Makara MEAS
Makara MEAS
  • 128
  • 172 010
Free Secure Digital Transformation - Best Practices and Strategies
Free Secure Digital Transformation - Best Practices and Strategies
Course Introduction
In this 45 minute learning experience a student can expect to learn about digital transformation, which involves using technology to fundamentally change how organizations operate in order to adapt to new market trends and customer experience requirements.
Your instructor also discusses the differences between digitization, digitalization, automation, and digital transformation and the importance of cybersecurity in digital transformation. Additionally, the course explains how digital transformation can be used to improve customer experience and increase efficiency, and how it can be successfully implemented through a well-planned strategy and the involvement of all stakeholders.
Credit to AttackIQ
This course explains the four key areas of focus in digital transformation:
process transformation,
business model transformation,
domain transformation,
and cultural/organizational transformation.
Go to course: www.academy.attackiq.com/courses/secure-digital-transformation-best-practices-and-strategies
ចូលរួម Telegram Community ៖ t.me/NetworkCybersecurityKH
បើមានចំណាប់អារម្មណ៍រៀនវគ្គជាច្រើនទៀតជាមួយខ្ញុំ នៅវិទ្យាស្ថានប្រសិទ្ធ (ប្រសិទ្ធភាព)​ ព័តមានបន្ថែម៖​ www.proseth.institute/course
𝐃𝐢𝐬𝐜𝐥𝐚𝐢𝐦𝐞𝐫 - This post has only been shared for an educational and knowledge-sharing purpose related to Technologies. Information was obtained from the source above source. All rights and credits are reserved for the respective owner(s).
Don’t forget to like, subscribe, and hit the notification bell for more insights to explore the Digital Frontier: Dive into the world of IT and Cybersecurity with me, where we work smart, live tech, play with innovation, and learn without limits.
#cybereducation #cybersec #cyberexposure #strategiccybersecuritymanagement #cybersecurity #digitaltransformation
มุมมอง: 24

วีดีโอ

Scheduling in FortiGate Firewall?
มุมมอง 9021 วันที่ผ่านมา
WHAT IS SCHEDULING? In FortiGate Firewall Scheduling allows administrators to apply different shaping profiles at different times to control network traffic: 1. Traffic shaping schedules: Administrators can use different schedule types, such as one-time, recurring, or schedule groups. If no schedule is set, the current date and time are not used to match traffic. 2. Firewall policy expiration: ...
Free Ethical Hacker Course
มุมมอง 78หลายเดือนก่อน
Free Ethical Hacker Course Course overview The digital landscape is evolving at an unprecedented rate and cyber threats lurk around every corner. Cybersecurity resilience in the modern world cannot be just an add on - it's a necessity. Offensive security professionals like ethical hackers and penetration testers can help proactively discover unknown threats and address them before the cybercrim...
Incident Response in a Distributed Workforce Using Cloud Forensics by Azam Khan | EC-Council
มุมมอง 153หลายเดือนก่อน
In this insightful session, Azam Khan delves into the evolving landscape of incident response in a distributed workforce, focusing on the critical role of cloud forensics. As businesses transition to cloud environments and remote work becomes the norm, the need for robust incident response strategies has never been more urgent. Azam Khan, a seasoned expert in cybersecurity and digital forensics...
VXLAN Fundamentals, what is VXLAN?
มุมมอง 1322 หลายเดือนก่อน
VXLAN Fundamentals What is VXLAN? VXLAN (Virtual Extensible LAN) is a network virtualization technology that encapsulates Layer 2 Ethernet frames in Layer 4 UDP packets. This allows for the creation of a virtualized Layer 2 network over a Layer 3 infrastructure. As cloud computing and data centers grow, traditional VLANs face limitations, especially in scalability and multi-tenancy and challeng...
Free Strategic Cybersecurity Management Course
มุมมอง 412 หลายเดือนก่อน
Free Strategic Cybersecurity Management from AttackIQ Course Introduction This past year broke all records for data breach losses and cyber attacks on companies, governments, and individuals. Compounding the pandemic impact, emerging technologies such as machine learning, artificial intelligence, and 5G increased the complexity of attack surface areas. Adversaries demonstrated new levels of sop...
Cambodia's Internet Development KHNOG6 Presented by Mr.Makito
มุมมอง 662 หลายเดือนก่อน
In this video, we explore the fascinating history of internet development in Cambodia, tracing its journey from the early plans in 1994 to the establishment of a robust internet infrastructure in 1998 and till now. Beginning with the government's vision in the mid-90s, this presented by Mr.Makito discuss the initial steps taken to introduce internet access to the nation, overcoming significant ...
What is DNSSEC?
มุมมอง 392 หลายเดือนก่อน
តើអ្វីទៅជា, What is DNSSEC? DNSSEC, or Domain Name System Security Extensions, is a suite of extensions to DNS that adds a layer of security to prevent attacks like DNS spoofing. It ensures that the responses to DNS queries are authentic and have not been tampered with by using digital signatures. This helps verify that the information received is legitimate and comes from the expected source. ...
Free Cybersecurity Exposure Management Course
มุมมอง 662 หลายเดือนก่อน
Free Cybersecurity Exposure Management Course About This Exposure Management Course: This comprehensive and hands-on course is a great way to master the fundamentals of Exposure Management and build your organization’s exposure management strategy. Attendees will come out with a thorough understanding of the types of exposures that put critical assets at risk. Link to XM Cyber: xmcyber.com/expo...
The Human Factor Behind APT Groups, Presented by Azam Khan
มุมมอง 514 หลายเดือนก่อน
Welcome to The Human Factor Behind APT Groups, presented by Azam Khan. In this insightful session, he delve into the critical role human behavior plays in the operations and success of Advanced Persistent Threat (APT) groups. We'll explore: The psychological tactics used by APT groups to manipulate targets Common behavioral patterns and how they contribute to the effectiveness of these threats ...
The Cyber Kill Chain, The Seven Steps of a Cyberattack
มุมมอง 1204 หลายเดือนก่อน
The Cyber Kill Chain® framework is part of the Intelligence Driven Defense® model for identification and prevention of cyber intrusions activity. The model identifies what the adversaries must complete in order to achieve their objective. The seven steps of the Cyber Kill Chain® enhance visibility into an attack and enrich an analyst’s understanding of an adversary’s tactics, techniques and pro...
The Important of Mobile Security by SecIron
มุมมอง 504 หลายเดือนก่อน
Title: The Importance of Mobile Security | SecIron Description: In today’s digital world, our smartphones are more than just communication tools-they’re gateways to our personal and financial lives. At SecIron, we understand the critical importance of mobile security and how it impacts your everyday life. In this short video, we SecIron team will show only high level of important of Mobile Secu...
របៀប Configure Web Filter នៅក្នុង FortiGate NGFW | How to Configure Web Filter in FortiGate NGFW
มุมมอง 1724 หลายเดือนก่อน
របៀប Configure Web Filter នៅក្នុង FortiGate NGFW | How to Configure Web Filter in FortiGate NGFW
Cyber Threat Intelligence (CTI) Essential
มุมมอง 835 หลายเดือนก่อน
Cyber Threat Intelligence (CTI) Essential
Fortinet Certified Associate in Cybersecurity [FREE Certificate]
มุมมอง 1625 หลายเดือนก่อน
Fortinet Certified Associate in Cybersecurity [FREE Certificate]
របៀប Block Antivirus នៅក្នុង FortiGate NGFW | How to block Antivirus Effectively in FortiGate NGFW
มุมมอง 1255 หลายเดือนก่อน
របៀប Block Antivirus នៅក្នុង FortiGate NGFW | How to block Antivirus Effectively in FortiGate NGFW
Fortinet Certified Fundamentals in Cybersecurity [FREE Certificate]
มุมมอง 1655 หลายเดือนก่อน
Fortinet Certified Fundamentals in Cybersecurity [FREE Certificate]
មូលដ្ឋានគ្រឹះ នៃប្រព័ន្ធបណ្តាញណេតវើក Network Support and Security
มุมมอง 915 หลายเดือนก่อน
មូលដ្ឋានគ្រឹះ នៃប្រព័ន្ធបណ្តាញណេតវើក Network Support and Security
FortiGate NGFW Dashboard Overall Overview 7.4
มุมมอง 1565 หลายเดือนก่อน
FortiGate NGFW Dashboard Overall Overview 7.4
មូលដ្ឋានគ្រឹះ នៃប្រព័ន្ធបណ្តាញណេតវើក Network Addressing and Troubleshooting
มุมมอง 1035 หลายเดือนก่อน
មូលដ្ឋានគ្រឹះ នៃប្រព័ន្ធបណ្តាញណេតវើក Network Addressing and Troubleshooting
មូលដ្ឋានគ្រឹះ នៃប្រព័ន្ធបណ្តាញណេតវើក Networking Devices and Initial Configuration
มุมมอง 806 หลายเดือนก่อน
មូលដ្ឋានគ្រឹះ នៃប្រព័ន្ធបណ្តាញណេតវើក Networking Devices and Initial Configuration
មូលដ្ឋានគ្រឹះ នៃប្រព័ន្ធបណ្តាញណេតវើក Cisco Networking Basics
มุมมอง 2186 หลายเดือนก่อน
មូលដ្ឋានគ្រឹះ នៃប្រព័ន្ធបណ្តាញណេតវើក Cisco Networking Basics
មូលដ្ឋានគ្រឹះ វគ្គសិក្សានៃប្រព័ន្ធបណ្តាញណេតវើក និង សន្ដិសុខសាយប័រ
มุมมอง 1386 หลายเดือนก่อน
មូលដ្ឋានគ្រឹះ វគ្គសិក្សានៃប្រព័ន្ធបណ្តាញណេតវើក និង សន្ដិសុខសាយប័រ
Navigating the Future of Network Connectivity and Performance [Fortinet Accelerate Asia 2024]
มุมมอง 1386 หลายเดือนก่อน
Navigating the Future of Network Connectivity and Performance [Fortinet Accelerate Asia 2024]
Web Application Protection Critical Use Cases [Fortinet Accelerate Asia 2024]
มุมมอง 416 หลายเดือนก่อน
Web Application Protection Critical Use Cases [Fortinet Accelerate Asia 2024]
ខ្លះៗអំពី SD-WAN Concepts, Benefits and Advantages
มุมมอง 1357 หลายเดือนก่อน
ខ្លះៗអំពី SD-WAN Concepts, Benefits and Advantages
FortiGate Administration Firewall Policy and Traffic Shapers Part 4
มุมมอง 118ปีที่แล้ว
FortiGate Administration Firewall Policy and Traffic Shapers Part 4
FortiGate Administration Basic Networking and SD-WAN Part 3
มุมมอง 116ปีที่แล้ว
FortiGate Administration Basic Networking and SD-WAN Part 3
FortiGate Administration Initialize Setup and Administrative Access Part 2
มุมมอง 82ปีที่แล้ว
FortiGate Administration Initialize Setup and Administrative Access Part 2
FortiGate Platform Concepts and Operation Modes Part 1
มุมมอง 326ปีที่แล้ว
FortiGate Platform Concepts and Operation Modes Part 1

ความคิดเห็น

  • @HuylengLong
    @HuylengLong 20 วันที่ผ่านมา

    Thanks for sharing teacher 😊

    • @makaramh18
      @makaramh18 20 วันที่ผ่านมา

      ❤❤

  • @deluxsoman6197
    @deluxsoman6197 20 วันที่ผ่านมา

    Thank you for your great sharing

    • @makaramh18
      @makaramh18 20 วันที่ผ่านมา

      Thank my expert

  • @betta.natural.official
    @betta.natural.official หลายเดือนก่อน

    Hello Bong Could you configure vxlan for clearly for example?

    • @makaramh18
      @makaramh18 หลายเดือนก่อน

      Which product do you prefer, bro?

    • @betta.natural.official
      @betta.natural.official หลายเดือนก่อน

      @@makaramh18 Core Cisco Switch Bong

  • @VarshanSreekumar
    @VarshanSreekumar หลายเดือนก่อน

    English please

    • @makaramh18
      @makaramh18 หลายเดือนก่อน

      Let me try my friend, anyway you can go description for link to course

  • @muhammmadarija6452
    @muhammmadarija6452 3 หลายเดือนก่อน

    thankyou so much bro

    • @makaramh18
      @makaramh18 2 หลายเดือนก่อน

      Thank you dear

  • @nad-132noor-ul-ain
    @nad-132noor-ul-ain 4 หลายเดือนก่อน

    Invisible, bad quality of movie.

