SlideShare a Scribd company logo
© Copyright Fortinet Inc. All rights reserved.
Secure Access Architecture
Alessandro Berta – Systems Engineer
15 Aprile 2016
2
Trend: Device Growth Continues
More devices and newer device types are entering the network
 33 Billion endpoints projected to
be connected by 2020 – Gartner
 New device types entering the
network
» ‘headless’ IoT, wireless sensor
nodes, beacons, wearables
3
Trend: Devices Going Wireless
Wi-Fi becoming the primary access medium
© Nemertes Research, August 2015
9%
7%
13%
35%
36%
0% 10% 20% 30% 40% 50%
Other
ZigBee
Bluetooth
Wi-Fi
Ethernet
Percent of Respondents
LANAccessTechnologies
2014
• Each generation of Wi-Fi technology accelerates the migration
to wireless for users
IoT Access Technology Predications
© Infonetics, M2M Strategies by Vertical: N. American Enterprise Survey, January 2014
64%
Wireless
• IoT devices going wireless
4
Trend: Need for More Speed
Migration to 802.11ac continues
1st Generation
1997-1998
2nd Generation
1999-2001
3rd Generation
2002-2006
4th Generation
2007-2011
5th Generation
Now
802.11
2 Mbps
802.11b
11 Mbps
802.11g/a
54 Mbps
802.11n
450 Mbps
802.11ac
Gigabit Mbps
Infonetics, Wireless LAN Equipment Quarterly Worldwide and Regional Market Share: 4Q14
Migration to 802.11acWi-Fi Standards Evolution
5
Trend: Seamless User Experience
A unified access experience is the expected norm
 Users utilize multiple devices in the enterprise
» Wireless: smartphone, tablets
» Wired: desktops, workstations
 Consistent user experience is the norm
» Consistent policies for access, application, security
 Seamless device experience
» New device types must be provisioned appropriately
» “Headless” devices – IoT
Access
Points
Switch
Wireless Wired
Authentication
6
Wireless - the Weakest Link
Endpoint
Core network
infrastructure
Wireless Databases Applications Storage Email
Worldwide 45% 29% 49% 25% 17% 11% 25%
Americas 43% 28% 50% 27% 17% 12% 23%
EMEA 47% 27% 52% 22% 17% 10% 24%
APAC 43% 31% 44% 25% 18% 10% 29%
0%
10%
20%
30%
40%
50%
60%
WLAN Ranked as the Most Vulnerable IT infrastructure
Source: Fortinet Security Census 2015, 1490 respondents
7
Expectations are on the Rise
Need More Speed
Migration to 802.11ac
Seamless
Unified Experience
Unified Network
Operations
Application Growth
Move to wireless
Device Growth
8
Combine Security and Access
Need More Speed
Migration to 802.11ac
Seamless
Unified Experience
Unified Network
Operations
Application Growth
Move to wireless
Device Growth
SECURE ACCESS
ARCHITECTURE
9
FortiPresence FortiAuthenticator
FortiManager FortiWLM
FortiClient FortiWiFi
FortiWLC
FortiAP
FortiGate Controller
FortiSwitch (POE)
SECURE ACCESS
ARCHITECTURE
N
Why Fortinet?
10
Complete Secure Access Offerings
Note: formally Meru Networks
Cloud
APSwitch
Cloud
(Cloud Management)
Security
+
WLAN Management
APSwitch
Integrated
(Integrated Controller)
AP
Security
WLAN
Management
Switch
Infrastructure
(Dedicated Controller)
1 2 3
11
Fortinet Offers More Choices
Infrastructure
(Dedicated Controller)
Integrated
(Integrated Controller)
Cloud
(Cloud Management)
Distributed Enterprise
(Retail / QSR)  
Healthcare / Financials  
K-12 / Primary / Secondary
School  
Higher Education 
Large Public Venue 
Infrastructure Wireless
Secure Access Architecture
13
Why Infrastructure?
1
 Mobile: Fit for highly mobile deployments
 Flexible: Many deployment options
 Stand-alone: Able to separate access purchase decision from security
FortiWLC-50D
FortiWLC-200D
FortiWLC-500D
Infrastructure Wireless
14
Infrastructure Wireless
Multi-Channel
One channel to simplify deployment
and seamless roaming
Multiple channels to maximize
spectrum reuse and performance
Single Channel + Virtual Cell
36 36 36
36 36 36 36
36 36 36
Multiple channels to segment
application traffic and add capacity
Channel Layers + Virtual Cells
36 36 36
36 36 36 36
58 58 5844 44 44
44 44 44 44
42 42 42
149 149 149
149 149 149 149
149 149 149
1
15
Infrastructure Wireless
Network In Control
Fortinet decides when clients roam for best
possible user experience in time-sensitive
