- 29
- 99 024
Matt Sherif
United States
เข้าร่วมเมื่อ 13 ต.ค. 2018
Feature Explorer - Threat Feeds
In this video we'll take a look at the Threat Feeds in a FortiGate.
And I'll show you how to update your threat feeds as well - albeit with an erroneous entry!
00:00 intro
01:39 - creating a threat feed
04:09 - inspecting the actual contents of the threat feed in your browser
04:45 - using a threat feed in a firewall rule
07:29 - adding an incorrect entry to the threat feed
12:29 - Thank you and outro
And I'll show you how to update your threat feeds as well - albeit with an erroneous entry!
00:00 intro
01:39 - creating a threat feed
04:09 - inspecting the actual contents of the threat feed in your browser
04:45 - using a threat feed in a firewall rule
07:29 - adding an incorrect entry to the threat feed
12:29 - Thank you and outro
มุมมอง: 350
วีดีโอ
Use Case Explorer - On Boot Machine Cert VPN with SAML User Based VPN after logon
มุมมอง 808ปีที่แล้ว
In this video we take a look at the following: 1. On Windows Boot VPN connection using Machine/Computer Certs, this connection is restricted to only AD 2. Once logged in, we will automatically be prompted to authenticate to a User Based VPN tunnel using SAML UPDATE: I have decided to cancel part 2 as a result of overly complex implementation, with no real gain over this approach. 00:00 - intro ...
Ultra SNEAK PEAK! Pre-logon cert VPN with SAML post login authentication
มุมมอง 259ปีที่แล้ว
In this video we take a sneak peek upcoming an upcoming use case explorer. 1.) Pre-logon VPN using machine certs 2.) AD access for windows auth 3.) Once logged into windows, leverage SAML authentication to apply identity based policies The use case explorer video is coming soon!
Ultraviolet Networks - Use case explorer - Terminating SSLVPN to a loopback interface
มุมมอง 3.4K2 ปีที่แล้ว
Terminating SSL VPN to a loopback offers a lot more flexibility by means of security, filtering and inspection. In this video we take a look at how we can implement this use case. 00:00 - intro 01:33 - Envrionment Review 02:09 - Create a Loopback for SSL VPN 03:11 - Create a VIP translate Public to Loopback 05:52 - Create Firewall policy to allow traffic to loopback 08:57 - Remove WAN1 and 2 fr...
Ultraviolet Networks - Use case explorer - FortiSASE Secure Private Access
มุมมอง 6702 ปีที่แล้ว
Now that you've secured your remote users' internet access, you have a new application in the datacenter that the remote users need access to. Normally you would have them disconnect from FortiSASE and connect to VPN, but could there be an easier way? FortiSASE Secure Private Access can provide that in conjunction with Secure Internet Access. 00:00 - intro 03:06 - Lab Topology Overview 04:06 - ...
Ultraviolet Networks - Use case explorer - FortiSASE Secure Internet Access
มุมมอง 4552 ปีที่แล้ว
In this video we take a high level look at FortiSASE's Secure Internet Access use case, and block access to GMail. 00:00 - intro 01:17 - Overview of remote and secure internet access 06:05 - Secure Internet Access user onboarding 07:56 - Registering FortiClient to FortiSASE 09:39 - Policies and Security Profiles 13:47 - Validating in the Logs 14:39 - Wrap up
FortiOS conditional API calls using iOS Shortcuts
มุมมอง 3812 ปีที่แล้ว
Ever wonder if you could make an API called using iOS shortcuts based off of information you queried? Apparently you can! In this video we take a look at enabling/disabling a policy on FortiOS using the iOS shortcuts app. 00:00 - Intro 02:08 - Creating Rest API Admin and Admin Profile 05:50 - FNDN / API Reference 09:38 - Creating API Request in PostMan 15:53 - Creating the API request in iOS Sh...
FortiGate How To - MC-LAG with FortiGate Switch Controller
มุมมอง 13K2 ปีที่แล้ว
In this video we take a look at MC-LAG configuration with the FortiSwitch and FortiGate. 00:00 - Introduction 03:13 - Lab overview 04:38 - Delete default FortiLink Interface 06:02 - Create FortiLink interface 09:11 - Authorizing Switches 12:53 - Setting up MC-LAG 17:10 - Turning off Split-Interface 18:37 - Create MC-LAG Trunk Group 21:05 - Create VLAN 22:52 - Renaming Switches
UltraBit - Factory Default for any FortiGate
มุมมอง 2212 ปีที่แล้ว
In this video, we look at how you can get the FactoryDefault configuration for any model FortiGate, regardless of whether or not you have one on hand.
Ultraviolet Networks Showcase - FortiSASE
มุมมอง 8402 ปีที่แล้ว
We take a brief look at FortiSASE, deploying your instance, and getting started. Very high level for now.
Intro to FortiGate Series - 03.5 Setup Decisions 2
มุมมอง 2782 ปีที่แล้ว
In this module, we follow up our last module with VDOMs and Admin accounts.
Intro to FortiGate Series - 03 Setup Decisions
มุมมอง 4542 ปีที่แล้ว
In this video we look at: - Operation mode: NAT/Transparent - Basic SD-WAN configuration example Thank you for watching! Madman out!
Intro to FortiGate Series - 02 Initial Configuration
มุมมอง 6512 ปีที่แล้ว
In this video we take a look at: - Factory Reset / Format Log Disk - WAN/LAN Addressing - LAN Services (DHCP, DNS, NTP) - Getting out to the internet Apparently the camera video is out of sync with the sound, Thank you for watching! Madman out
Intro to FortiGate Series - 01 FortiGate Registration with FortiCare
มุมมอง 1.6K2 ปีที่แล้ว
In this video we visit device registration with FortiCloud. Setting a static IP, and default route. 00:00 - Introduction 03:10 - Fortigate Registration with FortiCare 17:06 - Software Update
FortiGate SSL VPN Integration with Okta - tunnel mode
มุมมอง 1.4K2 ปีที่แล้ว
Implementation Guide: www.ultraviolet.network/post/implementation-guide-fortigate-ssl-vpn-with-okta-mfa-using-saml
FortiGate SSL VPN integration with Okta SAML - Web Mode
มุมมอง 1.1K2 ปีที่แล้ว
FortiGate SSL VPN integration with Okta SAML - Web Mode
FortiGate SSL VPN Authentication with AD FS - Tunnel Mode
มุมมอง 7262 ปีที่แล้ว
FortiGate SSL VPN Authentication with AD FS - Tunnel Mode
Google WorkSpace with FortiAuthenticator 3rd Party IDP - Desktop
มุมมอง 5653 ปีที่แล้ว
Google WorkSpace with FortiAuthenticator 3rd Party IDP - Desktop
FortiOS 7.0 Feature Highlight - API Preview
มุมมอง 8443 ปีที่แล้ว
FortiOS 7.0 Feature Highlight - API Preview
Implementation Guide - FortiGate SSL VPN with Microsoft Azure SAML 2FA
มุมมอง 30K3 ปีที่แล้ว
Implementation Guide - FortiGate SSL VPN with Microsoft Azure SAML 2FA
FortiGate SSL VPN with Azure AD MFA - how-to link in the description.
มุมมอง 13K4 ปีที่แล้ว
FortiGate SSL VPN with Azure AD MFA - how-to link in the description.
Fortinet Security Fabric - FortiMail and FortiSandbox
มุมมอง 6915 ปีที่แล้ว
Fortinet Security Fabric - FortiMail and FortiSandbox
FortiMail in Action - Content Disarm and Reconstruction
มุมมอง 1.8K5 ปีที่แล้ว
FortiMail in Action - Content Disarm and Reconstruction
Fortinet Security Fabric - Fortigate / FortiSandbox Malware detection
มุมมอง 8615 ปีที่แล้ว
Fortinet Security Fabric - Fortigate / FortiSandbox Malware detection
Hi Sir, thanks for your teaching video. But I have one question, how it can detect the on-net device? By NAT IP or Public IP to identify whether it is within the office environment? Hope can get your reply. Many thanks.
how do I point to the sso address in dns and point to the ssl-vpn portal
Can you please clarify the question? I am not sure I follow.
