[PDF] FortiNAC Persistent Agent Deployment and Configuration





Previous PDF Next PDF



Game Mode Report Quarter 1 2023

ms : Milliseconds. Low latency means better performance. Based on analysis by SamKnows Ltd. Game Name. Server Location. Company Location. Publisher. Fortnite.



Game Mode Report Quarter 3 2021

ms : Milliseconds. Low latency means better performance. Based on analysis by SamKnows Ltd. Game Name. Server Location. Company Location. Publisher. Fortnite.



Game Mode Report Quarter 1 2021

ms : Milliseconds. Low latency means better performance. Based on analysis by SamKnows Ltd. Game Name. Server Location. Company Location. Publisher. Fortnite.



Game Mode Report Quarter 3 2022

ms : Milliseconds. Low latency means better performance. Based on analysis by SamKnows Ltd. Game Name. Server Location. Company Location. Publisher. Fortnite.



Game Mode Report Quarter 2 2021

ms : Milliseconds. Low latency means better performance. Based on analysis by SamKnows Ltd. Game Name. Server Location. Company Location. Publisher. Fortnite.



Game Mode Report Quarter 1 2022

ms : Milliseconds. Low latency means better performance. Based on analysis by SamKnows Ltd. Game Name. Server Location. Company Location. Publisher. Fortnite.



Game Mode Report Quarter 2 2023

ms : Milliseconds. Low latency means better performance. Based on analysis by SamKnows Ltd. Game Name. Server Location. Company Location. Publisher. Fortnite.



Game Mode Report Quarter 4 2022

ms : Milliseconds. Low latency means better performance. Based on analysis by SamKnows Ltd. Game Name. Server Location. Company Location. Publisher. Fortnite.



Know Thy Lag: In-Network Game Detection and Latency Measurement

the previous contribution to measure game servers location and latencies. We play the client contacts Fortnite's matchmaking server that groups players ...



A COMPARISON OF VIRTUAL WORLDS BASED ON THE

the same location is possible independently of their physical location [28]. [24] Epic Games Where are Fortnite's servers located? [Online]. Available ...



FAddressing the impact of latency - How low can you go? White Paper

This paper seeks to address the impact of latency in today's telecommunications networks Fortnite server locations – USA Brazil



FortiNAC Persistent Agent Deployment and Configuration

17 de nov. de 2021 FortiNAC Agent Server to complete tasks such as registration ... For more details



Online Multiplayer Gaming Trends & Insights March 2022

3 de mar. de 2022 Shooting games like Fortnite Call of Duty



COMMUNICATIONS DAY

2 de fev. de 2022 aims to provider ISPs with continuous tracking of all gaming sessions to map game server locations measure gaming latency in real-time and ...



PSA Modernization with GIS - The Age of the Location Platform

Client / Server. Web Services & App. Stand Alone Desktop. Connected Desktop. Data Models. Web Maps. Static Data. Real-Time. Custom Applications.



Measuring Broadband New Zealand Programme - Technical FAQ

26 de ago. de 2021 Server locations. 3. REANNZ provides the servers that the tests will run to in New Zealand which are located in Wellington



How To: Run the Log4Shell Mitigation Script for ArcGIS GeoEvent

16 de dez. de 2021 This script identifies all locations in the. ArcGIS GeoEvent Server where the class files reside and then removes those class files.



FortiOS 6.2.5 Release Notes

2 de nov. de 2021 FortiGuard update-server-location setting. 21. FortiView widgets. 21. Product integration and support. 22. Language support.



Office of Sustainability

29 de mai. de 2020 Relocated server rack location. • E-C11-SITE PLAN-HOUSE LOADS - Relocated PV2. Relocated server rack location.