  • @vornsavan3342
    @vornsavan3342 4 หลายเดือนก่อน

    Thanks for your share. Can you demo how to get a free certificate in Palo Alto?

    • @makaramh18
      @makaramh18 4 หลายเดือนก่อน

      PA also have some free cert, let me check

  • @alexxnang
    @alexxnang 4 หลายเดือนก่อน

    thanks for your sharing teacher, I learned much more with this video, appreciated your sharing

    • @makaramh18
      @makaramh18 4 หลายเดือนก่อน

      Glad it was helpful bro

  • @hornchamroeun6064
    @hornchamroeun6064 4 หลายเดือนก่อน

    Quality video ❤

    • @makaramh18
      @makaramh18 4 หลายเดือนก่อน

      Thank bro, will share another AV + Web work together to support cyber kill chain very soon

  • @houysunnet1603
    @houysunnet1603 4 หลายเดือนก่อน

    I appreciate your sharing teacher 🙏🙏

    • @makaramh18
      @makaramh18 4 หลายเดือนก่อน

      You are very welcome b

  • @VEASNATENG168
    @VEASNATENG168 5 หลายเดือนก่อน

    🥰🥰🥰

    • @makaramh18
      @makaramh18 4 หลายเดือนก่อน

      Thank bro

  • @hornchamroeun6064
    @hornchamroeun6064 5 หลายเดือนก่อน

    សុំមេរៀនបន្ត បង!

    • @makaramh18
      @makaramh18 5 หลายเดือนก่อน

      ចង់បានមួយណាមុន? បងធ្វើអោយ

    • @hornchamroeun6064
      @hornchamroeun6064 5 หลายเดือนก่อน

      @@makaramh18 មួយណាមុនក៏បានបង អរគុណចំពោះការចែករំលែកបង🥰!!

    • @makaramh18
      @makaramh18 5 หลายเดือนก่อน

      ​@hornchamroeun6064 okay thank bro

    • @makaramh18
      @makaramh18 4 หลายเดือนก่อน

      th-cam.com/video/NzuqX1_DpvU/w-d-xo.html

  • @kongpanha1816
    @kongpanha1816 5 หลายเดือนก่อน

    Thanks bro. 🙂👌

    • @makaramh18
      @makaramh18 5 หลายเดือนก่อน

      Thank you so much b, have a nice with this course FREE.

  • @mouyleangchhorn683
    @mouyleangchhorn683 5 หลายเดือนก่อน

    I signed up with Cisco networking academy but I don't see course (Networking basic).

    • @makaramh18
      @makaramh18 5 หลายเดือนก่อน

      Sign up and enroll by this link: skillsforall.com/course/networking-basics?courseLang=en-US

  • @mouyleangchhorn683
    @mouyleangchhorn683 5 หลายเดือนก่อน

    So good

    • @makaramh18
      @makaramh18 5 หลายเดือนก่อน

      Thank mate

  • @kongpanha1816
    @kongpanha1816 5 หลายเดือนก่อน

    Thanks bro. 👍

    • @makaramh18
      @makaramh18 5 หลายเดือนก่อน

      Welcome b 👍 Keep learning :)

  • @kongpanha1816
    @kongpanha1816 6 หลายเดือนก่อน

    🥰❤

  • @houysunnet1603
    @houysunnet1603 6 หลายเดือนก่อน

    Next video teacher 😊

    • @makaramh18
      @makaramh18 6 หลายเดือนก่อน

      Haha, busy and unable to continue next part. Let me check sometime

  • @kongpanha1816
    @kongpanha1816 6 หลายเดือนก่อน

    • @makaramh18
      @makaramh18 6 หลายเดือนก่อน

      Keep learning b

  • @alexxnang
    @alexxnang 6 หลายเดือนก่อน

    thanks for sharing b :-)

    • @makaramh18
      @makaramh18 6 หลายเดือนก่อน

      Thank brother

  • @kongpanha1816
    @kongpanha1816 6 หลายเดือนก่อน

    • @makaramh18
      @makaramh18 6 หลายเดือนก่อน

      Please enjoy b 🎉

  • @PuSnaOfficials
    @PuSnaOfficials 6 หลายเดือนก่อน

    Ok boss ❤

    • @makaramh18
      @makaramh18 6 หลายเดือนก่อน

      🤝

  • @VireachYemViReach
    @VireachYemViReach 6 หลายเดือนก่อน

    Dear Brother, I suggest you explains speak khmer.and thank you.

