FortiNAC Deployment Prerequisite Task List
FortiNAC Deployment Prerequisite Task List
FortiNAC Deployment Prerequisite Task List
Deployment
Prerequisite Task List
Date: July 17, 2020
Rev: M
1
FORTINET DOCUMENT LIBRARY
http://docs.fortinet.com
FORTINET BLOG
http://blog.fortinet.com
FORTINET COOKBOOK
http://cookbook.fortinet.com
NSE INSTITUTE
http://training.fortinet.com
FORTIGUARD CENTER
http://fortiguard.com
FORTICAST
http://forticast.fortinet.com
2
Contents
Overview ............................................................................................................................................... 4
FNAC Part Numbers ......................................................................................................................... 4
License Keys ...................................................................................................................................... 4
FortiNAC Appliance Deployment Configurations ............................................................................ 5
License Distribution in Multiple Appliance Deployments ............................................................... 6
Prerequisite Task List .......................................................................................................................... 8
Open Ports........................................................................................................................................... 14
Appliance Password Requirements .................................................................................................... 16
SSL Certificates .................................................................................................................................. 17
Determine FortiNAC Service Configuration (Network Type) ........................................................... 18
FortiNAC Service Network VLANs .................................................................................................... 20
Prerequisite Checklist (Printable Version) ........................................................................................ 23
3
Overview
FNAC Part Numbers
Virtual Appliance (VM) Part Numbers
Part Number Description
FNC-M-VM Control Manager
FNC-CA-VM Control and Application Server (CA)
License Keys
Once all product is registered, license key(s) will be generated during the initial
configuration. FortiNAC appliances will not start without a valid key installed. The type of
license key generated and applied to the appliance(s) will depend upon the deployment
configuration and the appliance roll within it. There are two different types of license keys:
Endpoint License Key
o Defines the type of license (Base, Plus or Pro) and endpoint quantity
o Defines the type of appliance (Manager or CA)
o Installed on the appliance that is associated with license support (the “managing”
server)
4
FortiNAC Appliance Deployment Configurations
Below is a general listing of components involved in product registration and configuration. The
number of license keys, licenses and support contracts is determined by the type of deployment and
number of appliances.
A license “pool” is defined by license type (Base, Plus or Pro) and quantity of endpoint licenses
shared among multiple appliances. See License Distribution in the Appendix for details on how
licenses are shared.
Standalone
o 1 CA, 1 support contract and 1 license
o 1 endpoint license key
Distributed
o 1 Manager, Multiple CA’s, multiple support contracts (1 per CA and
Manager) and 1 license pool
o 1 endpoint license key (for Manager) and multiple appliance license keys (1
per CA)
5
License Distribution in Multiple Appliance Deployments
This section describes how a license pool’s license type and endpoint quantity are shared among
appliances in a multiple appliance deployment.
Distributed
Endpoint License Key is installed on the Manager. CA’s are updated by the Manager as
they are added to the Server List in the Dashboard panel.
Manager removes license and endpoint quantity from CA’s as they are removed from the
Server List.
Manager
(Endpoint License • Base, Plus or Pro
Key) License
• X Concurrent Endpoint
Licenses
CA CA CA
(Appliance (Base) (Appliance (Base) (Appliance (Base)
License Key) License Key) License Key)
6
Distributed in High Availability
Endpoint License Key is installed on the Manager. CA’s not in HA pair and Primary
Servers are updated as they are added to the Server List in the Dashboard panel.
Manager updates Secondary Servers once a failover is executed after the
corresponding Primary Server has been added.
Manager removes license and endpoint quantity from CA’s not in HA pair and Primary
Servers as they are removed from the Server List.
7
Prerequisite Task List
Click here for a printable version of the checklist.
8
Step Pre-requisite Resource
DNS Records: Add host(s) name entries for the
System Settings Server Team
FortiNAC appliances into production DNS system(s).
SSL certificates
Have a resource available that can issue Internally
signed certificates and/or request publically signed
certificates.
