This community is for technical, feature, configuration and deployment questions.
For production deployment issues, please contact the TAC!
We will not comment or assist with your TAC case in these forums.
Please see How to Ask the Community for Help for other best practices.
Dear community,
It seems FORTINAC can integrate with all of cisco switches even with our legacy ones like C2950, C4500/SUPII etc...
While we dont. I would assume dot1x not being supported on these so DOT1x and Radius/COA are not supported. at the same time ISE PIC will rely on Pxgrid Subcribers to evantually Mitigate via FMC. How does FORTINAc manage in NAC our legcy switches? Are they using SNMP triggers to push SNMP SETs adn change VLAN IDs for example or even L2 ACL?
Thx you
Solved! Go to Solution.
Since v2.2, ISE supports Auth VLAN feature with SNMP which does not require supplicant or 802.1X support:
Hi dude
though it looks like exactly Fortigate's forum topic i'd advice u to collect the capture between FNAC & cisco switch. i guess it will answer a lot of your Qs.
P.S. ARPGuard as well perfectly serves "NAC" for not-fully-featured switches :0)
Since v2.2, ISE supports Auth VLAN feature with SNMP which does not require supplicant or 802.1X support: