FortiBytes
FortiBytes
  • 55
  • 92 961
Hands-On Guide: Building a FortiGate IPSEC VPN in a Virtual Lab
Dive into the fascinating world of network security with our comprehensive walkthrough on setting up a Site-to-Site (S2S) IPSEC VPN. This tutorial caters to networking enthusiasts and professionals aiming to connect two critical locations seamlessly using the FortiGate-to-FortiGate configuration wizard.
🔍 In This Video:
1. Robust VPN Configuration: Learn how to configure an IPSEC VPN with ease, using the FortiGate-to-FortiGate wizard.
2. VMWare Workstation Lab Environment: Explore our setup involving two FortiGate Firewalls in a VMWare Workstation Lab, providing a practical and controlled setting for learning.
3. Windows 11 Lite Hosts: Utilizing two Windows 11 Lite Hosts to visually demonstrate the connectivity between the sites.
4. Ping Testing: Witness real-time connectivity tests using ping, ensuring the VPN's functionality and reliability.
🔜 What's Next:
Stay tuned for future videos where we will expand on this setup to include scenarios with IP Overlap (NAT VPN) and in-depth IPSEC VPN troubleshooting techniques.
// Chris SOCIAL //
www.linkedin.com/in/chris-eddisford-5b676462/
// Timestamps //
00:00: Video Introduction
01:17 - Topology Overview
01:55 - Creating the Site-to-Site IPSEC VPN Tunnel
04:05 - Pre-applying configuration tests
04:43 - Appling the IPSEC Configuration to London and France
05:55 - Validating the results
06:30 - Video Wrap-Up & What's Next?
// Keywords //
IPSEC VPN
Internet Key Exchange (IKE)
Site To Site VPN (S2S)
Fortinet Lab Enviroment
FortiGate
FortiGate How To?
Fortinet NSE4
Fortinet NSE7
Fortigate IPSEC VPN
FortiGate BGP
FortiCloud
FortiGateTraining
FortiManager Training
Policy Package
ADOM
FortiGate
FortiSwitch
FortiClient
Fortinet Home Worker
Fortigate SSL VPN
Fortgate ZTNA
Fortigate IPSEC
Fortigate ADVPN
Fortinet FCP
// HashTags //
#cybersecurity
#networking
#fortinet
มุมมอง: 435