    • @makaramh18
      @makaramh18 6 หลายเดือนก่อน

      Okay sure Will release for Khmer version very soon

  • @tityasaknem5538
    @tityasaknem5538 6 หลายเดือนก่อน

    Very handsome my brother, best session

    • @makaramh18
      @makaramh18 6 หลายเดือนก่อน

      You are right b

  • @deluxsoman6197
    @deluxsoman6197 6 หลายเดือนก่อน

    Good Event

    • @makaramh18
      @makaramh18 6 หลายเดือนก่อน

      Yep Superior

  • @voleakhe7157
    @voleakhe7157 6 หลายเดือนก่อน

    Good

  • @7madonna7
    @7madonna7 7 หลายเดือนก่อน

    I love the chicken bros

  • @hermannako9588
    @hermannako9588 11 หลายเดือนก่อน

    Can You make a step by step video ? Because I have followed your instructions but my router can ping cloud or go to Internet

    • @makaramh18
      @makaramh18 6 หลายเดือนก่อน

      You need to connect network adaptor together with lab

  • @vibolul2422
    @vibolul2422 ปีที่แล้ว

    Hey bro, how we configure use some of service (like AD)?

    • @makaramh18
      @makaramh18 6 หลายเดือนก่อน

      I am sure service like you refer b, normally after we have done peer VPN, we can access to destination per required, if b refer to use AD user for VPN IPsec, we have another method to achievement this.

  • @reynaldorm3804
    @reynaldorm3804 ปีที่แล้ว

    I have seen this kind of configuration on a olt, when sharing the same Tcont profile all vlans share the maximum bandwidth configured in the profile, there is no priority or qos for the service at least in this specific way. There is another way to configure that is by creating different DBA profiles and assigning specific Tconts for each DBA profile in this way you can give priority in a network with multiple different services such as voice, video and data. Thank you very much for sharing the configuration. Want to know how, check out the following comment...