{AP9} FREE VBUCKS GENERATOR NO VERIFY 2022 {[EL0BS]}

6 de set. de 2022 vbucks generator no verification 2022 free fortnite hacks no verification ... sponsors Fast and secure servers with a 100% success rate

1

FortiNAC

Persistent Agent Deployment and Configuration

Version: 8.3, 8.5, 8.6, 8.7, 8.8

Date: November 17, 2021

Rev: ab

2

FORTINET DOCUMENT LIBRARY

http://docs.fortinet.com

FORTINET VIDEO GUIDE

http://video.fortinet.com

FORTINET KNOWLEDGE BASE

http://kb.fortinet.com

FORTINET BLOG

http://blog.fortinet.com

CUSTOMER SERVICE & SUPPORT

http://support.fortinet.com

FORTINET COOKBOOK

http://cookbook.fortinet.com

NSE INSTITUTE

http://training.fortinet.com

FORTIGUARD CENTER

http://fortiguard.com

FORTICAST

http://forticast.fortinet.com

END USER LICENSE AGREEMENT

3

Contents

Overview ............................................................................................................................................... 5

What it Does ...................................................................................................................................... 5

How it Works ..................................................................................................................................... 5

Requirements .................................................................................................................................... 5

Onboarding Use Cases .......................................................................................................................... 6

Agent Deployment Preparation ............................................................................................................ 7

Deployment Methods ......................................................................................................................... 7

FortiNAC SSL Certificates................................................................................................................ 8

FortiNAC Settings for Persistent Agent ........................................................................................... 9

Persistent Agent Settings ............................................................................................................... 11

Stage Agent for Deployment ............................................................................................................... 13

Software Management Program ..................................................................................................... 13

Imaging ............................................................................................................................................ 14

Captive Portal .................................................................................................................................. 16

Manual Installation ......................................................................................................................... 17

Registration Use Cases: Company Assets .......................................................................................... 18

Windows Domain (Silent Onboard (Single-Sign-On)) .................................................................... 18

Configure ...................................................................................................................................... 18

Validate ........................................................................................................................................ 20

MacOS Machines (Onboard Through Isolation) ............................................................................. 21

Configure ...................................................................................................................................... 21

Validate ........................................................................................................................................ 22

Linux Machines (Onboard Through Isolation) ............................................................................... 23

Configure ...................................................................................................................................... 23

Validate ........................................................................................................................................ 25

MacOS Machines (Silent Onboard) ................................................................................................. 25

Configuration ............................................................................................................................... 25

Validate ........................................................................................................................................ 27

MacOS Manual Registration ........................................................................................................... 27

Linux Machines (Silent Onboard) ................................................................................................... 28

Configuration ............................................................................................................................... 28

Validate ........................................................................................................................................ 29

Registration Use Cases: Personal Devices ......................................................................................... 31

4

Persistent Agent Multiple Pod Use Cases .......................................................................................... 32

Use Case 1: Agent Distributed Via Software Management .......................................................... 32

Use Case 2: Agent Distributed Via Software Management (DNS Sub Domains) ........................ 37

Use Case 3: Agent Distributed Via Captive Portal ....................................................................... 42

Troubleshooting .................................................................................................................................. 48

Related KB Articles ......................................................................................................................... 48

Debugging ........................................................................................................................................ 48

Appendix ............................................................................................................................................. 49

Persistent Agent Server Discovery Process .................................................................................... 49

Windows Files Directories and Commands .................................................................................... 50

MacOS Files Directories and Commands ....................................................................................... 51

MacOS Agent Installation Example ............................................................................................... 52

Linux Files Directories and Commands ......................................................................................... 53

Agent Settings and Packages Domain Distribution ....................................................................... 54

Delayed Autostart (Windows) ......................................................................................................... 60

Shutdown Order of Services (Windows) ......................................................................................... 61

GPO Shutdown Script Example ...................................................................................................... 62

Silent Install Script Parameters ..................................................................................................... 63

5

Overview

What it Does

The Persistent Agent resides on the host machine and works in conjunction with the FortiNAC Agent Server to complete tasks such as registration, authentication and scanning, as well as provide additional information to FortiNAC about the host (adapters, applications, etc).

How it Works

1. o o o o 2. 3.