วีดีโอ

Mastering Deployment Of Fortinet Products Using VMware Workstation
มุมมอง 4778 หลายเดือนก่อน
Embark on a comprehensive journey to master the deployment of Fortinet products within a VMware Workstation environment. This guide is designed for individuals looking to enhance their network security and virtualization skills. We start with the basics of deploying a FortiGate Firewall in VMware Workstation before moving on to setting up the virtualized network environment for success. Through...
Using FortiManager Series: Lets add another site (Poland) but fully automate its onboarding PT8
มุมมอง 3548 หลายเดือนก่อน
In this video, we close off the series by adding in another Spoke (Poland) but this time we onboard it to our defined standards using a Device Blueprint. We finish up by proving that Poland can ping all other sites and I show a little trick around understanding when traffic is using a ADVPN shortcut using its Time to live (TTL) value. // Timestamps // 00:00 - Video Introduction 00:35 - Help me ...
Using FortiManager Series: Mastering Configuration Backup/Restore, Variables & Scripts PT7
มุมมอง 9839 หลายเดือนก่อน
In this video, we will be looking at how to use FortiManager Cloud, Meta-Variables, and Scripts in PT7. If you want to get ahead with FortiManager, this video is for you! We will be discussing how to use FortiManager Cloud, Meta-Variables, and Scripts to manage your FortiManager environment more effectively. We'll also be covering some common uses for these tools, so be sure to watch and learn!...
Using FortiManager Series: Escape the Manual Hassle: IPSEC VPN Mesh Automation PT6
มุมมอง 7449 หลายเดือนก่อน
In this video, we continue from Part 5 in getting to the good stuff in using FortiManager and various Templates to create a Hub and Spoke Hub and Spoke Architecture between (UK, France, Germany and Sweden) using Fortinet Auto Discovery VPN (ADVPN) this video is a relatively long one. Still, it covers everything you need to know including VPN Creation, BGP Creation, and Firewall Policy Creation ...
Using FortiManager Series: Overview of Sidebar, Object Configuration & Revision History PT5
มุมมอง 5699 หลายเดือนก่อน
In this video, we continue from Part 4 but slow the pace down as I understand that 4 videos published in 48 hours might be a little much by looking at the left-hand sidebar and its sub-headings and how these objects are attached to the Policy Package. The video also covers the ultimate get-out-of-jail card in Object Revision History. // Timestamps // 00:00 - Video Introduction 00:45 - Firewall ...
Using FortiManager Series: Adding MORE FortiGates & Policy Packages Advanced PT4
มุมมอง 6169 หลายเดือนก่อน
In this video, we continue on from Part 3 by adding more FortiGates using different FortiManager onboarding methods and demonstrating how policy packages would be utilized in a production environment. * The release of these videos is super fast-paced with 1/2 a day for the next week so look out for the next in the series! I might already be released! // Timestamps // 00:00 - Watch the previous ...
Using FortiManager Series: Working with Policy Packages! PT3
มุมมอง 1.2K9 หลายเดือนก่อน
This video continues on from the second video. We take a little deeper look into Policy Packages how they are used in our current deployment, how to add and remove them and what happens when you cause a database conflict between FortiGate and FortiManager. PT2: th-cam.com/video/F9uhDpK4PqM/w-d-xo.html // Timestamps // 00:00 - Video Introduction & What the other videos covered 00:53 - Logging ba...
Using FortiManager Series: Adding the First FortiGate! PT2
มุมมอง 1K9 หลายเดือนก่อน
This video continues the first video and covers prepping the environment further and adding the first FortiGate to FortiManager Cloud. The video covers everything from registering the FortiGate to its inside the same FortiCloud account as the FortiManager to adding the device into FortiManager. We also cover Policy Packages and ensure the ADOM is properly set up. PT1: th-cam.com/video/cT_wG2GTk...
Using FortiManager Series: Deploying With FortiCloud PT1
มุมมอง 1.6K9 หลายเดือนก่อน
In this video series, I'm going to demonstrate how to get the best out of FortiManager. This first video will cover how to deploy using FortiCloud (Fortinet's Managed Hosting Option) and also what I class as the pre-staging in selecting the FortiManager version that is compatible with your FortiGates. // Timestamps // 00:00 - Video Introduction 00:20 - Registering FortiManger Cloud 01:35 - Logg...
Fortinet: Free Training Lab Enviroments (Hands On Lab's)
มุมมอง 1.6K9 หลายเดือนก่อน
Get ready for an immersive journey into the world of Fortinet as I guide you through the Fortinet Hands-On Lab (HOL). Designed exclusively for NSE4 (FCP) and NSE7 (FCSS) certified engineers, this lab is a treasure trove of training opportunities covering a wide array of Fortinet products. From best practice deployments to mastering the intricacies of Fortinet's offerings, we're delving into it ...
FortiGate: Why Series? Secure Your Device PT2 (Local-IN Configuration)
มุมมอง 3449 หลายเดือนก่อน
Dive into the nitty-gritty of network security with Part Two of our video series! We're ditching the trusted hosts and stepping up our game by securing administrative access to the management plane with a Local-In policy-CLI style. No fluff, just a straightforward walkthrough that impacts HTTPS, SSH, PING, API, VPN Traffic, and more. I'll guide you through the process using two Windows jumpboxe...
FortiGate: Why Series? Secure Your Device (Trusted Host Configuration)
มุมมอง 3679 หลายเดือนก่อน
Ready to bolster your FortiGate Firewall security? Join me in this step-by-step tutorial where I demystify the intricacies of configuring Trusted Hosts. After years in the consultancy game, I'm here to spill the beans on the common pitfalls that may unknowingly expose your device's admin panel to the wide web. Learn the ropes as I guide you through the correct setup for Trusted Hosts, ensuring ...
FortiGate: Why Series? Discovering Different VPN's (SSL, IPSEC & ZNTA)
มุมมอง 60210 หลายเดือนก่อน
Dive into the nuances and applications of popular VPN deployments. Starting with Fortinet's SSL VPN, we explore both Web Mode and Client Mode, paving the way to the potential new world in ZTNA. Before moving to ISPEC VPN. SSL VPN Modes and Operations ZTNA for Enhanced Remote Connectivity IPSEC VPN for Site-to-Site Security Understanding ISPEC VPN, featuring ADVPN Empower your VPN knowledge with...
FortiGate: Why Series? Virtual Domains (VDOMs)
มุมมอง 63110 หลายเดือนก่อน
In this video, I explain what a Virtual Domain is and more importantly, provide some practical use cases on how they are used in the real world sharing my own experience on how they have been used in the 15 years. The purpose of the WHY? series is to answer common questions and explain why you need to use a certain technology. It's not designed to be highly technical. Other videos will follow t...
Fortinet Training & NSE Certification Updates - Deep Dive
มุมมอง 2.5K10 หลายเดือนก่อน
Fortinet Training & NSE Certification Updates - Deep Dive
Fortinet Tutorial: Public Cloud Four Site ADVPN Mesh (Using the Fabric Overlay Orchestrator)
มุมมอง 64711 หลายเดือนก่อน
Fortinet Tutorial: Public Cloud Four Site ADVPN Mesh (Using the Fabric Overlay Orchestrator)
SDWAN/ADVPN Series: Virtual FortiGate Deployment (AWS)
มุมมอง 10511 หลายเดือนก่อน
SDWAN/ADVPN Series: Virtual FortiGate Deployment (AWS)
SDWAN/ADVPN Series: Virtual FortiGate Deployment (Microsoft Azure)
มุมมอง 34411 หลายเดือนก่อน
SDWAN/ADVPN Series: Virtual FortiGate Deployment (Microsoft Azure)
SDWAN/ADVPN Series: Virtual FortiGate Deployment (Google Cloud)
มุมมอง 25811 หลายเดือนก่อน
SDWAN/ADVPN Series: Virtual FortiGate Deployment (Google Cloud)
FortiGate: Security Fabric Configuraton & Policy Sync
มุมมอง 4.4K11 หลายเดือนก่อน
FortiGate: Security Fabric Configuraton & Policy Sync
FortiGate Firewall: Basic SDWAN Traffic Steering
มุมมอง 633ปีที่แล้ว
FortiGate Firewall: Basic SDWAN Traffic Steering
FortiGate Firewall: Connectivity Provider's device bypass (DHCP Option 61 & PPPOE)
มุมมอง 584ปีที่แล้ว
FortiGate Firewall: Connectivity Provider's device bypass (DHCP Option 61 & PPPOE)
FortiGate Firewall: Why use Fortinet Single Sign On (FSSO)? What are the benefits!
มุมมอง 3Kปีที่แล้ว
FortiGate Firewall: Why use Fortinet Single Sign On (FSSO)? What are the benefits!
FortiClient/EMS/FAC - Native Azure AD / Microsoft Entra ID and Fortinet Single Sign-On (FSSO) PT3
มุมมอง 2.8Kปีที่แล้ว
FortiClient/EMS/FAC - Native Azure AD / Microsoft Entra ID and Fortinet Single Sign-On (FSSO) PT3
FortiGate Firewall: Factory Reset (Button & CLI Based)
มุมมอง 9Kปีที่แล้ว
FortiGate Firewall: Factory Reset (Button & CLI Based)
FortiClient/EMS - Azure AD / Microsoft Entra ID Intergration PT2
มุมมอง 1.6Kปีที่แล้ว
FortiClient/EMS - Azure AD / Microsoft Entra ID Intergration PT2
FortiClient/EMS - Azure AD / Microsoft Entra ID Intergration PT1
มุมมอง 3.8Kปีที่แล้ว
FortiClient/EMS - Azure AD / Microsoft Entra ID Intergration PT1
FortiGate Firewall: Life of a packet troubleshooting
มุมมอง 8Kปีที่แล้ว
FortiGate Firewall: Life of a packet troubleshooting
FortiGate Firewall: Automation Stitch
มุมมอง 1.3Kปีที่แล้ว
FortiGate Firewall: Automation Stitch

