- 23
- 70 163
Static Route
New Zealand
เข้าร่วมเมื่อ 15 พ.ย. 2021
Welcome to Static Route!
This channel is dedicated to learning about networking, from switching, routing, firewalls and a range of cybersecurity topics and a strong focus on Fortinet, Cisco as well as Palo Alto..
You found this channel because we share this passion in common..!!
This channel is dedicated to learning about networking, from switching, routing, firewalls and a range of cybersecurity topics and a strong focus on Fortinet, Cisco as well as Palo Alto..
You found this channel because we share this passion in common..!!
How the Internet REALLY Works: Longest Prefix Match Explained
In this video, we dive into the concept of Longest Prefix Match in routing. Learn how Fortigate and routers in general select the most specific route based on the longest subnet mask, ensuring accurate packet delivery even between subnets that have ip address conflicts! We'll explain how this process works using examples of IP addresses and routing tables. Understanding longest match is key for efficient network routing.
มุมมอง: 176
วีดีโอ
How to Configure DNAT (Virtual IP) on Fortigate
มุมมอง 22914 วันที่ผ่านมา
This video presents a routing scenario in which we have conflicting ip subnets between 2 sites, we take step by step approach to fully understand basic routing behavior by the Fortigate firewalls and we make use of destination NAT (Virtual IP) to make communication possible between these 2 conflicting networks. We do extensive troubleshooting at every step in our configuration process to really...
5 NAT Configurations You Must Learn on Fortigate RIGHT NOW
มุมมอง 26921 วันที่ผ่านมา
In this video we take a closer look into the different types of NAT on Fortigate, starting with the most common type of NAT which is source NAT with Overload or PAT on internet interface. Then we create and apply sNAT using an IP Pool, Destination NAT also known as Virtual IP, Virtual IP with Port Forwarding and finally how 1:1 NAT is configured.
Fortigate SSL VPN: User Authentication with LDAP
มุมมอง 2.1K3 หลายเดือนก่อน
In this comprehensive tutorial, we will guide you through the step-by-step process of setting up an SSL VPN on a Fortigate firewall with LDAP authentication. Whether you're a network administrator or an IT enthusiast, this video will provide you with the knowledge and tools you need to enhance your network security. 🔒 What You'll Learn: - Understanding SSL VPN and its benefits - Step-by-step co...
Ultimate ADVPN Setup Guide: BGP & OSPF Hub and Spoke
มุมมอง 2.2K5 หลายเดือนก่อน
Looking to set up ADVPN with BGP & OSPF Hub and Spoke configuration? This ultimate guide breaks down the process step by step for easy implementation.
The BEST Way to Set Up an IPSec VPN With Loopback Interface
มุมมอง 1.1K6 หลายเดือนก่อน
Learn how to set up a site-to-site IPSec VPN with a loopback interface in this tutorial. Follow along for step-by-step instructions on creating a secure connection between two sites using this advanced networking technique. ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬ Song: Inspiring by Wavecont Music provided by [protunes.net](th-cam.com/users/redirect?event=video_description&redir_token=QUFFLUhqbTZJQktKdVltWEN4RF...
Configuring IP SLA in Fortinet is EASY! // Discover Link Monitor on Fortigate!
มุมมอง 1.7K6 หลายเดือนก่อน
Learn how to easily configure IP SLA in Fortinet firewalls with this step-by-step guide. Fortinet's implementation of IP SLA is known as Link Monitor and is a powerful tool for monitoring network performance, ensuring optimal operation, allowing your network to automatically failover to a secondary ISP link, dynamically remove from the route table a route via a failed link..! ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬...
Boost IPSec VPN Security with Signature Authentication!
มุมมอง 9486 หลายเดือนก่อน
How to set up an IPSec VPN with certificate authentication on Fortigate firewall in this step-by-step tutorial. We cover topics from generating Certificate Signing Request (CSR) to Public Key Infrastructure (PKI) user definition in successful certificate authentication.
How to setup BGP on Fortigate over Dial-up VPN Connections with Mode-config
มุมมอง 1.9K6 หลายเดือนก่อน
In this step-by-step tutorial, Learn how to setup BGP on Fortigate over Dial-up VPN connections, we use Mode-config for dynamic ip address allocation as well as iBGP to advertise networks between sites!
