<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE and Fortinet Standalone Switch integration in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet-standalone-switch-integration/m-p/5347905#M599000</link>
    <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1889217"&gt;@poornakumar2542&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You shouldn't need to touch the ISE side of the house. The FortiSwitch can be configured to act as a standard 802.1X authenticator.&lt;/P&gt;
&lt;P&gt;Firstly, configure the RADIUS server settings to point at your ISE PSNs.&lt;/P&gt;
&lt;P&gt;Then you need to enable 802.1X authN on the relevant switchports and make sure the relevant VLANs that ISE will assign have been configured.&lt;/P&gt;
&lt;P&gt;You should also set up RADIUS accounting.&lt;/P&gt;
&lt;P&gt;If you are trying to use Fortinet attributes (aka VSAs), you need to import the FortiGate VSAs from this link into ISE:&amp;nbsp;&lt;A href="https://community.fortinet.com/t5/FortiGate/Technical-Tip-Fortinet-s-RADIUS-Dictionary-and-VSAs-latest/ta-p/194896" target="_blank"&gt;https://community.fortinet.com/t5/FortiGate/Technical-Tip-Fortinet-s-RADIUS-Dictionary-and-VSAs-latest/ta-p/194896&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;If you just want standard 802.1X authN, that should all be up and running once you've set up the RADIUS settings on the FortiSwitch.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 18 Nov 2025 08:46:18 GMT</pubDate>
    <dc:creator>Ben Weber</dc:creator>
    <dc:date>2025-11-18T08:46:18Z</dc:date>
    <item>
      <title>Cisco ISE and Fortinet Standalone Switch integration</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet-standalone-switch-integration/m-p/5347884#M598999</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can anyone tell me how to do the integration between cisco ise and fortiswitch.And in cisco ise side i am using normal cisco network profile only is it enough for basic 802.1x authentication.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Nov 2025 07:36:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet-standalone-switch-integration/m-p/5347884#M598999</guid>
      <dc:creator>poornakumar2542</dc:creator>
      <dc:date>2025-11-18T07:36:39Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE and Fortinet Standalone Switch integration</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet-standalone-switch-integration/m-p/5347905#M599000</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1889217"&gt;@poornakumar2542&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You shouldn't need to touch the ISE side of the house. The FortiSwitch can be configured to act as a standard 802.1X authenticator.&lt;/P&gt;
&lt;P&gt;Firstly, configure the RADIUS server settings to point at your ISE PSNs.&lt;/P&gt;
&lt;P&gt;Then you need to enable 802.1X authN on the relevant switchports and make sure the relevant VLANs that ISE will assign have been configured.&lt;/P&gt;
&lt;P&gt;You should also set up RADIUS accounting.&lt;/P&gt;
&lt;P&gt;If you are trying to use Fortinet attributes (aka VSAs), you need to import the FortiGate VSAs from this link into ISE:&amp;nbsp;&lt;A href="https://community.fortinet.com/t5/FortiGate/Technical-Tip-Fortinet-s-RADIUS-Dictionary-and-VSAs-latest/ta-p/194896" target="_blank"&gt;https://community.fortinet.com/t5/FortiGate/Technical-Tip-Fortinet-s-RADIUS-Dictionary-and-VSAs-latest/ta-p/194896&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;If you just want standard 802.1X authN, that should all be up and running once you've set up the RADIUS settings on the FortiSwitch.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Nov 2025 08:46:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-and-fortinet-standalone-switch-integration/m-p/5347905#M599000</guid>
      <dc:creator>Ben Weber</dc:creator>
      <dc:date>2025-11-18T08:46:18Z</dc:date>
    </item>
  </channel>
</rss>