ความคิดเห็น

  • @JuanManuel-yr3gs
    @JuanManuel-yr3gs 12 วันที่ผ่านมา

    Excellent!😊

    • @FortiBytes
      @FortiBytes 9 วันที่ผ่านมา

      Thank you! 😃

  • @wxiang-h6v
    @wxiang-h6v 13 วันที่ผ่านมา

    Hi Sir, I have some questions confusing me. The CTAP config file was withou any policy, routing etc. If I restore the CTAP file to my FG, will cause all my configuration gone right? Hope can get you reply. Thanks a lot.

    • @FortiBytes
      @FortiBytes 13 วันที่ผ่านมา

      Hi, yes if you restore the ctap configuration file then it will remove any existing policy’s, routes ect and replace them with what is required to conduct the ctap!

    • @wxiang-h6v
      @wxiang-h6v 10 วันที่ผ่านมา

      @@FortiBytes Hi Sir, much appreciate your answer. Which means the CTAP is suggested to run during downtime?

  • @julio_alvarado
    @julio_alvarado 14 วันที่ผ่านมา

    Dude, you are all over the place. Write a scrip then teach, you make my head hurt.

    • @FortiBytes
      @FortiBytes 14 วันที่ผ่านมา

      Thanks for the feedback, soon new videos with a different more structured format!

    • @julio_alvarado
      @julio_alvarado 14 วันที่ผ่านมา

      @@FortiBytes Thank you!

  • @alwayskarbala
    @alwayskarbala 19 วันที่ผ่านมา

    Thanks bro. Could you provide me personal training session ?

    • @FortiBytes
      @FortiBytes 14 วันที่ผ่านมา

      I don’t think so, what is it you’re looking for specifically?

  • @avatimus1987
    @avatimus1987 22 วันที่ผ่านมา

    Sir, I need to forward multicast IP packets coming from a MPLS router through the Fortinet Fortigate 60F firewall. I have configured the firewall as follows : 1) Under network--->interfaces---> two ports have been configured, one as "INPUT" (to receive data from the router) and other as "OUTPUT" (to send data). The "INPUT" port IP address is in the same IP group as the router port to which it is connected. The "OUTPUT" port IP address is of a different group. 2) Under policy & objects--->addresses--->total five (05) multicast IPs have been defined. Interfaces have been set to 'all/any'. 3) Under policy & objects--->multicast policy--->Input interface is set to "INPUT", output interface to "OUTPUT", source address to "ALL/ANY", destination address to the five (05) multicast addresses that have been already defined. Protocol is set to UDP with port range from 1 - 65535. Strangely, I am getting only one multicast IP on the "OUTPUT" port. I mean, the firewall is forwarding only one multicast group from INPUT to OUTPUT port. It will be very helpful for me if you can provide any solution for this.