Sub-interfaces and Inter-VLAN Routing on Fortigate Firewall / Router on a stick configuration Guide
มุมมอง 1.7K6 หลายเดือนก่อน
In this comprehensive guide, we will walk you through the ultimate Router on a Stick setup on Fortigate firewall. Learn how to configure your firewall to enable communication between different VLANs on your network, securing data flow and enhancing network security.
Dial-Up VPN Setup WITHOUT Static IP! | FortiGate Configuration Guide
มุมมอง 7K7 หลายเดือนก่อน
In this video, we will walk you through the step-by-step process of setting up a Dial-Up VPN on FortiGate Firewall without the need for a static IP address on remote sites. If you're looking to establish a secure VPN connection behind a PPPoE or DHCP service, this configuration guide is perfect for you. Follow along to learn how to configure your FortiGate device for a Dial-Up VPN with ease. Do...
Fixing IPSec VPN NAT Issue Once and For All
มุมมอง 1.7K7 หลายเดือนก่อน
In this comprehensive guide, we'll walk you through the challenges and solutions for setting up an IPSec VPN when it's located behind a Network Address Translation (NAT) device. We start by explaining why IPSec VPNs face issues when behind NAT, including the intricacies of IP address translation and how it affects VPN tunnels.Discover the concept of NAT Traversal and how it helps IPSec VPNs to ...
3 Simple Steps to Configure IPSec VPN on Fortigate
มุมมอง 2.1K7 หลายเดือนก่อน
In this video tutorial, we will guide you through the process of configuring an IPSec VPN on a Fortigate firewall in just 3 easy steps. Whether you're a beginner or an experienced network administrator, you'll find this guide straightforward and helpful. Stay tuned and learn how to set up your VPN quickly and efficiently on Fortigate.
Understanding the Fortigate Route Database (2024)
มุมมอง 5838 หลายเดือนก่อน
In this hands-on lab we take a closer look to understand the route database on the Fortigate Firewalls and the differences between the route table and route database. Fortigate firewalls maintain routes in 2 tables, the RIB & the FIB. Time line 0:00 - Intro 0:04 - Describing the Route Database 1:00 - Route table commands 1:23 - Understanding the route database
BGP Protocol: Prefix-lists and Route-maps
มุมมอง 2.1K8 หลายเดือนก่อน
This is a walkthrough on prefix-lists and route-maps on Fortigate firewalls, prefix-lists and route-maps are powerful features of BGP that enable administrators to implement fine-grained control over routing decisions, ensuring optimal traffic flow and network performance.
Fortigate BGP Soft-Reconfiguration Explained!
มุมมอง 1.2K8 หลายเดือนก่อน
Fortigate BGP Soft-Reconfiguration Explained!
Deploying Fortigate Firewall in AWS Like a Pro
มุมมอง 6K8 หลายเดือนก่อน
Deploying Fortigate Firewall in AWS Like a Pro
BGP on Fortigate - In depth Guide plus important topical exam concepts!
มุมมอง 10K8 หลายเดือนก่อน
BGP on Fortigate - In depth Guide plus important topical exam concepts!
What is a session table and how does it work on Fortigate Firewall..
มุมมอง 1.2K8 หลายเดือนก่อน
What is a session table and how does it work on Fortigate Firewall..
Fortigate IP Routing Features - What You Need To Know!
มุมมอง 5K9 หลายเดือนก่อน
Fortigate IP Routing Features - What You Need To Know!
Troubleshooting site-to-site VPN // Diagnose Debug Flow
มุมมอง 1.6K10 หลายเดือนก่อน
Troubleshooting site-to-site VPN // Diagnose Debug Flow
Disable auto-save on Fortigate // Auto-Restore after a failed Firewall Change
มุมมอง 66911 หลายเดือนก่อน
Disable auto-save on Fortigate // Auto-Restore after a failed Firewall Change
Mastering Site-to-Site IPSec Tunnel & SD-WAN Setup on Fortigate
มุมมอง 18K2 ปีที่แล้ว
Mastering Site-to-Site IPSec Tunnel & SD-WAN Setup on Fortigate
Nice
Excellent video, thank you.