applications.
Mobile
Fit for highly mobile and scalable deployments
where low latency and roaming support matter
Controlling the User Experience
1
16
Client-in-control: the “Sticky Clients” issue
Scanners and VoIP handsets re-charging in the cradles
1
17
Client-in-control: the “Sticky Clients” issue
WiFi Client tend to stick to the same AP, depending on their NIC driver
1
18
Client-in-control: the “Sticky Clients” issue
The AP-Client links are barely optimized. Many connections are at long distance, weak
signal, low data rate, scarce throughput.
1
19
Network-in-control
Optimized Distribution of Clients
Wi-Fi Clients are always associated to the best AP: higher signal, faster data rate, better
performance, AP’s are not congested by far-away clients.
1
20
Roaming is really Seamless and at the right time
20
X
Multi-Channel
Virtual Cell
100 ms – 3 seconds
between handoff 5 - 10 ms
between handoff
X
1
Integrated Wireless
Secure Access Architecture
22
Integrated Wireless
Security Access
Control
 Enterprise WLAN controller
 Rogue AP and WIDS
 Integrated captive portal
 Tunnel, bridge and mesh
 Single pane of glass
 Unified wired/wireless
 Application control
 FortiGuard Services
Security
2
23
Integrated Wireless
 Every FortiGate includes a WLAN controller
 Largest range of controllers in the industry
 Support ranges from 5 APs (100 users) up to 10K APs
(32,000 users)
2
WiFi > SSID2
FortiView > Device topology (SSID and VLAN)2
FortiView > Applications2
FortiView > Applications > Drill Down > Sessions2
FortiView > Threat Map2
Cloud Wireless
Secure Access Architecture
30
Why Cloud?
3
FAP-S323C
802.11ac
3x3:3
FAP-S321C
802.11ac
3x3:3
 Secure: Industry’s only UTM + AP solution
 Cloud: Roll out remote sites in minutes - not hours and days
 Controller-less: Wi-Fi without the complexity of on premise controllers
Cloud Wireless
31
Competitor Cloud Wi-Fi FortiAP-S Series
Connection
Credential Lookup
Authentication
Gap in Security
Protection
Continue to Wire
Connection
Credential Lookup
Authentication
IPS, AV, Botnet
URL Filter, App Control
Continue to Wire
 Managed by FortiCloud
 No controller required
 FortiGuard services run on each AP
 Simplifies deployment and management
Cloud Wireless3
32
Cloud Wireless
Intrusion Prevention System
Antivirus and Anti-botnet
L7 Application Control
Web Filtering
3
Other Secure Access related products
Secure Access Architecture
34
FortiPlanner
 Wireless LAN Planning and Real-Time Visualization Software
 Free download for deployments of up to 30 FortiAPs.
 Pro license supports unlimited FortiAPs and enables Site Survey and Real-Time
Heat-map features
FortiPlanner wireless deployment planning FortiPlanner wireless site survey
35
FortiPresence
Presence Analytics Solution
Uses existing in-store FortiAP or FortiWiFi access points to collect the WiFi signal information from the
smartphones of visitors.
 Solution Components:
» FortiAP or FortiWiFi - Detects WiFi signal from smartphones
» FortiGate or FortiWLC - Aggregates signal information from multiple APs
» FortiPresence Cloud – Processes data and presents analytics on dashboard
FortiPresence
36
FortiPresence
 Total visitor traffic
 Real time visit capture rate
 Dwell time duration
 A/B comparison across stores
 Repeat visitors, frequency
 VIP Alert
 Heat maps with animated flows
 Real-time density, staff resources
 Measure marketing campaign effectiveness
37
FortiSwitch
Why FortiSwitch?  Control: Managed and secured from FortiGate GUI
 Power: Full PoE+ power for APs and other Power over Ethernet devices
 Stackable: 1GbE, 10GbE and 40GbE with stacking capability
38
FortiGate Switch Management
» Fortilink protocol for secure
management
» Visibility into port speed/status
» Centrally manage VLANs
» Apply security policy
» Authenticate clients centrally via
802.1x or captive portal
FortiSwitch
39
FortiPresence FortiAuthenticator
FortiManager FortiWLM
FortiClient FortiWiFi
FortiWLC
FortiAP
FortiGate Controller
FortiSwitch (POE)
SECURE ACCESS
ARCHITECTURE
N
160415 lan and-wan-secure-access-architecture