    • @FortiBytes
      @FortiBytes 14 วันที่ผ่านมา

      Hey, sorry for the slow reply I have been away checkout this guide - docs.fortinet.com/document/fortigate/7.6.0/administration-guide/968606/configuring-multicast-forwarding

  • @avatimus1987
    @avatimus1987 22 วันที่ผ่านมา

    Sir, I need to forward multicast IP packets coming from a MPLS router through the Fortinet Fortigate 60F firewall. I have configured the firewall as follows : 1) Under network--->interfaces---> two ports have been configured, one as "INPUT" (to receive data from the router) and other as "OUTPUT" (to send data). The "INPUT" port IP address is in the same IP group as the router port to which it is connected. The "OUTPUT" port IP address is of a different group. 2) Under policy & objects--->addresses--->total five (05) multicast IPs have been defined. Interfaces have been set to 'all/any'. 3) Under policy & objects--->multicast policy--->Input interface is set to "INPUT", output interface to "OUTPUT", source address to "ALL/ANY", destination address to the five (05) multicast addresses that have been already defined. Protocol is set to UDP with port range from 1 - 65535. Strangely, I am getting only one multicast IP on the "OUTPUT" port. I mean, the firewall is forwarding only one multicast group from INPUT to OUTPUT port. It will be very helpful for me if you can provide any solution for this.

    • @FortiBytes
      @FortiBytes 14 วันที่ผ่านมา

      Hey I answered in the other comment you made on another video. Hope it helps!

  • @alejandroadame141
    @alejandroadame141 24 วันที่ผ่านมา

    what would be the DNS server configured in FAC?

    • @FortiBytes
      @FortiBytes 14 วันที่ผ่านมา

      Either your local dns server or a public dns server.

    • @alejandroadame141
      @alejandroadame141 14 วันที่ผ่านมา

      @@FortiBytes i think it does have to be the "local" DNS in order to resolve the local hostnames... in my case we have FAC in internet and not the local network... FAC is configured with a public DNS and it is failing ...

  • @CatyCat-yh6mq
    @CatyCat-yh6mq หลายเดือนก่อน

    thank you for your help

    • @FortiBytes
      @FortiBytes หลายเดือนก่อน

      You're welcome!

  • @MrMashhoodgee
    @MrMashhoodgee หลายเดือนก่อน

    Thanks for the video, question here, after adding the info of the new devices in the csv, we have to authorize it manually in the FMG? I want to import a device via IPSEC while devices are in remote locations. It means I have to get a ipsec-mgmt tunnel up before pushing the config via csv? If you could make a video around it, would be great to see. I guess in most cases this use case is very usually implemented. Thank you for the series, great efforts. New subscriber 😊

    • @FortiBytes
      @FortiBytes หลายเดือนก่อน

      Hey, if you add the device via a csv file then it should be inside the database and pre approved. Approval is done based on serial number so you should be ok actually! If you get it working let me know I’m not 100% sure so would be interested to know.

  • @leelidbetter4286
    @leelidbetter4286 2 หลายเดือนก่อน

    Subscribed - great video

    • @FortiBytes
      @FortiBytes 2 หลายเดือนก่อน

      Awesome, thank you!

  • @Klarkooi
    @Klarkooi 2 หลายเดือนก่อน

    Hey buddy! May I ask, using SSO with deep packet inspection configured, can I still exclude certain category of websites like finance without any problem?

  • @kroy5555
    @kroy5555 2 หลายเดือนก่อน

    Great video and explanation of this topic. I'm just getting started with Fortigate and looking forward to more of your videos. Thank You

    • @FortiBytes
      @FortiBytes 2 หลายเดือนก่อน

      You’re very welcome. Loads of videos on the channel already I had to take a break but more videos will be arriving shortly!

  • @user-oj6iz2im4w
    @user-oj6iz2im4w 3 หลายเดือนก่อน

    Good video. I just bought my fortigate and thought it was protecting me but it wasn't.

    • @FortiBytes
      @FortiBytes 3 หลายเดือนก่อน

      Make sure you look into some of the other videos on the channel, specially deep packet inspection as most of the traffic going through your device is encrypted so you need some additional steps to be able see into that traffic.

    • @user-oj6iz2im4w
      @user-oj6iz2im4w 3 หลายเดือนก่อน

      @@FortiBytes thanks, I had enabled everything but had to back it down due to certificate warnings

  • @dgilvani
    @dgilvani 4 หลายเดือนก่อน

    Excellent! Thank you for these videos.