Very good video, thanks for creating
Great explanation. Thanks
Great video. With BGP load balancing is it worth implementing SDWAN. I know SDWAN is a more granular way of moving round your traffic to depending upon type etc but if you just want to ensure all your traffic is getting out then SDWAN become redundant ? thanks, Chris.
Hi Chris, I understand what you mean, and you make a valid point. In that context BGP has many capabilities that overlap with those of SDWAN, but it’s also necessary to note they’re used for different specific purposes. For the most part, they’re used together.
This is a very nice explanation, just with 1 caveat and 1 thing you can actually do without changing host routes and without NAT. After setting the remote route on 1 host the ping instantly started working in your video. That might be (unintentionally) misleading because the remote host doesn't have valid path back. (no arp) With only host 1 configured with the route the ping from host 1 will reach host 2, but host 2 won't be able to send the reply. You can check this using tcpdump on host 2 and see it gets the icmp request, tries to arp, but it won't get an arp. If you really haven't changed both host routes before the ping worked, there is still some presence of NAT left. Remember that VIPs remain active along with their implicit behavior, even when the policy is disabled. It might behave like proxy arp and this might skew how the traffic is send one direction. A better option would be to actually use the proxy arp feature on the Fortigates to have the Fortigate respond to arp requests. This saves having to create the specific routes on all the individual hosts. I hope this helped :)
ow and keep making these videos !!!!
@djpsychic , You make 2 very valid points…I also feel like proxy arp should be a standalone topic 🤔
NAT is useful to resolve ip conflicts in routing, but even more effective is the technique using the longest prefix match. This is a fundamental routing concept that's an integral part of our everyday networks and path selection. I'd like to know how you handle routing conflicts in your day to day....
Thanks for the Video and voice is very clear without background music. Thanks for considering
I’m glad you like the video and appreciate the feedback.
This video is intended to simulate a potential scenario many of you will face more than once....As always please leave me your comments, I would love to hear some feedback and suggestions...
This video covers the basics of NAT, in a future video I'll discuss a way to resolve ip address conflicts using NAT...see you there
Fantastic video. I was really struggling getting this to work until now.
t3.medium has maximum 3 eni anyway.
Great video and explanation! Thank you and you've got a sub from me!
who is difrent region for subnet and fortigate?
Can I ask how you get so many fortigate vm account?
This is a great tutorial. Thanks for your hard work. Very understandable and the logic flows well.
hey i noticed that when you configured the set set-aspath on the two firewalls, you used much larger numbers: set set-aspath "100 200 300" vs set set-aspath "1000 2000 3000 4000" was that intentional? or should each config have the same values? such as: set set-aspath "100 200 300" and set set-aspath "100 200 300 400"
@@casalosa hey there, both methods are correct, even “100 100 100” vs “100 100 100 100” would work, the idea is just to make the as-path longer and less favourable
Hi Sir Thank you very much for the above video, Very helpful. I am having challenges with setting up the SSL VPN in AWS hosted FortiGate instance. Would you be available to assist.
Hey Kuda On your ssl settings, confirm which port your Fortigate is listening on, then check if the security group that your WAN ENI belongs to has that port allowed.
This is a most common issue, let me know either way..
@@staticroute Hi Sir, Thank you very much for reaching back, I appreciate it. I am checking on the above and will revert back shortly.
Hi Sir, it worked like a charm, Thank you very much.
Now I have one question, on my interfaces, for this to work, do I need to configure my LAN interface with dhcp like how we normally do it onprem and also do I need to change the role for my public subnet interface to WAN?
where u have used username/group(authenciation) on spokes Fortigates...
This is a great video! Thank you very much! What router/node did you use for the "Internet" as I am trying to create a lab like this but battling to create the "false" internet. Thanks again!
Hey Gavin, it’s just 3 Cisco routers sharing routes using OSPF between themselves, the other one at the bottom is Out of band management…basically my home network so I can connect using GUI, going forward, I’ll zip and share all configs to the labs
@@staticroute Thank you very much!
Can you please share the Cisco routers configuration?
hey there, unfortunately up until now I don't keep the configs once I'm done with the video. However, I will be releasing more videos focussed on advanced routing with Cisco routers. But going forward I will upload to Github all config files :-D
Hi SR, thanks for the video! Straight to the point. SSL VPN is disabled/hidden by default in the newest firmware. Can you make a video on the topic and why we should use IPSEC Remote access instead of SSL VPN?