Requirements

SSL Certificates installed in FortiNAC (Persistent Agent Certificate Target). Do not block TCP 4568 or UDP 4567 ports on network 6

Onboarding Use Cases

Determine how machines will register based on security policies and requirements. Listed below are common use cases. Company Asset Windows Domain (Silent Onboard (Single-Sign-On)): Persistent Agent is distributed to Windows domain machines via imaging or software management program. Windows machines are automatically registered when the user logs on to the domain. The registered host is not associated with any specific owner, but FortiNAC is able to track the logged on user. This method is recommended for Windows domain machines and is transparent to the end user. Company Asset macOS Machines (Silent Onboard): Persistent Agent is distributed to macOS machines via imaging or software management program. The macOS machine automatically registers upon connecting to the network once the installed Persistent Agent communicates with FortiNAC. The registered host is not associated with any user record. Note: Logged on users are not tracked for Mac and Linux. This method is transparent to the end user. Company Asset Linux Machines (Silent Onboard): Persistent Agent is distributed to Linux machines via imaging or software management program. The Linux machine automatically registers upon connecting to the network once the installed Persistent Agent communicates with FortiNAC. The registered host is not associated with any user record. Note: Logged on users are not tracked for macOS and Linux. This method is transparent to the end user. Company Asset macOS Machines (Onboard Through Isolation): Persistent Agent is distributed to macOS machines via imaging or software management program. User is prompted

to enter credentials in order to register. If network is under enforcement, device is isolated until

registered. The machine is registered to the user. Note: This method cannot be used in conjunction with the Windows Domain Single-Sign-On method. Company Asset Linux Machines (Onboard Through Isolation): Persistent Agent is distributed to Linux machines via imaging or software management program. User is prompted to enter credentials in order to register. If network is under enforcement, device is isolated until registered. The machine is registered to the user. Note: This method cannot be used in conjunction with the Windows Domain Single-Sign-On method. Personal Devices: Agent is either pre-installed or must be installed via the Captive Portal upon

initial connection to the network. User enters credentials to register. Device is registered to the

user. 7

Agent Deployment Preparation

Planning is required before the Persistent Agent can be deployed.

Deployment Methods

Software Management Program

Imaging

If computers are imaged prior to deployment, the agent software can be included in the master image.

Captive Portal

Manual Installation

8

FortiNAC SSL Certificates

9

FortiNAC Settings for Persistent Agent

o 10 For Multiple Pod environment use cases, see the following in the Appendix for recommended

Settings for FortiNAC and agent software:

Agent Distributed Via Software Management/Image

Agent Distributed Via Software Management/Image (DNS Sub Domains)

Agent Distributed Via Captive Portal

11

Persistent Agent Settings

12

Home Server:

Allowed Servers:

Restrict Roaming:

Balloon Notifications:

Login Dialog:

System Tray Icon:

Discovery using SRV Lookup:

13 For Multiple Pod environment use cases, see the following in the Appendix for recommended

Settings for FortiNAC and agent software:

Agent Distributed Via Software Management/Image

Agent Distributed Via Software Management/Image (DNS Sub Domains)

Agent Distributed Via Captive Portal

Stage Agent for Deployment

Software Management Program

1. 2. 3. The Persistent Agent settings are configured within the Policy Settings (as opposed to default settings). These settings take precedence over the Default Settings. 14

Imaging

1. 2. 3. 4. 15 5. The Persistent Agent settings are configured within the Policy Settings (as opposed to default settings). These settings take precedence over the Default Settings. 16

Captive Portal

1. 2. 3. 4. 5. 6. 7. 17

Manual Installation

1. 2. 3. 4. The Persistent Agent settings are configured within the Policy Settings (as opposed to default settings). These settings take precedence over the Default Settings. 18

Registration Use Cases: Company Assets

Windows Domain (Silent Onboard (Single-Sign-On))

1. 2. 3. 4. 5. 6. Under System > Settings > LDAP > User Attributes, Identifier = sAMAccountName Agent Deployment Method: Software Management Program

Windows machine is a member of a domain

User ID is a valid User ID in the domain

User account must have Last Name

Configure

1. 2. 3. 4. 5. 6. 19 7. 8. 9. 10. 11. 20 12. 13.

Validate

If any of the below do not work as expected, see KB article Troubleshooting the Persistent Agent.

1. Login to domain

2. Search for Windows machine in Hosts > Host View.

3. Verify the following:

Host record displays as registered.

The appropriate Endpoint Compliance Policy matches (right click on host and select Policy

Details)

The applicable scan runs (right click on host and select Host Health) The scan result accurately reflects the machine posture (e.g. does the scan pass when it should have failed?)