More Related Content

PPTX
Evento 15 aprile
PPTX
160415 lan and-wan-ctap
PPT
Financial Districs Wi Fi Scan
PPTX
ICS case studies v2
PPTX
Network Security - Fortinet, Dublin June 2017
PPTX
Inside forti os-v524-r5
PPT
Next generation firewall(ngfw)feature and benefits
Evento 15 aprile
160415 lan and-wan-ctap
Financial Districs Wi Fi Scan
ICS case studies v2
Network Security - Fortinet, Dublin June 2017
Inside forti os-v524-r5
Next generation firewall(ngfw)feature and benefits

What's hot (20)

PDF
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
PPTX
Fortinet k
PPT
What is NAC
PPTX
Next-generation Zero Trust Cybersecurity for the Space Age
PPT
Sophos Utm Presentation 2016
PPT
Juniper idp overview
PDF
How Secure Is Your Building Automation System?
PPTX
Fortinet ixia ottawa, june 2013
PDF
The Internet of Things Isn't Coming, It's Here
PDF
ForeScout IoT Enterprise Risk Report
PPT
NAC Solution Taarak
PDF
Presentacion nac
PPTX
Fortinet Perspectiva Coporativa
PPTX
Check Point NGFW
PDF
Internet of Things Security Patterns
PPTX
Securing with Sophos - Sophos Day Belux 2014
PPTX
Network Control Access for Non-IT Professionals
PDF
IRJET- Network Monitoring & Network Security
PDF
Positive approach to security of Core networks
PDF
IoT Security, Mirai Revisited
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
Fortinet k
What is NAC
Next-generation Zero Trust Cybersecurity for the Space Age
Sophos Utm Presentation 2016
Juniper idp overview
How Secure Is Your Building Automation System?
Fortinet ixia ottawa, june 2013
The Internet of Things Isn't Coming, It's Here
ForeScout IoT Enterprise Risk Report
NAC Solution Taarak
Presentacion nac
Fortinet Perspectiva Coporativa
Check Point NGFW
Internet of Things Security Patterns
Securing with Sophos - Sophos Day Belux 2014
Network Control Access for Non-IT Professionals
IRJET- Network Monitoring & Network Security
Positive approach to security of Core networks
IoT Security, Mirai Revisited
Ad

Similar to 160415 lan and-wan-secure-access-architecture (20)

PDF
PLNOG16: When and Why use Fortinet Infrastructure Wireless solution, Brian An...
PPTX
Fortinet
PDF
Solution Guide Secure Access Architecture
PPTX
PPTX
Fortinet Switch - Sales Pitch Deck FortiSwitch.pptx
PDF
Wireless survey-report-saa-2016
PDF
Track SD-WAN.pdf
PPTX
Wireless Overview Customer Deck_Mar21_bdbcommented.pptx
PPT
Meru Presentation
PDF
Secure-Access-FortiSwitch-08.24.pdf
PPTX
Extending Security to EVERY Edge
PDF
Meraki overview 2011 general (2) (1)
PPTX
Transform your enterprise branch with secure sd-wan
PPTX
SDWAN Introduction presentation & Public Speaking
PDF
Meraki Overview
PPTX
Software defined security-framework_final
PPTX
Fortinet Acess Point - FortiAP Sales Deck.pptx
PPTX
Cloud managed secure wi fi
PLNOG16: When and Why use Fortinet Infrastructure Wireless solution, Brian An...
Fortinet
Solution Guide Secure Access Architecture
Fortinet Switch - Sales Pitch Deck FortiSwitch.pptx
Wireless survey-report-saa-2016
Track SD-WAN.pdf
Wireless Overview Customer Deck_Mar21_bdbcommented.pptx
Meru Presentation
Secure-Access-FortiSwitch-08.24.pdf
Extending Security to EVERY Edge
Meraki overview 2011 general (2) (1)
Transform your enterprise branch with secure sd-wan
SDWAN Introduction presentation & Public Speaking
Meraki Overview
Software defined security-framework_final
Fortinet Acess Point - FortiAP Sales Deck.pptx
Cloud managed secure wi fi
Ad

