MDM
The ServiceNow CMDB MDM service connector lets administrators integrate hosts stored in a ServiceNow CMDB table with those in the FortiNAC database, leveraging FortiNAC's discovery and policy enforcement for endpoints managed by MDM services.
See ServiceNOW CMDB in the MDM Reference Manual. Support for ServiceNow ITSM Integration as a Log Receiver
FortiNAC integrates with ServiceNow IT Service Management (ITSM) to automatically create ServiceNow incidents from FortiNAC alarms generated by Event > Alarm mappings.
Additional details
Usage instructions
After deploying the instance, click on Manage in AWS Console to see the running instance and public DNS address to continue the configuration of the FortiNAC. Connect to the secured Web UI via the public DNS address: https://<public DNS address>:8443. For any CLI configuration/settings, SSH is required to log into the CLI. Default login credentials are with a username of admin and empty password. You can reference the FortiNAC-VM AWS admin guide is located at: https://docs.fortinet.com/document/fortinac-f/7.6.0/aws-deployment-guide/351237/overview#_Toc178942360Â
Support
Vendor support
This is a Bring Your Own License model, before to request your instance please make sure you have the FortiNAC licensing order processed by Fortinet sales. When you have the registration steps completed, you'll receive a timely response to any technical issues as well as complete visibility on the ticket resolution progress. FortiCare Support Services include firmware upgrades, Support portal access, and associated technical resources. FortiGuard Security Services include up-to-the minute threat intelligence delivered in real time to stop the latest threats.
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products
Customer reviews
Must Have Tool for All size of Companies
A Robust Solution for Enhanced Network Security and Access Control
Streamlining Network Security
FortiNAC is the good choice. As it can handle a large number of devices and diverse network environments. Also, helps in identifying and responding to threats in real-time.