After the network has been enforced:

1. 2. 21

MacOS Machines (Onboard Through Isolation)

How it Works:

1. Device connects to the network.

2. Persistent Agent initiates communication with FortiNAC.

3. FortiNAC determines the host is a rogue and sends message to the agent to prompt for credentials.

4. The agent displays a pop-up dialog box.

5. User enters credentials in the dialog box.

6. 7. 8.

Note the following:

This method cannot be used in conjunction with the Windows Domain Single-Sign-On method

Logged on users are not tracked for Mac and Linux

It is recommended to push the agent to a sample group of machines for validation first.

Requirements:

Agent Deployment Method: Software Management Program

Root access to the Mac machine

Configure

1. Navigate to System > Settings > Persistent Agent > Credential Configuration

2. 3. 4. a. b.

sudo cp /Library/Preferences/com.bradfordnetworks.bndaemon.plist /Library/Preferences/com.bradfordnetworks.bndaemon.policy.plist

Note: R

required. c. Modify the new policy plist file with the appropriate Persistent Agent Settings. The following table provides recommended settings. Review Software Modifiable Settings for the Persistent Agent for additional options.

sudo defaults write /Library/Preferences/com.bradfordnetworks.bndaemon.policy -

22

Recommended Persistent Agent Settings

sudo defaults read /Library/Preferences/com.bradfordnetworks.bndaemon.policy 5. 6.

Validate

1. Connect host to network. Pop-up dialogue box should appear in machine to prompt for

credentials.

2. Search for Windows machine in Hosts > Host View. Verify the Host record displays as rogue.

3. After entering credentials in pop-up dialogue box, confirm the appropriate Endpoint Compliance

Policy matches (right click on host and select Policy Details). 23

4. To verify the applicable scan runs, right click on host and select Host Health.

5. Verify the scan result accurately reflects the machine posture (e.g. does the scan pass when it

should have failed?) If any of the above do not work as expected, see KB article Troubleshooting the Persistent Agent.

Linux Machines (Onboard Through Isolation)

How it Works:

1. Device connects to the network.

2. Persistent Agent initiates communication with FortiNAC.

3. FortiNAC determines the host is a rogue and sends message to the agent to prompt for credentials.

4. The agent displays a pop-up dialog box.

5. User enters credentials in the dialog box.

6. 7. 8.

Note the following:

This method cannot be used in conjunction with the Windows Domain Single-Sign-On method

Logged on users are not tracked for Mac and Linux

Requirements:

Agent Deployment Method: Software Management Program

Root access to the Mac machine

Configure

1. Navigate to System > Settings > Persistent Agent > Credential Configuration

2. 3. 4. a. b.

sudo cp /etc/xdg/com.bradfordnetworks/PersistentAgent.conf /etc/xdg/com.bradfordnetworks/PersistentAgentPolicy.conf

24
c. vi PersistentAgentPolicy.conf Best practice: PersistentAgentPolicy.conf should be ASCII encoding. As of

FortiNAC 8.7.0, UTF-8 can also be parsed.

Recommended Persistent Agent Settings

restrictRoaming=true

ShowIcon=0

ClientStateEnabled=0

d. e. 25

Validate

1. Connect host to network. Pop-up dialogue box should appear in machine to prompt for

credentials.

2. Search for Windows machine in Hosts > Host View. Verify the Host record displays as rogue.

3. After entering credentials in pop-up dialogue box, confirm the appropriate Endpoint Compliance

Policy matches (right click on host and select Policy Details).

4. To verify the applicable scan runs, right click on host and select Host Health.

5. Verify the scan result accurately reflects the machine posture (e.g. does the scan pass when it

should have failed?) If any of the above do not work as expected, see KB article Troubleshooting the Persistent Agent.

MacOS Machines (Silent Onboard)

1. Device connects to the network.

2. Persistent Agent initiates communication with FortiNAC.

3.

Requirements:

Agent Deployment Method: Software Management Program

Root access to the Mac machine

Configuration

1. 2. 3. 4. a. b. 26

sudo cp /Library/Preferences/com.bradfordnetworks.bndaemon.plist /Library/Preferences/com.bradfordnetworks.bndaemon.policy.plist

c. Note: syntax is not required. d. Modify the new policy plist file with the appropriate Persistent Agent Settings. The following table provides recommended settings. Review Software Modifiable Settings for the Persistent Agent for additional options.

sudo defaults write /Library/Preferences/com.bradfordnetworks.bndaemon.policy -

27
sudo defaults read /Library/Preferences/com.bradfordnetworks.bndaemon.policy 5. 6.

