<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco ISE and Fortinet Standalone Switch integration in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet-standalone-switch-integration/m-p/5347884#M598999</link>
    <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can anyone tell me how to do the integration between cisco ise and fortiswitch.And in cisco ise side i am using normal cisco network profile only is it enough for basic 802.1x authentication.&lt;/P&gt;</description>
    <pubDate>Tue, 18 Nov 2025 07:36:39 GMT</pubDate>
    <dc:creator>poornakumar2542</dc:creator>
    <dc:date>2025-11-18T07:36:39Z</dc:date>
    <item>
      <title>Cisco ISE and Fortinet Standalone Switch integration</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet-standalone-switch-integration/m-p/5347884#M598999</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can anyone tell me how to do the integration between cisco ise and fortiswitch.And in cisco ise side i am using normal cisco network profile only is it enough for basic 802.1x authentication.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Nov 2025 07:36:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet-standalone-switch-integration/m-p/5347884#M598999</guid>
      <dc:creator>poornakumar2542</dc:creator>
      <dc:date>2025-11-18T07:36:39Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and Fortinet Standalone Switch integration</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet-standalone-switch-integration/m-p/5347905#M599000</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1889217"&gt;@poornakumar2542&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You shouldn't need to touch the ISE side of the house. The FortiSwitch can be configured to act as a standard 802.1X authenticator.&lt;/P&gt;
&lt;P&gt;Firstly, configure the RADIUS server settings to point at your ISE PSNs.&lt;/P&gt;
&lt;P&gt;Then you need to enable 802.1X authN on the relevant switchports and make sure the relevant VLANs that ISE will assign have been configured.&lt;/P&gt;
&lt;P&gt;You should also set up RADIUS accounting.&lt;/P&gt;
&lt;P&gt;If you are trying to use Fortinet attributes (aka VSAs), you need to import the FortiGate VSAs from this link into ISE:&amp;nbsp;&lt;A href="https://community.fortinet.com/t5/FortiGate/Technical-Tip-Fortinet-s-RADIUS-Dictionary-and-VSAs-latest/ta-p/194896" target="_blank"&gt;https://community.fortinet.com/t5/FortiGate/Technical-Tip-Fortinet-s-RADIUS-Dictionary-and-VSAs-latest/ta-p/194896&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;If you just want standard 802.1X authN, that should all be up and running once you've set up the RADIUS settings on the FortiSwitch.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Nov 2025 08:46:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet-standalone-switch-integration/m-p/5347905#M599000</guid>
      <dc:creator>Ben Weber</dc:creator>
      <dc:date>2025-11-18T08:46:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and Fortinet Standalone Switch integration</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet-standalone-switch-integration/m-p/5548117#M600314</link>
      <description>&lt;P&gt;Some notes: Cisco ISE Patch 10/11 — 802.1X Auth Breakes with FortiSwitch&lt;/P&gt;&lt;P&gt;Tthe recent patch 10 or 11 of Cisco ISE breaks the 802.1X authentication requests originated from a FortiSwitch.&lt;/P&gt;&lt;P&gt;This is due to the fact that the Radius attribute service-type=framed is not being sent with the request by default. Cisco ISE now requires this attribute to be present in the radius request.&lt;/P&gt;&lt;P&gt;The fix is the following:&lt;/P&gt;&lt;P&gt;Fortiswitch # config user radius&lt;BR /&gt;Fortiswitch (radius) # show&lt;BR /&gt;config user radius&lt;BR /&gt;edit "ISE_Group"&lt;BR /&gt;set nas-ip x.x.x.x&lt;BR /&gt;set secret ENC ...&lt;BR /&gt;set server "x.x.x.x"&lt;BR /&gt;next&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;Fortiswitch (radius) # edit ISE_Group_NAC&lt;BR /&gt;Fortiswitch (ISE_Group_NAC) # show full-configuration | grep service&lt;BR /&gt;unset service-type &amp;lt;-----&lt;/P&gt;&lt;P&gt;Fortiswitch (ISE_Group_NAC) # set service-type framed &amp;lt;--- add this&lt;BR /&gt;Fortiswitch (radius) # end&lt;/P&gt;&lt;P&gt;Hope this helps someone having this issue.&lt;/P&gt;</description>
      <pubDate>Sat, 25 Apr 2026 13:22:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet-standalone-switch-integration/m-p/5548117#M600314</guid>
      <dc:creator>RamsesDE</dc:creator>
      <dc:date>2026-04-25T13:22:31Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and Fortinet Standalone Switch integration</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet-standalone-switch-integration/m-p/5548129#M600315</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1889217"&gt;@poornakumar2542&lt;/a&gt;&amp;nbsp;Cisco porifle might technicaly work, best practice to use strd RADIUS network device profile in ISE you can ensure the FortiSW correctly interprets attributes w/o failing Cisco-prop param's.. to "finish" this integration try to add sw into ISE using shared secret -&amp;gt; configure FortiSW to pint ISE as RADIUS &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 25 Apr 2026 19:03:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet-standalone-switch-integration/m-p/5548129#M600315</guid>
      <dc:creator>Stefan Mihajlov</dc:creator>
      <dc:date>2026-04-25T19:03:14Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and Fortinet Standalone Switch integration</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet-standalone-switch-integration/m-p/5548198#M600318</link>
      <description>&lt;P&gt;Reminder, for dynamic vlan's, use Tag id = 0 instead of the default 1&lt;/P&gt;</description>
      <pubDate>Sun, 26 Apr 2026 23:09:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet-standalone-switch-integration/m-p/5548198#M600318</guid>
      <dc:creator>RamsesDE</dc:creator>
      <dc:date>2026-04-26T23:09:37Z</dc:date>
    </item>
  </channel>
</rss>