    • @reynaldorm3804
      @reynaldorm3804 ปีที่แล้ว

      VLANS: 1502 INTERNET 1503 VOIP 1504 IPTV For this configuration it is assumed that the chassis is 0, the slot is 2, the port is 0 and the ONU-ID is 0 The ONU/ONT has 4 ethernet ports (rj45) and 1 POTS (rj11) for telephony. #Creation of DBA's MA5800-X15(config)#dba-profile add profile-name DBA_INTERNET type4 max 1024000 MA5800-X15(config)#dba-profile add profile-name DBA_IPTV type3 assure 2048 max 10240 MA5800-X15(config)#dba-profile add profile-name DBA_VOIP type2 assure 1024 #Creation of Line Profile MA5800-X15(config)#ont-lineprofile gpon profile-name LP_INTERNET_IPTV_VOIP MA5800-X15(config-gpon-lineprofile-6)#mapping-mode priority MA5800-X15(config-gpon-lineprofile-6)#tcont 1 dba-profile-name DBA_INTERNET MA5800-X15(config-gpon-lineprofile-6)#tcont 2 dba-profile-name DBA_IPTV MA5800-X15(config-gpon-lineprofile-6)#tcont 3 dba-profile-name DBA_VOIP MA5800-X15(config-gpon-lineprofile-6)#gem add 1 eth tcont 1 MA5800-X15(config-gpon-lineprofile-6)#gem add 2 eth tcont 2 MA5800-X15(config-gpon-lineprofile-6)#gem add 3 eth tcont 3 MA5800-X15(config-gpon-lineprofile-6)#gem mapping 1 1 priority 0 MA5800-X15(config-gpon-lineprofile-6)#gem mapping 2 2 priority 2 MA5800-X15(config-gpon-lineprofile-6)#gem mapping 3 3 priority 5 MA5800-X15(config-gpon-lineprofile-6)#commit MA5800-X15(config-gpon-lineprofile-6)#quit #Traffic tables creation MA5800-X15(config)#traffic table ip name "100M_UP" cir 102400 pir 102400 priority 0 priority-policy local-Setting MA5800-X15(config)#traffic table ip name "100M_DOWN" cir 102400 pir 102400 priority 0 priority-policy local-Setting MA5800-X15(config)#traffic table ip name "30M_UP" cir 30720 pir 30720 priority 0 priority-policy local-Setting MA5800-X15(config)#traffic table ip name "30M_DOWN" cir 30720 pir 30720 priority 0 priority-policy local-Setting MA5800-X15(config)#traffic table ip name "5M_UP" cir 5120 pir 5120 priority 0 priority-policy local-Setting MA5800-X15(config)#traffic table ip name "5M_DOWN" cir 5120 pir 5120 priority 0 priority-policy local-Setting #Creation of Service Profile MA5800-X15(config)#ont-srvprofile gpon SRV_PROFILE_TRIPLE_PLAY MA5800-X15(config-gpon-srvprofile-9)#ont-port pots 1 eth 4 catv 0 MA5800-X15(config-gpon-srvprofile-9)#commit MA5800-X15(config-gpon-srvprofile-9)#quit ------- #ONT Authorization with Triple Play MA5800-X15(config)#interface gpon 0/2 MA5800-X15(config-if-gpon-0/2)#ont add 0 0 sn-auth 485754431B2CA496 omci ont-lineprofile-name LP_INTERNET_IPTV_VOIP ont-srvprofile-name SRV_PROFILE_TRIPLE_PLAY desc "ONU_INTERNET_IPTV_VOIP" MA5800-X15(config-if-gpon-0/2)#quit #Create service ports for ONT MA5800-X15(config)#service-port 100 vlan 1502 gpon 0/2/0 ont 0 gemport 1 multi-service user-vlan 1502 tag-transform translate inbound traffic-table name 100M_UP outbound traffic-table name 100M_DOWN MA5800-X15(config)#service-port 200 vlan 1503 gpon 0/2/0 ont 0 gemport 2 multi-service user-vlan 1503 tag-transform translate inbound traffic-table name 5M_UP outbound traffic-table name 5M_DOWN MA5800-X15(config)#service-port 300 vlan 1504 gpon 0/2/0 ont 0 gemport 3 multi-service user-vlan 1504 tag-transform translate inbound traffic-table name 30M_UP outbound traffic-table name 30M_DOWN #Configuration of ethernet ports for the ONT MA5800-X15(config)#interface gpon 0/2 MA5800-X15(config-if-gpon-0/2)#ont port native-vlan 0 0 eth 1 vlan 1502 priority 0 MA5800-X15(config-if-gpon-0/2)#ont port route 0 0 eth 1 unconcern MA5800-X15(config-if-gpon-0/2)#ont port native-vlan 0 0 eth 2 vlan 1502 priority 0 MA5800-X15(config-if-gpon-0/2)#ont port route 0 0 eth 2 unconcern MA5800-X15(config-if-gpon-0/2)#ont port native-vlan 0 0 eth 3 vlan 1502 priority 0 MA5800-X15(config-if-gpon-0/2)#ont port route 0 0 eth 3 unconcern MA5800-X15(config-if-gpon-0/2)#ont port native-vlan 0 0 eth 4 vlan 1504 priority 0 MA5800-X15(config-if-gpon-0/2)#ont port route 0 0 eth 4 unconcern

    • @makaramh18
      @makaramh18 6 หลายเดือนก่อน

      Thank you

  • @imedisklinika2436
    @imedisklinika2436 ปีที่แล้ว

    Love you <3

  • @reachchoeun3165
    @reachchoeun3165 ปีที่แล้ว

    😍

    • @makaramh18
      @makaramh18 7 หลายเดือนก่อน

      need next lessons?

  • @joseaguilarescobar4777
    @joseaguilarescobar4777 ปีที่แล้ว

    Se puede con Mikrotik y HP

    • @makaramh18
      @makaramh18 ปีที่แล้ว

      You can do it, just make sure both device are support protocol. For example if your HP switch configure using LACP Protocol, you make sure on Mikrotik can use LACP Protocol too.