More from Lan & Wan Solutions (20)

PPTX
CYBER THREAT ASSESSMENT
PDF
Nuova presentazione Lan & Wan Solutions Fortinet Partner
PDF
Nuova presentazione Lan & Wan Solutions
PDF
Mc business solutions set
PDF
Mc partner playbook
PPTX
PPTX
PPTX
Secure Access Architecture
PPTX
Advanced Threat Protection
PDF
scheda tecnica smartphone zona 1.21 e zona 2.22
PDF
scheda tecnica smartphone zona 1.21 e zona 2.22
PDF
Scheda tecnica hspa 08
PPS
Antenne filari
PPS
Antenne multifilari
PPTX
PPTX
Emea nutanix overview presentation emea
PPTX
CYBER THREAT ASSESSMENT
Nuova presentazione Lan & Wan Solutions Fortinet Partner
Nuova presentazione Lan & Wan Solutions
Mc business solutions set
Mc partner playbook
Secure Access Architecture
Advanced Threat Protection
scheda tecnica smartphone zona 1.21 e zona 2.22
scheda tecnica smartphone zona 1.21 e zona 2.22
Scheda tecnica hspa 08
Antenne filari
Antenne multifilari
Emea nutanix overview presentation emea

Recently uploaded (20)

PPTX
Board-Reporting-Package-by-Umbrex-5-23-23.pptx
PPTX
Astra-Investor- business Presentation (1).pptx
PDF
Keppel_Proposed Divestment of M1 Limited
PDF
NEW - FEES STRUCTURES (01-july-2024).pdf
PDF
PMB 401-Identification-of-Potential-Biotechnological-Products.pdf
PDF
Chapter 2 - AI chatbots and prompt engineering.pdf
PPTX
operations management : demand supply ch
PPTX
2 - Self & Personality 587689213yiuedhwejbmansbeakjrk
PDF
Ron Thomas - Top Influential Business Leaders Shaping the Modern Industry – 2025
PDF
1911 Gold Corporate Presentation Aug 2025.pdf
PPTX
svnfcksanfskjcsnvvjknsnvsdscnsncxasxa saccacxsax
DOCX
FINALS-BSHhchcuvivicucucucucM-Centro.docx
PDF
NISM Series V-A MFD Workbook v December 2024.khhhjtgvwevoypdnew one must use ...
PPTX
BUSINESS CYCLE_INFLATION AND UNEMPLOYMENT.pptx
PPTX
basic introduction to research chapter 1.pptx
PDF
Charisse Litchman: A Maverick Making Neurological Care More Accessible
PDF
#1 Safe and Secure Verified Cash App Accounts for Purchase.pdf
PPTX
CTG - Business Update 2Q2025 & 6M2025.pptx
PPTX
chapter 2 entrepreneurship full lecture ppt
PDF
ICv2 White Paper - Gen Con Trade Day 2025
Board-Reporting-Package-by-Umbrex-5-23-23.pptx
Astra-Investor- business Presentation (1).pptx
Keppel_Proposed Divestment of M1 Limited
NEW - FEES STRUCTURES (01-july-2024).pdf
PMB 401-Identification-of-Potential-Biotechnological-Products.pdf
Chapter 2 - AI chatbots and prompt engineering.pdf
operations management : demand supply ch
2 - Self & Personality 587689213yiuedhwejbmansbeakjrk
Ron Thomas - Top Influential Business Leaders Shaping the Modern Industry – 2025
1911 Gold Corporate Presentation Aug 2025.pdf
svnfcksanfskjcsnvvjknsnvsdscnsncxasxa saccacxsax
FINALS-BSHhchcuvivicucucucucM-Centro.docx
NISM Series V-A MFD Workbook v December 2024.khhhjtgvwevoypdnew one must use ...
BUSINESS CYCLE_INFLATION AND UNEMPLOYMENT.pptx
basic introduction to research chapter 1.pptx
Charisse Litchman: A Maverick Making Neurological Care More Accessible
#1 Safe and Secure Verified Cash App Accounts for Purchase.pdf
CTG - Business Update 2Q2025 & 6M2025.pptx
chapter 2 entrepreneurship full lecture ppt
ICv2 White Paper - Gen Con Trade Day 2025

