<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE and Fortinet in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet/m-p/5293260#M596444</link>
    <description>&lt;P&gt;Can posture will work with Forti APs wireless ?&lt;/P&gt;</description>
    <pubDate>Fri, 23 May 2025 12:18:53 GMT</pubDate>
    <dc:creator>sandesh-dhuri</dc:creator>
    <dc:date>2025-05-23T12:18:53Z</dc:date>
    <item>
      <title>Cisco ISE and Fortinet</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet/m-p/3765109#M486959</link>
      <description>&lt;P&gt;Good day,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there any official support for integrating ISE with fortigate/FortiAPs?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Want to know the possibility of using ISE as the RADIUS server to authenticate wireless users using fortiAPs.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Dec 2018 15:23:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet/m-p/3765109#M486959</guid>
      <dc:creator>Davion Stewart</dc:creator>
      <dc:date>2018-12-17T15:23:33Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and Fortinet</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet/m-p/3765115#M486960</link>
      <description>&lt;P&gt;It depends on how you want them to integrate with ISE.&amp;nbsp; ISE is a standards-based RADIUS server.&amp;nbsp; Chances are good that basic 802.1X authentication will work.&amp;nbsp; However, if you are looking to integrate for use cases such as BYOD then you will most likely have to figure out if they support RADIUS CoA and URL-Redirect.&amp;nbsp; You can also explore using a NAD profile.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;-Tim&lt;/P&gt;</description>
      <pubDate>Mon, 17 Dec 2018 15:29:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet/m-p/3765115#M486960</guid>
      <dc:creator>Timothy Abbott</dc:creator>
      <dc:date>2018-12-17T15:29:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and Fortinet</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet/m-p/3765131#M487078</link>
      <description>&lt;P&gt;Oh ok thanks alot for the reply.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That's some good information&lt;/P&gt;
&lt;P&gt;Do you know if there are any official documentation to refer to customers that are interested in doing this type of integration.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Dec 2018 15:49:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet/m-p/3765131#M487078</guid>
      <dc:creator>Davion Stewart</dc:creator>
      <dc:date>2018-12-17T15:49:06Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and Fortinet</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet/m-p/3765152#M487079</link>
      <description>There is no official documentation, please check with fortigate as well&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://www.google.com/search?q=ise+fortinet+integration&amp;amp;oq=ise+fortinet+integration&amp;amp;aqs=chrome..69i57j0j69i64.5112j1j7&amp;amp;sourceid=chrome&amp;amp;ie=UTF-8" target="_blank"&gt;https://www.google.com/search?q=ise+fortinet+integration&amp;amp;oq=ise+fortinet+integration&amp;amp;aqs=chrome..69i57j0j69i64.5112j1j7&amp;amp;sourceid=chrome&amp;amp;ie=UTF-8&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Also look into using our auth vlan if redirection is not an option for byod/guest where needed&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-3/admin_guide/b_ise_admin_guide_23/b_ise_admin_guide_23_chapter_01001.html#concept_CDD87F6FE3A54351B27FF35316A23DA3" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-3/admin_guide/b_ise_admin_guide_23/b_ise_admin_guide_23_chapter_01001.html#concept_CDD87F6FE3A54351B27FF35316A23DA3&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Some other links&lt;BR /&gt;&lt;A href="https://community.cisco.com/t5/security-documents/does-ise-support-my-network-access-device/ta-p/3650231" target="_blank"&gt;https://community.cisco.com/t5/security-documents/does-ise-support-my-network-access-device/ta-p/3650231&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://community.cisco.com/t5/security-documents/ise-community-resources/ta-p/3621621#Deploy" target="_blank"&gt;https://community.cisco.com/t5/security-documents/ise-community-resources/ta-p/3621621#Deploy&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://cs.co/ise-guides" target="_blank"&gt;http://cs.co/ise-guides&lt;/A&gt;&lt;BR /&gt;check  fortigate&lt;BR /&gt;</description>
      <pubDate>Mon, 17 Dec 2018 16:01:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet/m-p/3765152#M487079</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2018-12-17T16:01:13Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and Fortinet</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet/m-p/3765251#M487157</link>
      <description>We don’t have anything specific for integrating the two systems.  Are official documentation on ISE and RADIUS standards can be found in the ISE compatibility matrix.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;-Tim&lt;BR /&gt;</description>
      <pubDate>Mon, 17 Dec 2018 18:03:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet/m-p/3765251#M487157</guid>
      <dc:creator>Timothy Abbott</dc:creator>
      <dc:date>2018-12-17T18:03:13Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and Fortinet</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet/m-p/3765265#M487158</link>
      <description>&lt;P&gt;Ok cool thanks alot.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Will check the links.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Dec 2018 18:23:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet/m-p/3765265#M487158</guid>
      <dc:creator>Davion Stewart</dc:creator>
      <dc:date>2018-12-17T18:23:49Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and Fortinet</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet/m-p/3765266#M487159</link>