    • @FortiBytes
      @FortiBytes 4 หลายเดือนก่อน

      You’re very welcome more soon!

  • @dgilvani
    @dgilvani 4 หลายเดือนก่อน

    Golden! Thank you 😊

    • @FortiBytes
      @FortiBytes 4 หลายเดือนก่อน

      You’re welcome, more videos soon.

  • @hansyaz97
    @hansyaz97 4 หลายเดือนก่อน

    Thanks dude

    • @FortiBytes
      @FortiBytes 4 หลายเดือนก่อน

      Happy to help

  • @pko492001
    @pko492001 4 หลายเดือนก่อน

    Hello, I would like to ask three questions 1. Is there an architecture diagram of this video, including all IP addresses? 2. Is there any pre-configuration that needs to be completed at the beginning of this video, such as IPSEC VPN SDWAN, and then set up after the VPN is established? 3. Regarding FAZ IP, I don’t know much about it here. Are the FAZ IPs of HUB and SPOKE the same? If so, do all the points need to be connected to the same FAZ in the front end?

    • @FortiBytes
      @FortiBytes 4 หลายเดือนก่อน

      Hi thanks for reaching out answers below 1. I’m afraid there isn’t an architecture diagram, I’ll look at doing this for future videos. 2. This is part of a video series please watch the videos prior to this one. 3. All FortiGate devices should point to the same FAZ unit. This will then be distributed via the security fabric.

  • @silicondt1
    @silicondt1 4 หลายเดือนก่อน

    What event did you use at 2:55 to detect WAN1 sdwan is down or up? SDWAN status warning? or?

    • @FortiBytes
      @FortiBytes 4 หลายเดือนก่อน

      Hey, I belive its covered at 01:50

    • @silicondt1
      @silicondt1 4 หลายเดือนก่อน

      @@FortiBytes So I dont seem to be getting any log/alert of "Routing information changed" when my sdwan route gets turned off.. Do I need to enable detailed logging somewhere?

  • @ornaldonaqellari1254
    @ornaldonaqellari1254 4 หลายเดือนก่อน

    Thank you for the video. I do have a question: Why in the case of internal traffic leaving to internet we need to apply even the IPS Signatures and Filters ? Is it just enough to enable Block Malicious URLs and Outgoing Connections to Botnet Sites ? so you can save memory and cpu ?

    • @FortiBytes
      @FortiBytes 4 หลายเดือนก่อน

      Hey, great question and its something that comes up quite frequency. IF you have the resources to do so then its best practice to apply IPS to outbound policys also. Sometimes malware gets inside your envrioment meaning that the traffic orginates from the inside lets use a TCP based reverse shell for example communicating back to a know C&K server.

  • @osirisptah
    @osirisptah 5 หลายเดือนก่อน

    Hey, I know Dave!

    • @FortiBytes
      @FortiBytes 4 หลายเดือนก่อน

      Really nice guy and a colleague now.

  • @will5874
    @will5874 5 หลายเดือนก่อน

    Forgive me, I am pretty new to Fortinet equipment and still learning. What benefit would there be to use this if I were to use FortiManager in an enterprise? Would this work the same as a ADOM in FortiManager which shares a policy and object database with devices in the same ADOM? Great video and fantastic explanation! Thank you!

    • @FortiBytes
      @FortiBytes 5 หลายเดือนก่อน

      Hi Will, good question! Let’s say that your company was called companyx but you had no requirement to manage or segment the deployment then your basically just using a single adom. Where the magic happens if your a larger company or a mssp and you need to manage several companies let’s say companyx, companyy and companyx then you could create separate adoms from them all. Everything inside a adom is segmented however you still have the ability to deploy global policy’s that can be shared across adoms (very common with Fortinet mssps)

  • @Aminur48
    @Aminur48 5 หลายเดือนก่อน

    Thanks for this!

    • @FortiBytes
      @FortiBytes 5 หลายเดือนก่อน

      My pleasure!