160415 lan and-wan-secure-access-architecture

  • 1. © Copyright Fortinet Inc. All rights reserved. Secure Access Architecture Alessandro Berta – Systems Engineer 15 Aprile 2016
  • 2. 2 Trend: Device Growth Continues More devices and newer device types are entering the network  33 Billion endpoints projected to be connected by 2020 – Gartner  New device types entering the network » ‘headless’ IoT, wireless sensor nodes, beacons, wearables
  • 3. 3 Trend: Devices Going Wireless Wi-Fi becoming the primary access medium © Nemertes Research, August 2015 9% 7% 13% 35% 36% 0% 10% 20% 30% 40% 50% Other ZigBee Bluetooth Wi-Fi Ethernet Percent of Respondents LANAccessTechnologies 2014 • Each generation of Wi-Fi technology accelerates the migration to wireless for users IoT Access Technology Predications © Infonetics, M2M Strategies by Vertical: N. American Enterprise Survey, January 2014 64% Wireless • IoT devices going wireless
  • 4. 4 Trend: Need for More Speed Migration to 802.11ac continues 1st Generation 1997-1998 2nd Generation 1999-2001 3rd Generation 2002-2006 4th Generation 2007-2011 5th Generation Now 802.11 2 Mbps 802.11b 11 Mbps 802.11g/a 54 Mbps 802.11n 450 Mbps 802.11ac Gigabit Mbps Infonetics, Wireless LAN Equipment Quarterly Worldwide and Regional Market Share: 4Q14 Migration to 802.11acWi-Fi Standards Evolution
  • 5. 5 Trend: Seamless User Experience A unified access experience is the expected norm  Users utilize multiple devices in the enterprise » Wireless: smartphone, tablets » Wired: desktops, workstations  Consistent user experience is the norm » Consistent policies for access, application, security  Seamless device experience » New device types must be provisioned appropriately » “Headless” devices – IoT Access Points Switch Wireless Wired Authentication
  • 6. 6 Wireless - the Weakest Link Endpoint Core network infrastructure Wireless Databases Applications Storage Email Worldwide 45% 29% 49% 25% 17% 11% 25% Americas 43% 28% 50% 27% 17% 12% 23% EMEA 47% 27% 52% 22% 17% 10% 24% APAC 43% 31% 44% 25% 18% 10% 29% 0% 10% 20% 30% 40% 50% 60% WLAN Ranked as the Most Vulnerable IT infrastructure Source: Fortinet Security Census 2015, 1490 respondents
  • 7. 7 Expectations are on the Rise Need More Speed Migration to 802.11ac Seamless Unified Experience Unified Network Operations Application Growth Move to wireless Device Growth
  • 8. 8 Combine Security and Access Need More Speed Migration to 802.11ac Seamless Unified Experience Unified Network Operations Application Growth Move to wireless Device Growth SECURE ACCESS ARCHITECTURE
  • 9. 9 FortiPresence FortiAuthenticator FortiManager FortiWLM FortiClient FortiWiFi FortiWLC FortiAP FortiGate Controller FortiSwitch (POE) SECURE ACCESS ARCHITECTURE N Why Fortinet?
  • 10. 10 Complete Secure Access Offerings Note: formally Meru Networks Cloud APSwitch Cloud (Cloud Management) Security + WLAN Management APSwitch Integrated (Integrated Controller) AP Security WLAN Management Switch Infrastructure (Dedicated Controller) 1 2 3
  • 11. 11 Fortinet Offers More Choices Infrastructure (Dedicated Controller) Integrated (Integrated Controller) Cloud (Cloud Management) Distributed Enterprise (Retail / QSR)   Healthcare / Financials   K-12 / Primary / Secondary School   Higher Education  Large Public Venue 
  • 13. 13 Why Infrastructure? 1  Mobile: Fit for highly mobile deployments  Flexible: Many deployment options  Stand-alone: Able to separate access purchase decision from security FortiWLC-50D FortiWLC-200D FortiWLC-500D Infrastructure Wireless
  • 14. 14 Infrastructure Wireless Multi-Channel One channel to simplify deployment and seamless roaming Multiple channels to maximize spectrum reuse and performance Single Channel + Virtual Cell 36 36 36 36 36 36 36 36 36 36 Multiple channels to segment application traffic and add capacity Channel Layers + Virtual Cells 36 36 36 36 36 36 36 58 58 5844 44 44 44 44 44 44 42 42 42 149 149 149 149 149 149 149 149 149 149 1