      <description>&lt;P&gt;Got you,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks much for the reply.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Dec 2018 18:24:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet/m-p/3765266#M487159</guid>
      <dc:creator>Davion Stewart</dc:creator>
      <dc:date>2018-12-17T18:24:33Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and Fortinet</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet/m-p/3803842#M487162</link>
      <description>&lt;P&gt;did you ever get this to work?&lt;/P&gt;</description>
      <pubDate>Mon, 18 Feb 2019 07:18:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet/m-p/3803842#M487162</guid>
      <dc:creator>johan.loven</dc:creator>
      <dc:date>2019-02-18T07:18:50Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and Fortinet</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet/m-p/4003205#M487165</link>
      <description>&lt;P&gt;I am also curious if you ever got this to work and what dictionary set you used?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Dec 2019 16:25:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet/m-p/4003205#M487165</guid>
      <dc:creator>AdamF1</dc:creator>
      <dc:date>2019-12-24T16:25:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and Fortinet</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet/m-p/4067376#M559694</link>
      <description>&lt;P&gt;Hi guys,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unfortunately i was unable to configure/test out this kind of implementation. Has anyone been able to?&lt;/P&gt;</description>
      <pubDate>Thu, 16 Apr 2020 16:56:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet/m-p/4067376#M559694</guid>
      <dc:creator>Davion Stewart</dc:creator>
      <dc:date>2020-04-16T16:56:55Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and Fortinet</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet/m-p/4134279#M562293</link>
      <description>&lt;P&gt;After working with TAC and fortinet support I was able to get this to work for 802.1x authentications.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Aug 2020 03:13:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet/m-p/4134279#M562293</guid>
      <dc:creator>AdamF1</dc:creator>
      <dc:date>2020-08-12T03:13:15Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and Fortinet</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet/m-p/4189467#M564020</link>
      <description>&lt;P&gt;Hi AdamF1,I wish you are very well.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Could you share the configuration that was done so that everything works correctly.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I thank you&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Nov 2020 22:46:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet/m-p/4189467#M564020</guid>
      <dc:creator>eiver_fori</dc:creator>
      <dc:date>2020-11-26T22:46:03Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and Fortinet</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet/m-p/4190778#M564085</link>
      <description>&lt;P&gt;Create a new device profile for Fortinet controller and apply the appropriate protocols and conditions to 802.1x and MAB.&lt;/P&gt;&lt;P&gt;-MAB- IEEE 802.11 and call check&lt;/P&gt;&lt;P&gt;-802.1x- IEEE 802.11&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Build out the controller in network devices and apply the profile.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Depending on your policies you may need to build out a new one that sits above it as authentication may continue to try and use it and fail. You can make it unique by setting it to something like call-station id ( mac address of controller), this way only devices utilizing it will hit the policy. Just be careful when editing your global policy sets and conditions you create as you could impact your current authentications.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Nov 2020 14:31:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet/m-p/4190778#M564085</guid>
      <dc:creator>AdamF1</dc:creator>
      <dc:date>2020-11-30T14:31:23Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and Fortinet</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet/m-p/5238826#M593894</link>
      <description>&lt;P&gt;Hello Team Support,&lt;/P&gt;
&lt;P&gt;I have achieved the integration of Cisco ISE and Fortigate and can be integrated to authenticate with EAP-TLS via cable and wifi.&lt;/P&gt;
&lt;P&gt;However, there are many difficulties in the guest portal. This is done with CWA and LWA and is not functional.&lt;/P&gt;
&lt;P&gt;In some cases the web portal is loaded and in addition it does not appear on the web portal.&lt;/P&gt;
&lt;P&gt;Did you experience how it works? This official Fortigate document is, if possible, but you may have problems replicating your configuration.&lt;/P&gt;
&lt;P&gt;These are cases with some supports from both Cisco and Fortinet so that I can help me solve this problem.&lt;/P&gt;
&lt;P&gt;Quedo attento.&lt;/P&gt;
&lt;P&gt;Greetings&lt;BR /&gt;Jesus Cayetano&lt;/P&gt;</description>
      <pubDate>Thu, 19 Dec 2024 12:16:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet/m-p/5238826#M593894</guid>
      <dc:creator>jcayetano-securesoft</dc:creator>
      <dc:date>2024-12-19T12:16:12Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and Fortinet</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet/m-p/5293260#M596444</link>
      <description>&lt;P&gt;Can posture will work with Forti APs wireless ?&lt;/P&gt;</description>
      <pubDate>Fri, 23 May 2025 12:18:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet/m-p/5293260#M596444</guid>
      <dc:creator>sandesh-dhuri</dc:creator>
      <dc:date>2025-05-23T12:18:53Z</dc:date>
    </item>
  </channel>
</rss>