  • @clivethompson6546
    @clivethompson6546 5 หลายเดือนก่อน

    Very helpful video, nice and clear, thanks.

    • @FortiBytes
      @FortiBytes 5 หลายเดือนก่อน

      Glad it was helpful! Your Welcome!

  • @charliesweeney1778
    @charliesweeney1778 6 หลายเดือนก่อน

    Commendable attitude on sharing your knowledge my brother, but i got a question that is bothering me and acctually made me stuck with the firewall study. I got an Fortigate 7.4 running in VMWare, and there is a LAN segment where i put the VMs i'm using as a lab, and even with he Fortinet_CA_SSL.cer installed on both OS and browser, i still got the same error, and it does not allow me to "Accept the risk and continue". I've litterally have done only this, created a permissive policy and added the SSL inspection, as soon as i turn off the inspection, it turns back to work propperly. THE ERROR "Firefox detected a potential security threat and did not continue to www.google.com because this website requires a secure connection." Thank you for your content, hope you see my comment, peace for you my man.

    • @FortiBytes
      @FortiBytes หลายเดือนก่อน

      Hey really sorry I never got notified that you had commented. I’d suggest playing around with what folder the certificate is installed in look for Trusted Root Certification Authorities

  • @jaygaming_
    @jaygaming_ 6 หลายเดือนก่อน

    Great video!

    • @FortiBytes
      @FortiBytes 6 หลายเดือนก่อน

      Thank you!

  • @danielnadales
    @danielnadales 6 หลายเดือนก่อน

    Good video! In my case when i enable the proxy arp, there's no need to configure a policy because allows all traffic automaticaly. I don't want to allow all the traffic, but when i create the policy it still allows all, any suggestions?

    • @FortiBytes
      @FortiBytes 5 หลายเดือนก่อน

      Hi what switch and FortiOS version are you using I’ll test it! I think it might have changed between versions. Also not all switches support it.

    • @danielnadales
      @danielnadales 5 หลายเดือนก่อน

      Hi! I'm using FortiOs 7.4.3 and a Fortiswitch 448D@@FortiBytes

  • @alcohonis
    @alcohonis 6 หลายเดือนก่อน

    Like the video but increase the font size on the cli

    • @FortiBytes
      @FortiBytes 6 หลายเดือนก่อน

      Ok will do thanks for the feedback!

  • @danimoosakhan
    @danimoosakhan 6 หลายเดือนก่อน

    Can I set up security fabric without FortiAnalyzer?

    • @FortiBytes
      @FortiBytes 6 หลายเดือนก่อน

      No you cannot a FortiAnalyzer is a requirement

  • @intrspection6224
    @intrspection6224 6 หลายเดือนก่อน

    unfortunately many countries like china use DPI in order to filter the internet

  • @pvhoait
    @pvhoait 7 หลายเดือนก่อน

    Can you please help me with setup ZTNA + NPS extension (AZURE) to provide the MFA when HTTPS and TCP forwarding ZTNA?

    • @FortiBytes
      @FortiBytes 7 หลายเดือนก่อน

      Hey, have you checked out my ztna video?

  • @oneitis1989
    @oneitis1989 7 หลายเดือนก่อน

    Thank you!

    • @FortiBytes
      @FortiBytes 7 หลายเดือนก่อน

      You're welcome!

  • @philliproberts7179
    @philliproberts7179 7 หลายเดือนก่อน

    Awesome work! Keep it going!

    • @FortiBytes
      @FortiBytes 7 หลายเดือนก่อน

      Your very welcome I hope the videos help this is part of a wider series.

  • @RowanKaag
    @RowanKaag 7 หลายเดือนก่อน

    I'm really happy this feature got carved out of the DLP feature

  • @RowanKaag
    @RowanKaag 7 หลายเดือนก่อน

    Very helpful examples!