  • 15. 15 Infrastructure Wireless Network In Control Fortinet decides when clients roam for best possible user experience in time-sensitive applications. Mobile Fit for highly mobile and scalable deployments where low latency and roaming support matter Controlling the User Experience 1
  • 16. 16 Client-in-control: the “Sticky Clients” issue Scanners and VoIP handsets re-charging in the cradles 1
  • 17. 17 Client-in-control: the “Sticky Clients” issue WiFi Client tend to stick to the same AP, depending on their NIC driver 1
  • 18. 18 Client-in-control: the “Sticky Clients” issue The AP-Client links are barely optimized. Many connections are at long distance, weak signal, low data rate, scarce throughput. 1
  • 19. 19 Network-in-control Optimized Distribution of Clients Wi-Fi Clients are always associated to the best AP: higher signal, faster data rate, better performance, AP’s are not congested by far-away clients. 1
  • 20. 20 Roaming is really Seamless and at the right time 20 X Multi-Channel Virtual Cell 100 ms – 3 seconds between handoff 5 - 10 ms between handoff X 1
  • 22. 22 Integrated Wireless Security Access Control  Enterprise WLAN controller  Rogue AP and WIDS  Integrated captive portal  Tunnel, bridge and mesh  Single pane of glass  Unified wired/wireless  Application control  FortiGuard Services Security 2
  • 23. 23 Integrated Wireless  Every FortiGate includes a WLAN controller  Largest range of controllers in the industry  Support ranges from 5 APs (100 users) up to 10K APs (32,000 users) 2
  • 25. FortiView > Device topology (SSID and VLAN)2
  • 27. FortiView > Applications > Drill Down > Sessions2
  • 30. 30 Why Cloud? 3 FAP-S323C 802.11ac 3x3:3 FAP-S321C 802.11ac 3x3:3  Secure: Industry’s only UTM + AP solution  Cloud: Roll out remote sites in minutes - not hours and days  Controller-less: Wi-Fi without the complexity of on premise controllers Cloud Wireless
  • 31. 31 Competitor Cloud Wi-Fi FortiAP-S Series Connection Credential Lookup Authentication Gap in Security Protection Continue to Wire Connection Credential Lookup Authentication IPS, AV, Botnet URL Filter, App Control Continue to Wire  Managed by FortiCloud  No controller required  FortiGuard services run on each AP  Simplifies deployment and management Cloud Wireless3
  • 32. 32 Cloud Wireless Intrusion Prevention System Antivirus and Anti-botnet L7 Application Control Web Filtering 3
  • 33. Other Secure Access related products Secure Access Architecture
  • 34. 34 FortiPlanner  Wireless LAN Planning and Real-Time Visualization Software  Free download for deployments of up to 30 FortiAPs.  Pro license supports unlimited FortiAPs and enables Site Survey and Real-Time Heat-map features FortiPlanner wireless deployment planning FortiPlanner wireless site survey
  • 35. 35 FortiPresence Presence Analytics Solution Uses existing in-store FortiAP or FortiWiFi access points to collect the WiFi signal information from the smartphones of visitors.  Solution Components: » FortiAP or FortiWiFi - Detects WiFi signal from smartphones » FortiGate or FortiWLC - Aggregates signal information from multiple APs » FortiPresence Cloud – Processes data and presents analytics on dashboard FortiPresence
  • 36. 36 FortiPresence  Total visitor traffic  Real time visit capture rate  Dwell time duration  A/B comparison across stores  Repeat visitors, frequency  VIP Alert  Heat maps with animated flows  Real-time density, staff resources  Measure marketing campaign effectiveness
  • 37. 37 FortiSwitch Why FortiSwitch?  Control: Managed and secured from FortiGate GUI  Power: Full PoE+ power for APs and other Power over Ethernet devices  Stackable: 1GbE, 10GbE and 40GbE with stacking capability
  • 38. 38 FortiGate Switch Management » Fortilink protocol for secure management » Visibility into port speed/status » Centrally manage VLANs » Apply security policy » Authenticate clients centrally via 802.1x or captive portal FortiSwitch
  • 39. 39 FortiPresence FortiAuthenticator FortiManager FortiWLM FortiClient FortiWiFi FortiWLC FortiAP FortiGate Controller FortiSwitch (POE) SECURE ACCESS ARCHITECTURE N