  • @soundseffectfreeusenocopyr7542
    @soundseffectfreeusenocopyr7542 ปีที่แล้ว

    សួស្ដីបង​​​​​ បងបើយើងចង់អោយ​​​​​ local mail របស់យើងអាច​ send ទៅ external mail (mail ខាងក្រៅ)បាន យើង configure ដូចម្ដេចបង

    • @makaramh18
      @makaramh18 ปีที่แล้ว

      Kindly check this link bro. learn.microsoft.com/en-us/exchange/plan-and-deploy/post-installation-tasks/configure-mail-flow-and-client-access?view=exchserver-2019 Basically you need to make sure your mail server can reach to internet (SNAT) and from internet to your mail server (DNAT).

    • @soundseffectfreeusenocopyr7542
      @soundseffectfreeusenocopyr7542 ปีที่แล้ว

      អរគុណបង

  • @rakaadityaaripin
    @rakaadityaaripin 2 ปีที่แล้ว

    thanks :)

  • @potylifestyle257
    @potylifestyle257 2 ปีที่แล้ว

    good morning brother i wonder why i follow from you but my router can not access to internet ?

    • @makaramh18
      @makaramh18 ปีที่แล้ว

      Have you configure SNAT on Router?

  • @routeras
    @routeras 2 ปีที่แล้ว

    where can i download eNSP ? i dont understand ? is there a link in huawei site ? can you help me ?

    • @makaramh18
      @makaramh18 ปีที่แล้ว

      You can download in Huawei Community Forum. support.huawei.com/enterprise/en/nce-data-communication/ensp-pid-9017384/software

  • @akunprofessional6909
    @akunprofessional6909 2 ปีที่แล้ว

    Website invalid

  • @LopezIsra
    @LopezIsra 2 ปีที่แล้ว

    Por casualidad tienes el Script para generar los address list en el firewall??

  • @سرىصادقساده
    @سرىصادقساده 2 ปีที่แล้ว

    Hi sir can you help me of confirtion olt huwie

    • @makaramh18
      @makaramh18 2 ปีที่แล้ว

      what I can help you?

  • @Mrrtbrs
    @Mrrtbrs 2 ปีที่แล้ว

    Sound is horrible.

    • @makaramh18
      @makaramh18 ปีที่แล้ว

      Sorry, I will improve in the next video.

  • @timoteohernandezcruz6279
    @timoteohernandezcruz6279 2 ปีที่แล้ว

    Oye amigo me puede pasar el script para agregar 254 IP porfavor

    • @dfacnoi
      @dfacnoi 2 ปีที่แล้ว

      COPIA Y ADECUA EL SCRIPT YO YA LO HICE Y FUNCIONA DE MARAVILLA

  • @slametirwanto3871
    @slametirwanto3871 2 ปีที่แล้ว

    1:12

  • @JitendraSingh-kj9yz
    @JitendraSingh-kj9yz 3 ปีที่แล้ว

    THANKS

  • @abhijeetsamant
    @abhijeetsamant 3 ปีที่แล้ว

    Please make video again with good sound quality, you voice is very very low

    • @makaramh18
      @makaramh18 3 ปีที่แล้ว

      thank for your advise,

  • @akoyire
    @akoyire 3 ปีที่แล้ว

    I need more information on the type B protection. Kindly contact me at quobina@gmail.com. Thanks.

  • @abhishekchatterjee2548
    @abhishekchatterjee2548 3 ปีที่แล้ว

    in Site A new IPsec peer you put public IP and site B new IPsec peer you put local IP. Why?

    • @makaramh18
      @makaramh18 3 ปีที่แล้ว

      it is for lab purpose only, for site to site it required public IP for communicate, for this case you need to forward UDP port 500 if you wish to private IP or dialup VPN.

    • @makaramh18
      @makaramh18 ปีที่แล้ว

      Thank for your reply, you are right. This is for lab purpose only, make sure you reachable over internet, if you device NAT, you can do DNAT(port forward) UDP port 500.

  • @Parroteer
    @Parroteer 3 ปีที่แล้ว

    DES is a very slow encryption.. why not use AES256

    • @makaramh18
      @makaramh18 2 ปีที่แล้ว

      Because in my Mikrotik lab test support lower encryption, in real deployment VPN parameter you define it as best practice and make sure both device could support those parameter, For example if FortiGate support higher encryption , but Mikrotik support only 3DES, you need to configure base on that requirement.