  • @RowanKaag
    @RowanKaag 7 หลายเดือนก่อน

    Hopefully we get to enjoy Web Filtering for a while longer before Encrypted SNI grows in adoption and will start to require Deep Packet Inspection to work

  • @RowanKaag
    @RowanKaag 7 หลายเดือนก่อน

    many organizations don't realize the FortiGate (or any other NGFW) is way less powerful with Deep Packet Inspection, good points Chris.

  • @RowanKaag
    @RowanKaag 7 หลายเดือนก่อน

    we're starting to look into FortiFlex too at our MSSP. We're hinging on starting off using it as a flexible pool of points to spin up lab environments in a private cloud environment and "PAYG".

  • @GoodGameOKC1
    @GoodGameOKC1 7 หลายเดือนก่อน

    Great video, thanks for sharing. New subscriber

    • @FortiBytes
      @FortiBytes 7 หลายเดือนก่อน

      You’re very welcome, it’s part of a series!

  • @RowanKaag
    @RowanKaag 7 หลายเดือนก่อน

    In my experience, customers rarely care about intra-VLAN communication. They should be caring though. Enabling this FortiGate/FortiSwitch-feature brings the neccesary extra visibility and enforcement controls like you showed us. Good video Chris!

  • @RowanKaag
    @RowanKaag 7 หลายเดือนก่อน

    Good find! Was it the following article you stumbled upon? belegdal.wordpress.com/2019/03/11/serial-access-to-fortiswitch-108d-via-netcat/

  • @RowanKaag
    @RowanKaag 7 หลายเดือนก่อน

    While being aware of the CTAP program, I haven't used it. Maybe I should have. Thanks for showing us how the process looks, very interesting!

    • @FortiBytes
      @FortiBytes 7 หลายเดือนก่อน

      Definitely do I had almost a 90% win rate of new customers when using ctap.

  • @RowanKaag
    @RowanKaag 7 หลายเดือนก่อน

    When I initially encountered FortiDeceptor as a new product, I was quick to label it a honeypot. Since it came out, it has definitely proven itself way more capable than just a honeypot.

  • @RowanKaag
    @RowanKaag 7 หลายเดือนก่อน

    having this kind of device posture / compliance checking for network-level access to a network resource is killer and I bet we'll see a steep rise in the adoption of technologies like these moving forward

  • @RowanKaag
    @RowanKaag 7 หลายเดือนก่อน

    I've had the pleasure of meeting Vincent during an Xperts event in the Benelux on FortiPAM, very smart guy and loved listening to his presentation.

  • @RowanKaag
    @RowanKaag 7 หลายเดือนก่อน

    UDP support for ZTNA (TFAP? UFAP?) along with pre-logon connectivity would be game changers

  • @RowanKaag
    @RowanKaag 7 หลายเดือนก่อน

    wondering if Fortinet is using their own "Endpoint Vulnerability" signatures for this scanning or a third party engine, and if Fortinet will ever (re)publish a network-based vulnerability scanner for self hosting.. :)

  • @RowanKaag
    @RowanKaag 7 หลายเดือนก่อน

    these screens are huge!

  • @RowanKaag
    @RowanKaag 7 หลายเดือนก่อน

    Looking forward to the existing and future content!

  • @jerryactrik1901
    @jerryactrik1901 7 หลายเดือนก่อน

    hey bro, thanks for these

    • @FortiBytes
      @FortiBytes 7 หลายเดือนก่อน

      No worries is there anything specific you’d like to see?

    • @jerryactrik1901
      @jerryactrik1901 7 หลายเดือนก่อน

      Honestly, we're just starting the deployment of ZTNA so I don't even know what I don't know. ya know? I am getting some permission errors when trying to connect, something with the graph API. do you know anything about that? I haven't been able to find help@@FortiBytes

  • @engrsajidali5406
    @engrsajidali5406 7 หลายเดือนก่อน

    What are the requiremnts so that one will be working FORTINET TAC support

    • @FortiBytes
      @FortiBytes 7 หลายเดือนก่อน

      Very much depends on the level of TAC but the highest level are very very talented.