Will the NPS Extension for Azure MFA overtake the complete RADIUS-Server or how controll it?
They definitely didn’t know about that in Ironman . Great video thank you
Great video, thanks Matt. Was struggling a little to understand the topology of MCLAG and the split interface setting and this helped a lot. Cheers.
FYI - at 10:46, your Public IP is visible at the bottom of the "Your connections is not private" page
I see u enabling mc-lag via FortiSwitch CLI, but according to Fortinet documentation, they want us to do it this way: Assign the LLDP profile “default-auto-mclag-icl” to the ports that should form the MCLAG ICL in FortiSwitch unit 1. For example: FGT_Switch_Controller # config switch-controller managed-switch FGT_Switch_Controller (managed-switch) # edit FS1E48T419000051 FGT_Switch_Controller (FS1E48T419000051) # config ports FGT_Switch_Controller (ports) # edit port49 FGT_Switch_Controller (port49) # set lldp-profile default-auto-mclag-icl FGT_Switch_Controller (port49) # end FGT_Switch_Controller (FS1E48T419000051) # end I don’t know what is the difference, because in above example I don’t see them enabling mc-lag on a switch port which is connected to Fortigate. They only doing the ICL part, but not the fortilink part where the switch connects to the Fortigate. I am little confused here.
Also me, this made me confused. And there is a thrid way, through the fabric rating recommendation...
In environment where I have windows servers with 4 NIC teamed in one Team, and 2 of them are connected to first switch, and other 2 are connected to the second switch where switches are mclaged correctly, how mac tables should look like on both switches?
I have followed the process where but it is not working. Connecting stuck at 10% with vpn unreachable gateway
FYI, ya forgot to censor your public IP one time.
When is part 2 coming?
"Hello! Great video. I have a question: if you have multiple VPN connections, is it necessary to create a separate enterprise application for each IP address? Also, should I upload a different certificate for each one, depending on the VPN that the client chooses to connect with?
This is where DNS is going to be your friend, if you have some sort of service like AWS route 53, or Azure DNS, that point vpn.mydomain.local (fictional - .local isn't a usable TLD) you could have them monitor both IPs, and either load balance or assign primary and secondary. In this case you could just use the dns record as the base URL. So if one of your links goes down, your DNS service detects it and just "resolves" all new queries to the valid IP
Let's go a new video! #first
Hi that was great video. But we are trying the same using Azure AD DS and configured Fortigate using ADDS Ldap. We need to configure same mfa using azure ad ds Please help
Thanks. How do you deny the bad IP addresses from reaching to SSL VPN?
Great question! You can pin the SSL vpn instance to a loopback. Allowing you to use threat feeds and other handy features. Thats explained here: th-cam.com/video/T_l-do_oci8/w-d-xo.htmlsi=eskibN__w7Wsp1zx
@@mattsherif9141 Thanks. I think its the same video but I just heard you saying that you can use ISDB but not much explanation. Sorry if I have missed it. "You can pin the SSL vpn instance to a loopback": can you explain this more? I have followed your instruction and SSL VPN works on Loopback interface but If I try to use ISDB of malicious IP addresses and put a Deny that it doesn't work.
@@capricornnnn You don't want the ISDB in this case, you want to either come up with your own threat feed and use that a source and deny anything coming from that. You could also use GEO IP adddress objects and block those as well. ISDB doesn't apply in this scenario.
@@mattsherif9141 So what you are saying is that its not possible to use ISDB with SSL VPN terminating to loopback interface? I am testing because what my understanding is that in order to use ISDB then I have to use Loopback interface and its not possible to use ISDB with local in policy. Threat feed can be used with local in policy. If Threat feed is the only way then I am thinking to stick with my current setup and use threat feed using local in policy. Do you have some doc or youtube video how to setup external threat feed. I heard that Talos is free but not sure how to use it.
@@capricornnnn I am not saying that, I am saying your best bet is a threat feed. Here's the doc on configuring a threat feed docs.fortinet.com/document/fortigate/7.2.6/administration-guide/379433/configuring-a-threat-feed
Great vid. Question for authentication, do you have to use the authentication app or is there a way to setup user's to use calling or text as an option as well?
