Change log 4 Introduction 5 Executive summary 5 Intended audience 5 About this guide 5 Design overview 6 Deployment procedures 7 Example 1: FortiLink NAC policy to match device information 7 Example 2: Using a dynamic port policy with 802.1X authentication 12 Example 3: Dynamic detection with a vulnerability NAC policy 20 Example 4: Using EMS-tag NAC policies 25 Example 5: FortiOS automation stitch 29 Appendix A: Products used in this guide 33附录B:文档参考34
主要关键词