Admin UI
o Corporate Internal Certificate Authority
(recommended)
Individual
SAN
o 3rd Party Public Certificate Authority
Individual
SAN
Wildcard
Local RADIUS Server (EAP)
o Corporate Internal Certificate Authority
(recommended)
Individual
SAN
o 3rd Party Public Certificate Authority
Individual
SAN
Wildcard
Agent
o Corporate Internal Certificate Authority
System Settings Server Team
(recommended)
Individual
SAN
o 3rd Party Public Certificate Authority
Individual
SAN
Wildcard
Portal
o 3rd Party Public Certificate Authority
Individual
SAN
Wildcard
RADIUS Endpoint Trust (EAP-TLS)
o Corporate Internal Certificate Authority
(recommended)
Individual
SAN
o 3rd Party Public Certificate Authority
Individual
SAN
Wildcard
9
Step Pre-requisite Resource
Authentication Directory Account and Details
Provide the following for Directory Authentication
integration
Identify IP, MAC Address and Hostname of
Directory server(s)
LDAP/Active Directory service account
System Settings (account must have read access to all Server Team
requested search branches)
Provide specific User search branch(es)
Provide specific Group search branch(es) (if
needed)
Identify any non-standard directory attributes
used
Email Account and Details
Provide the following to enable FortiNAC to send email
notifications.
Email Server
Email address for FortiNAC (may want to
configure an alias for this address to better
System Settings Server Team
identify sender as FortiNAC)
Username and password if authentication is
desired
Port used on email server.
Encryption used on email server for email
communication (if any).
Remote Backup Server
System Settings Provide an FTP or SSH remote server for FortiNAC Server Team
database and system configuration backup.
SNMP Credentials
Create if one does not already exist:
10
Step Pre-requisite Resource
CLI Credentials
Create if one does not already exist:
Note:
• Fingerprint collection is not required in order to
Endpoint achieve visibility, but does provide additional
Network Team
Classification information.
• FortiNAC updates or creates a Host record when it
hears a DHCP packet (discover, request or inform) that
provides OS and/or hostname. It does not matter if the
host is offline or online.
• Not all DHCP fingerprints provide hostname and
FortiNAC is not always able to determine OS for all
DHCP packets. The device’s DHCP fingerprint may be
unknown or too similar to other devices to name an
OS.
11
Step Pre-requisite Resource
SNMP Traps
The following must be done on all wired network
devices FortiNAC will control:
or alternatively
12
Step Pre-requisite Resource
Production Network Access (available with Plus and
Pro licensing)
Wireless Integrations
13
Open Ports
The number of open (listening) TCP/UDP ports configured by default on the FortiNAC
appliance is based on current best practices. These ports are kept to a minimum to provide
maximum security by explicitly restricting unnecessary access from the outside. The best
practice is to keep the number of open ports to a minimum, and block all other ports. If there is
a need to provide users access to network resources through a static port (e.g., from outside a
firewall), the best option is to allow users to connect by VPN.
Related Documents
http://www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.xhtml
In the FortiNAC CLI logged in as root, use the “netstat” command to verify that a TCP/UDP port is
open.
netstat -ln | grep <port number>
For example, use netstat -ln | grep 4568 to verify that the port used for Agent communications to
FortiNAC is open.
tcp 0 0 0.0.0.0:4568 0.0.0.0:* LISTEN
14
Port Protocol Description Direction
Used by Device Profiler to classify devices.
eth0: Outbound
All ports outbound All Uses NMAP as one of the profiling choices.
eth1: Outbound
Also can use SNMP to profile.
UDP 21 FTP Product Updates eth0: Outbound to internet
TCP 21 FTP Product Updates eth0: Outbound to internet
Primary Server eth0: Outbound to
High Availability: MYSQL replication from
Secondary Server eth0
Primary Server to Secondary Server
TCP 22 SSH
Control Manager (M) eth0: Manage FortiNAC
Bi-directional between Managed
Servers
Servers eth0 and Manager eth0
TCP 23 Telnet Network Device Management eth0: Outbound
eth0: Outbound
UDP 53 DNS Name Service
eth1: Inbound
eth0: Outbound
TCP 53 DNS Name Service
eth1: Inbound
eth0: DHCP Fingerprinting
eth0: Inbound
UDP 67 DHCP eth1: Serving IP Addresses for Isolation
eth1: Inbound
Scopes
eth0: DHCP Fingerprinting
eth0: Inbound
UDP 68 DHCP eth1: Serving IP Addresses for Isolation
eth1: Outbound
Scopes
eth0: Inbound
TCP 80 HTTP Web Server (Portal)
eth1: Inbound
TCP 22 SFTP Product Updates eth0: Outbound to internet
UDP 123 NTP Time Service eth0: Outbound
eth0: Outbound
(Bi-directional if FortiNAC is
UDP 161 SNMP Network Device Management configured to respond to SNMP
queries. See section SNMP of the
Administration Guide).
SNMP Device Changes Notification (Mostly Host
UDP 162 eth0: Inbound
Traps Access Notification)
Product Updates eth0: Outbound to internet
TCP 443 HTTPS
Web Server (Portal) Secure HTTP eth1: Inbound
Device Change Notification and RTR (inbound)
UDP 514 Syslog eth0: Bi-directional
Logging of events to external server (outbound)
Communication with FortiAnalyzer
TCP 514 OFTP eth0: Outbound
(Available in FortiNAC version 8.5 and higher)
Bi-directional between Primary and
Secondary Server eth0
Server Communication (See note on page 5)
TCP 1050 CORBA
High Availability
Bi-directional between Managed
Servers and Manager eth0
UDP 1812 RADIUS Host/User Authentication eth0: Bi-directional
RADIUS
UDP 1813 Host/User Authentication Changes and RTR eth0: Inbound
Accounting
RADIUS Host/User Authentication Action
UDP 3799 eth0: Outbound
COA (Moving/Removing)
Persistent Agent Communication
Agent eth0: Bi-directional
UDP 4567 (No longer used by agent 5.x and above with
Server eth1: Bi-directional
NAC 8.2 and above – TCP 4568 only)
15
Port Protocol Description Direction
Used to establish the Persistent Agent
eth0: Bi-directional
TCP 4568 Agent Communication (SSL) connection
eth1: Bi-directional
Server (Used by agent 3.x and above)
Bi-directional between Primary and
Internally used by FortiNAC Secondary Server eth0
Fortinet
TCP 5555 High Availability
Server
Bi-directional between Managed
Servers and Manager eth0
TCP 5986 WMI profiling method
WinRM eth0 and eth1: Outbound
(user modifiable) (Available in FortiNAC version 8.5 and higher)
Fortinet Security Fabric (FSSO)
Private
TCP 8000 communications eth0: Inbound
Protocol
(Available in FortiNAC version 8.5 and higher)
TCP 8443 HTTPS Web Server Secure HTTP (Admin UI) eth0: Inbound
HTTP
TCP 8080 Web Server (Admin UI) eth0: Inbound
Alternative
Analytics
TCP 8180 Used to update/download the agent. eth0: Inbound
Server
Analytics Used to transfer data to the Analytics Server
TCP 8543 eth0: Bi-directional
Server and for queries from the web browser.
Note: FortiNAC uses port 1050 for CORBA (Common Object Request Broker Architecture)
Management for accessing server objects and for interprocess communication between FortiNAC
subsystems and servers. When a requestor connects to this port, the appliance dynamically
reassigns it to a port in the 30000-64000 range.
Password Requirements
Must be at least 8 characters and no more than 64 characters.
Contain a lowercase letter, an uppercase letter, a number, and one required symbol.
16
Required Symbols Prohibited Symbols
! exclamation point ( open parenthesis
@ at space
_ underscore { open curly bracket
# pound ) close parenthesis
$ dollar ; semicolon
~ tilde } close curly bracket
% percent ' back quote
^ caret : colon
- hyphen [ open square bracket
* asterisk & ampersand
? question mark " double quote
] close square bracket
+ plus
' single quote
, comma
= equal
< less than
. period
| pipe
> greater than
/ forward slash
\ back slash
SSL Certificates
Required for securing FortiNAC communications for the components listed below. For additional
details regarding the certificate installation process, refer to the SSL Certificates How To in the
Fortinet Document Library.
Layer 3 Implementation
The FortiNAC Service Interface is a standard interface
o The interface exists on a single network
o The interface is not within the same broadcast domain as a host assigned to an
isolation network
o The interface uses multiple IP addresses within the same subnet
o DHCP relays must be configured on each isolation network pointing back to the
isolation interface
o The individual IP address is used by DNS
Eth1
eth1:1 IP 10.10.100.3/28
IP helper 10.10.100.2
Remediation DHCP
DeadEndS1 VLAN 50 S1 Scope: 10.10.40.100-10.10.40.200
IP 10.10.50.1/24
S2 Scope: 10.20.40.100-10.20.40.200
IP helper 10.10.100.2
Remediation DNS
L3 Site 2 Remediation Captive Portal
RegistrationS2 VLAN 30
IP 10.20.30.1/24 eth1:2 IP 10.10.100.4/28
IP helper 10.10.100.2 Dead End DHCP
S1 Scope: 10.10.50.100-10.10.50.200
RemediationS2 VLAN 40 S2 Scope: 10.20.50.100-10.20.50.200
IP 10.20.40.1/24 DeadEnd DNS
IP helper 10.10.100.2 DeadEnd Captive Portal
Building 1
Registration VLAN 30
IP Subnet 10.10.30.x
Remediation VLAN 40
IP Subnet 10.10.40.x
Data Center
eth1 IP 10.10.30.2/24
VLAN 30 (Registration)
Registration DHCP (Scope 10.10.30.100-10.10.30.200)
Registration DNS
Registration Captive Portal
eth1:1 IP 10.10.40.3/24
VLAN 40 (Remediation)
Building 2 Remediation DHCP (Scope 10.10.40.100-10.10.40.200)
Remediation DNS
Registration VLAN 30 Remediation Captive Portal
IP Subnet 10.10.30.x
eth1:2 IP 10.10.50.4/24
Remediation VLAN 40 VLAN 50 (DeadEnd)
IP Subnet 10.10.40.x DeadEnd DHCP (Scope 10.10.50.100-10.10.50.200)
DeadEnd DNS
DeadEnd VLAN 50 DeadEnd Captive Portal
IP Subnet 10.10.50.x
19
FortiNAC Service Network VLANs
In the switches to be controlled by FortiNAC, configure the appropriate Service Network VLANs.
or alternatively
Layer 3 deployments require a VLAN per state per location that is separated by an L3 device.
20
Multiple FortiNAC Service Network Configuration
Individual VLANs per Isolation State
21
Single FortiNAC Service Network Configuration
Shared VLAN for all Isolation States
22
Prerequisite Checklist (Printable Version)
Step Pre-requisite Resource
Appliance Installation
FNAC Hostname Network Team
and Configuration
Appliance Installation
FNAC Default Gateway Network Team
and Configuration
Appliance Installation
Domain name Network Team
and Configuration
Appliance Installation
DNS server(s) Network Team
and Configuration
Appliance Installation
NTP server(s) Network Team
and Configuration
Appliance Network/Server
FNAC root CLI password
Configuration Team
Appliance Network/Server
FNAC admin CLI password
Configuration Team
Appliance Network/Server
FNAC Configuration Wizard
Configuration Team
23
Step Pre-requisite Resource
Operating System and External network access (FTP, HTTP or HTTPS) from
Network Team
Software Updates each appliance to downloads.bradfordnetworks.com
Operating System and External network access (HTTP) from each appliance
Network Team
Software Updates to HTTP access to centos.org
24
Step Pre-requisite Resource
25
Step Pre-requisite Resource
Network/Security
Enforcement Define and configure isolation service VLANs
Team
26