Validate

1. Connect host to network.

2. Search for Windows machine in Hosts > Host View.

3. Verify the following:

Host record displays as registered.

The appropriate Endpoint Compliance Policy matches (right click on host and select Policy

Details)

The applicable scan runs (right click on host and select Host Health) The scan result accurately reflects the machine posture (e.g. does the scan pass when it should have failed?) If any of the above do not work as expected, see KB article Troubleshooting the Persistent Agent. 1. 2. 3. a. b.

MacOS Manual Registration

Configuration Procedure:

1. Navigate to Hosts > Host View.

2. Search for device. Right click and select Register as Host or Register as Device.

28

Linux Machines (Silent Onboard)

1. Device connects to the network.

2. Persistent Agent initiates communication with FortiNAC.

3.

Requirements:

Agent Deployment Method: Software Management Program

Root access to the Mac machine

Configuration

1. 2. 3. 4. a. b.

sudo cp /etc/xdg/com.bradfordnetworks/PersistentAgent.conf /etc/xdg/com.bradfordnetworks/PersistentAgentPolicy.conf

c. vi PersistentAgentPolicy.conf Best practice: PersistentAgentPolicy.conf should be ASCII encoding. As of

FortiNAC 8.7.0, UTF-8 can also be parsed.

29
restrictRoaming=true

ShowIcon=0

ClientStateEnabled=0

LoginDialogDisabled=1

5. 6.

Validate

4. Connect host to network.

5. Search for Windows machine in Hosts > Host View.

30

6. Verify the following:

Host record displays as registered.

The appropriate Endpoint Compliance Policy matches (right click on host and select Policy

Details)

The applicable scan runs (right click on host and select Host Health) The scan result accurately reflects the machine posture (e.g. does the scan pass when it should have failed?) If any of the above do not work as expected, see KB article Troubleshooting the Persistent Agent. 1. 2. 3. a. b. 31

Registration Use Cases: Personal Devices

How it Works (Persistent Agent pre-installed):

1. Device connects to the network.

2. Persistent Agent initiates communication with FortiNAC.

3. FortiNAC determines the host is a rogue and sends message to the agent to prompt for credentials.

4. The agent displays a pop-up dialog box.

5. User enters credentials in the dialog box.

6. 7. 8. How it Works (Persistent Agent installed via Captive Portal-Assumes network under enforcement):

1. Device connects to the network.

2. FortiNAC determines device is unknown (rogue). Device is isolated and Captive Portal is presented

once browser is opened.

3. User enters their credentials to register.

4. FortiNAC matches the device with the appropriate Endpoint Compliance Policy (determines which agent

type and version to distribute as well as which scan to run)

5. User is prompted to download the agent.

6. User installs agent.

7. FortiNAC sends message to the agent to prompt for credentials.

8. The agent displays a pop-up dialog box.

9. User enters credentials in the dialog box.

10. 11. 12. 32

Persistent Agent Multiple Pod Use Cases

1. 2. 3. 4. See Persistent Agent Server Discovery Process in the Appendix for full details. Use Case 1: Agent Distributed Via Software Management

Use Case 1 Requirements

1S 1P 3 2 33
Use Case 1 Recommended Settings and Configurations 34
Use Case 1 Scenarios: Persistent Agent Discovery - Host Connects to Location A

High Availability Pair

quotesdbs_dbs14.pdfusesText_20
[PDF] fortnite servers twitter

[PDF] fortnite skins tracker

[PDF] fortnite update 12.60

[PDF] fortnite update 2.77

[PDF] fortnite update notes

[PDF] fortnite v bucks generator ps4

[PDF] fortran 2018 pdf

[PDF] fortran 77

[PDF] fortran 77 download

[PDF] fortran 77 manual

[PDF] fortran 77 programming tutorial pdf

[PDF] fortran 77 textbook pdf

[PDF] fortran 77 write

[PDF] fortran 90

[PDF] fortran 90 example