According to the FortiNAC documentation1, disabled hosts are placed in the dead end VLAN, which is a special VLAN that isolates them from the production network. This is done to prevent unauthorized or compromised hosts from accessing network resources or spreading malware. The dead end VLAN must be configured in the AP model or the SSID configuration, and the state must be enforced23. Disabled hosts can be enabled again by the administrator or by reauthenticating through the FortiNAC portal. References := 1: Enable or disable hosts | FortiNAC 9.4.0 - Fortinet Documentation 2: Technical Tip: Disabled wireless hosts not isolated - FortiNAC 3: Technical Tip: Disabled wired hosts not isolated - FortiNAC
Question 2
Which three core products are mandatory in the Fortinet ZTNA solution'' {Choose three.)
Options:
A.
FortiClient EMS
B.
FortiClient
C.
FortiToken
D.
FortiGate
E.
FortiAuthenticator
Answer:
A, B, D
Explanation:
Explanation:
Fortinet ZTNA solution is a zero-trust network access approach that provides secure and granular access to applications hosted anywhere, for users working from anywhere. The three core products that are mandatory in the Fortinet ZTNA solution are:
FortiClient EMS: This is the central management console that orchestrates the ZTNA policies and provides visibility and control over the endpoints and devices. It also integrates with FortiAuthenticator for identity verification and FortiAnalyzer for reporting and analytics.
FortiClient: This is the endpoint agent that supports ZTNA, VPN, endpoint protection, and vulnerability scanning. It establishes encrypted tunnels with the ZTNA proxy on the FortiGate and provides device posture and single sign-on (SSO) capabilities.
FortiGate: This is the next-generation firewall that acts as the ZTNA proxy and enforces the ZTNA policies based on user identity, device posture, and application context. It also provides security inspection and threat prevention for the ZTNA traffic.
References := Zero Trust Network Access (ZTNA) - Fortinet, Zero-Trust Network Access Solution | Fortinet, and Fortinet ZTNA | Fortinet Case Study.
Question 3
Which two types of configuration can you associate with a user/host profile on FortiNAC? (Choose two.)
Options:
A.
Service Connectors
B.
Network Access
C.
Inventory
D.
Endpoint compliance
Answer:
B, D
Explanation:
Explanation:
User/host profiles are used to map sets of hosts and users to different types of policies or rules on FortiNAC. Among the options given, network access and endpoint compliance are the two types of configuration that can be associated with a user/host profile. Network access configuration determines the VLAN, CLI configuration or VPN group that is assigned to a host or user based on their profile. Endpoint compliance configuration defines the policies that checkthe host or user for compliance status, such as antivirus, firewall, patch level, etc. Service connectors and inventory are not types of configuration, but features of FortiNAC that allow integration with other services and devices, and collection of host and user data, respectively. References := User/host profiles | FortiNAC 9.4.0 - Fortinet Documentation and User/host profiles | FortiNAC 9.4.0 - Fortinet Documentation