Yes - thats up to you how you set that in Entra (Azure AD).
So as of now if someone wishes to roll out Fortigate SD-WAN with ZTP, template builds and the ability to monitor their Fortigate SDWAN overlay, what are the core components required? Obviously each site requires a Fortigate FW to act as an edge device. Do they also need Fortigate Orchestrator licensing to add Orchestrator functionality to Fortimanager? Do they require Fortianalyzer as an additional license to be accessed via Fortimanager?
there's something we aint seeing here. this configuration doesnt work as the SSL Loopback interface is unreachable even after doing the VIPs and fw policies. i went thru the community forum and folks pointed out this video too but ultimately is missing a few configurations
I can assure you that’s not the case. Where are you getting stuck?
Hi @randada1 did you manage to find your answer?
When will part 2 be ready? this is really interesting
Hey Matt, I've had a go at setting this up... It's working and I'm getting lots of hit on the FW policy. But no logs are showing up when I look for matching logs? Any ideas?
Yes - check under the local traffic logs instead of forward traffic logs. Despite the policy being for "forwarded traffic" FGT is smart enough to know this traffic will actually terminate on it.
I think its better to first enable MCLAG ICL on both switches, and as second step enable MCLAG, then you wont lose your connection. Still very useful video!
You do this via lldp? I mean by setting the lldp profile on the ports bing used as the mclag icl?
Awesome video and super helpful. You can actually use external threat feeds with local-in policies. They can be used with a negate source option like any other address object.
any implementation doc with some example?
We are looking at a full network refresh at my organization. I have many closets that are 3 or more traditional switch stacks. Each closet has redundant fiber to it running back to the data center. Like others have posted, how would I setup a closet with 6 switches in a FortiSwitch architecture. What about 7 switches?
That's going to depend on your requirements, and the number of fiber strands you have running back to the datacenter. You could set up an MCLAG pair in each closet, and have the remaining switches connect to those. You need to take the following into consideration: docs.fortinet.com/document/fortiswitch/7.2.4/fortilink-guide/801194/deploying-mclag-topologies You could have home runs back to the datacenter for each switch to go into your MCLAG Pair at the datacenter. Frankly I don't have enough information to give you a good recommendation.
Great video!
wow...very interesting, didn't know that and other features, thanks Matt! How you create your own CA certificate and install it on the FortiGate? Do you have any guides or videos for the EMS? I really like your content!
Thank you for watching! Creating your own CA and installing on the FortiGate is going to depend on what Certificate/PKI infrastructure you have. I may make a video that covers that at a later date.
@@mattsherif9141 thanks Matt! even for lab environment, for different use cases (ems,ssl inspections,etc)
@@bytes86 I may do a FortiAuthenticator video that helps.
@@mattsherif9141 Thanks! any video will assist, i want to learn and deep dive the Fortinet devices
Nice work Matt, so you are keeping vpn establishment auth to un and cert based only but with limited access by fw policy until the user saml auths (captive portal?) and gets associated with a saml group that has more access?
Sweet!
Nicely done! looks very interesting.
I dont think you can have 4 switches in mclag, i am looking like crazy to find a solution for 4 switches
If I am correct, you can only have two per MCLAG peer group. So, in my mind, you would gave two MCLAG groups. Have you found a solution? I am needing to do this with 12, which means I would need 6 MCLAG peer groups... but I may be wrong. @matt can you confirm?
@@vidmooreda - That would be accurate, MCLAG groups aren't meant as an analog for a switch stack. The whole FortiOS controlled switch architecture is meant to be a distributed "Stack" if that terminology can apply. More info here: docs.fortinet.com/document/fortiswitch/7.2.4/fortilink-guide/801194/deploying-mclag-topologies
Great job Matt, nice to see it in action and for your other 2 vids on the subject. I had an SE tell me ipsec tunnels to connect to corp locations were not possible on SASE, which I couldn't accept as true :D , nice to know its not the case and is a usable solution. How do you find the speeds from the endpoints, was it 10Mb p/s per user bandwidth limitations on the basic SKU?