In this video we built SSL VPN and used Active Directory to authenticate the remote users instead of creating local accounts on the Firewall.
39:54 how it is possible you have duplicate route on sdwan and non sdwan interfaces. you should have deleted routes to tun1 and tun2 before you created route for sdwan
Hey friend, apart from the fact that your overlay technologies will always require for underlay to have valid routes to the destinations, in SDWAN, a member that does not have a valid route to the destination will be ignored by SDWAN. As it happens I think it’s time to review and do a new video on the topic, I’ll drop you a message to let you know when it’s ready.
if we have configure 2 ipsec sdwan tunnels how do we set tunnel monitoring?
Hi there, excellent question, thank you.... check this out: docs.fortinet.com/document/fortigate/7.4.0/new-features/670140/multiple-interface-monitoring-for-ipsec-7-4-1
@@staticroute Thanks 🙌
hey can i use this cloud based firewall to protect my home isp router and monitor that traffic?
short answer....for home use you're better of with a free enterprise-grade firewall that stays up-to-date with threat prevention, antimalware, etc like Sophos XG, check that out...
The best video I ever seen
thank you very much ...
this is very interesting and helpful, Thank you for the share! keep up the good work.
thank you, there are certainly more videos coming up in the near future!!
Where did you got those licences?
It’s really hard to work with Fortigates because of licensing limitations, I don’t have licenses either. The images work for a short time, then they stop working for no reason 😃
Do i need port forwarding for thus configration or they can work without ? Becoz we are behined nat in each site
You should try with just NAT traversal and use outside addresses, I think port forwarding might break your VPN
Great video! Now, could you make a lab on a secure redundant topology using BGP over VPN IPSEC tunnels?
thank you...and yes I'm certainly planning on it, plus there are several ways to achieve that. I will be putting together a lab in the near future on this topic
Please, make more videos!. Your explanations are very good 😭
@@juan5392 most certainly..! Thank you.
Can you explain what the purpose of creating the user and group on the HUB, if there its not entered anywhere on the spoke routers?
This config is not as straight as one would hope, but the spokes do use their hostname/local-id as username and the PSK as the password. It' not a simple username|password combination..check it here: docs.fortinet.com/document/fortigate/7.4.4/administration-guide/6896/fortigate-as-dialup-client
Great video and helped me alot setting things up. Question: can you do this but bgp on loopback interface so there would be no need to configure tunnel interface. Some Fortinet guides seem to suggest using loopback interfaces..?
That should be possible, when you enter into "config neighbour" BGP hierarchy, you are able to specify interface to associate with BGP as well as update source. I haven't done this type of deployment myself and I won't be able to lab it up anytime soon because I deleted this lab...annoying Fortinet license expiry issue, please give it a shot and let me know...
Yeah I think I'll try to lab it at somepoint. Maybe it's more for larger networks/mssp's and not really an issue for us. I was just thinking that since i'm doing greenfield advpn/bgp setup would be better to do it with loopback from the start and make it more futureproof. Also I was looking at the 7.4 docs and there are some new features like active dynamic BGP neighbor triggered by ADVPN shortcut. I hope you can do more videos in the future👍👍
Wouldn’t this prevent IPsec from being offloaded on anything less than a 400F?
To my knowledge any Fortigate with hardware acceleration chipset can offload IPSec unless disabled. ADVPN just has an additional extension and should still offload to NPx…
Maybe someone knows more about this and can show us with hardware 300x hardware…
@staticroute can you do DLP policy and acme certificate policy
Hey .. Upgrading to Eve-NG .. nice to see.
@@rjnasr8078 😬 hey bro, to be honest, I’m not yet loyal to either one of them, but I want to give EVE a chance for a while…
@@staticroute I had a lot of issues with GNS3 and it was very time consuming. So far eve-ng seems to be smoother.
I noticed the same thing but both on EVE and GNS3, in my case configs that works one moment stop working for no reason, turns out it was related to device license status, if it turns to ‘invalid’, then all hell breaks loose…be on the lookout for that
@@staticroute I thought I sent out a response to this ages ago. Yes I also had some weird stuff happening and have to start from scratch. Hope you're well.
ADVPN is an enhancement to dialup VPNs that allows Spoke to Spoke VPNs to dynamically form on demand, therefore virtually achieving a full mesh VPN with just a single IPSec VPN configuration. The auto-discovery packets exchange between sender (Hub) and receiver (Spokes) make this possible through shortcut messages! the biggest advantage is simplified routing whether you choose to use BGP or OSPF, the config remains relatively simple! Enjoy!
I have similar situation, but i have the problem, that with 2 Peers, only one stay online, second is disconnected, if other shows activity the active peer changes, like only one Peer can stay online?
Hey there, you're probably looking for something like ADVPN, I'm uploading a video on that very topic right now, should publish in a few hours. ADVPN improves on Dialup VPNs by enabling spokes to make on-demand connections to each other therefore literally achieving "full-mesh". In the video, I setup BGP with Hub as route reflector, in the case of OSPF, the config is a tiny bit different...please check it out, I'd be interested to know if it's what you're looking for.
@@staticroute Finally i could fix it, no ADVPN needed. Well on the HUB, Phase2 Selectors is Local and Remote 0.0.0.0 0.0.0.0 and i had to delete static routes toward the branches, cause Only if the Interface Name in the routes is with "_0" or "_1" etc. it knows to which tunnel the traffic needs to go, if there is a static route on the Hub toward the branches the interface in the route not has "_0" in it, so it can`t know which peer it should take On the Branches, the Phase2 Selector is local the local Subnets and Remote is also just 0.0.0.0 0.0.0.0, cause Fortinet can handle that.
Thanks for the Video. It is very Helpfull. I would be appreciate if you can upload a video of how we can deploy Fortigate in HA mode and Load Balancer, because the deployment is a little bit tricky.
I will certainly look into it shortly...thank you ..
Could you clarify why weight is not scalable? Great vid btw!
Hey Lorenzo, the big idea with this lab was eBGP, weight doesn't get exported out to eBGP peers, it doesn't even get exported to local peers within the AS because it's locally significant to the router. Unlike LocalPref, which can atleast propagate within the AS. I'm actually going to post a follow up video on BGP soon based on a lot of interest I'm seeing on this topic...I hope I've answered you..?
@@staticroute You definitely have, thank you - looking forward to that next video!
Will use it in our production environment soon
This is the greatest tutorial for the BGP configuration in TH-cam. Sound and Clear. Thanks for your time and effort.. Cheers!!!!
Superb.
Thank you
Sorry to bother you, but I can't understand in the beginning the way the loopback interface flows data, how was it possible?
I think of the loopback interface the same as VLAN interface,they’re both logical interfaces
Hey Thiago, were you satisfied with the answer?
@@staticroute He ment how it's pingable and it private ip address, have you configure VIP for LOOPback interface to be reachable!!
Thanks man. Appreciate all your work, find the background music distracting though.
Hey, just curious and looking to improve things always, do you mean the background music volume is too high or you’d prefer no background music altogether?
@@staticroute seems particularly high in this video but I'd prefer none at all.
Better pls proceed without background music
IPSec VPN over loopback interface is an increasingly popular deployment because of its many benefits, including ability to control preferred primary and secondary paths leveraging the link monitor config for dynamic failover...this improves the reliability and stability of VPN tunnels significantly!!
Please lower the background music
Thank you very much, noted, yours is one of 2 comments about the background music, I appreciate it 👍🏼
Apologies, I should have started how good your tutorials are, very easy to understand and quite professionally edited. I'd appreciate if you do a video on advance BGP scenarios with route tags, route target, and how to use communities to accept routes and based on community route to specific peer
@ Thanks for the video. I have one doubt here . What's the different bw link Monitor and sdwan. I hope sdwan also do the link failure based on jitter and packet loss . I am not much aware,if you clear will be good for my understanding
you're 100% right SDWAN does it's own link monitoring and I hope to cover that in later video
@@staticroute Thank you
please create one sir @@staticroute
Fortinet's implementation of IP SLA is really awesome, I'm interested to know how popular this is in your deployments, please put a comment and let us know if you are keen to use it if you aren't already...