Hey Matt, aren't the security profiles on the vip policy useless? I mean the traffic is not inspected bei virtual server and is completely encrypted anyway, isn't it?
Hey Osman, not necessarily. This is to mitigate against known SSL VPN attacks, it also allows you to specify more inspection types vs. local in policy.
Thanks Matt, love your videos, learning from you a lot!🙏
Cheers Matt, any cpu performance concerns when using the virtual interface, does offloading still happen for loopbacks, sslvpn isnt offloadad afaik but in general like ipsec on a loopback?
No, due to SSL VPN sessions not being offloaded, it makes very little difference. Fast Path requirements don’t state that you need a physical interface to originate the traffic for Fast Path to take place: docs.fortinet.com/document/fortigate/7.0.9/hardware-acceleration/149012/np6-session-fast-path-requirements
@@mattsherif9141 Thanks and happy new year, looking forward to more of your great content in 2023!
@@oinkersable Happy New Year to you too! Thank you for watching! If there’s anything you want to see, let me know.
Top tier as always! Thank you for the enlightening video!
Thank you for watching! I hope you have a Happy New Year!
Thanks Matt! learn a lot from you! please share more video of Fortinet solutions, Happy X-Mas!
Thank you for watching! I notice you have watched everything I post. Thank you very much!
@@mattsherif9141 Thank you for the interesting video, i love to learn and deep dive for other stuff
Thanks, Matt!
Thank you for watching!
Thanks, Matt! very interesting!
Thank you for watching!
If like me you skipped ahead to the iphone part, it's worth noting that iPhone Shortcuts needs the SSL connection to be valid so certificate etc. required (using IP doesn't seem to work)
Awesome video, really helped out a lot. thank you!
Glad it was helpful, thank you for watching!
@@mattsherif9141 I have a question, maybe you can help answer. I'd like to provide a subset of users with a unique SSL-VPN portal. I assume that I need a way to identify the Azure groups so that I can match them to a local user group, and set the SSL VPN portal mappings. I just don't know how to get the Azure group name over to the FW so I can do the local group match on the Fortigate. Any help would be appreciated.
@@runninl8 yes - you'll need to create an assertion on the Azure side that sends the groups the user is a member of, and then filter based on group on the FortiGate.
Great video, ty very much Matt! please share more videos!
Thank you for watching! Anything you'd like to see?
That's exactly what I was looking for this morning! No more texting folks to see if they've got a specific model of FortiGate to grab the default config from. One thing on this video, your audio level is really low so I had to crank the speakers.
Thank you for watching! I am still tuning the audio levels, thank you for the feedback.
Nice method of getting that config, thanks!
Thanks Matt!
Can you help me with this setup?
Great Video ! we were getting token codes before but since the implementation of 2MFA when I connected with forticlient for the first time it asked me for approval on MS authenticator but everytime after that it connects to Forti without any kind of approval because I am selecting check box"do not ask me for 30 days" unless I clear cookies from CMD .Though the script we have requires it to clear cookies automatically on every disconnct but this has not helped me with my user name specifically . any ideas on that ?
Great content, i would only suggest to increase the sound's volume!
Thank you very much! love your videos! learning a lot!
Hey Mate, please add move advanced configuration on the Fortigate, Forti Analyzer,Manager (integration between them maybe)
really interesting, ty very much!
Ignore the video, that just shows it working. The link is where the real instructions are.
Thank you for reading. Yes, the video is posted for the tail end of the instructions to show the result of the work.
Hi sir, I following the article, it work! Thanks a lot. But I need more help please. After that I tried OTP, NPS extension err code:Request_MISSING_CODE err msg: Request is missing OTP I didn't know what else I have to do.
Hi Daniel, did you find a solution?
@@Thalaz Yes,I found it. At that time I felt confused why I already enabled NPS' PAP authentication method but still failed. Finally I knew because of fortigate radius side that I set specify authentication method "MS-CHAP-V2." After I changed to "Default," it works. Thank you for this video and article, they help me a lot!