FortiGate Firewall: Intrusion Prevention System (IPS) Tutorial

แชร์
ฝัง
  • เผยแพร่เมื่อ 22 ส.ค. 2024

ความคิดเห็น • 24

  • @DemeterN
    @DemeterN 8 หลายเดือนก่อน

    Fantastic....this makes me so excited to explore further and explains in a very understandable way "how things work with Fortigate"

    • @FortiBytes
      @FortiBytes  8 หลายเดือนก่อน

      Your very welcome lots of videos on the channel and it’s not going to stop! Let me know if there is anything specific you would like!

  • @RowanKaag
    @RowanKaag 6 หลายเดือนก่อน

    Very helpful examples!

  • @clivethompson6546
    @clivethompson6546 5 หลายเดือนก่อน

    Very helpful video, nice and clear, thanks.

    • @FortiBytes
      @FortiBytes  4 หลายเดือนก่อน

      Glad it was helpful! Your Welcome!

  • @WinfreySharon
    @WinfreySharon 8 หลายเดือนก่อน

    Thank you. that was very clear and very helpful!

    • @FortiBytes
      @FortiBytes  8 หลายเดือนก่อน

      You’re very welcome, checkout some of the other videos there is like 50 or something now. The FortiManager series in particular is recommended.

  • @dgilvani
    @dgilvani 3 หลายเดือนก่อน

    Golden! Thank you 😊

    • @FortiBytes
      @FortiBytes  3 หลายเดือนก่อน

      You’re welcome, more videos soon.

  • @user-oj6iz2im4w
    @user-oj6iz2im4w 2 หลายเดือนก่อน

    Good video. I just bought my fortigate and thought it was protecting me but it wasn't.

    • @FortiBytes
      @FortiBytes  2 หลายเดือนก่อน +1

      Make sure you look into some of the other videos on the channel, specially deep packet inspection as most of the traffic going through your device is encrypted so you need some additional steps to be able see into that traffic.

    • @user-oj6iz2im4w
      @user-oj6iz2im4w 2 หลายเดือนก่อน

      @@FortiBytes thanks, I had enabled everything but had to back it down due to certificate warnings

  • @simonbell3619
    @simonbell3619 ปีที่แล้ว

    audio much better, much louder and clearer

    • @FortiBytes
      @FortiBytes  ปีที่แล้ว

      Thanks Si

    • @sn3aky-t217
      @sn3aky-t217 ปีที่แล้ว

      Yes it's much better. Huge improvement. Really enjoy the videos. Maybe for the future you could check if you could place some items that reduce the echo-ing. I think you could fabricate something with curtains/rug/pillows/whatever before you go and purchase all these expensive sound panels.

    • @FortiBytes
      @FortiBytes  ปีที่แล้ว

      @@sn3aky-t217 I’m sat in the sound proofed room that’s designed to keep the sound inside! So it’s working against what we need here! I’m going to get some of that foamy stuff and plaster it all over the walls at some point! Thank you for the awesome feedback also!

  • @ornaldonaqellari1254
    @ornaldonaqellari1254 4 หลายเดือนก่อน

    Thank you for the video. I do have a question: Why in the case of internal traffic leaving to internet we need to apply even the IPS Signatures and Filters ? Is it just enough to enable Block Malicious URLs and Outgoing Connections to Botnet Sites ? so you can save memory and cpu ?

    • @FortiBytes
      @FortiBytes  4 หลายเดือนก่อน

      Hey, great question and its something that comes up quite frequency. IF you have the resources to do so then its best practice to apply IPS to outbound policys also. Sometimes malware gets inside your envrioment meaning that the traffic orginates from the inside lets use a TCP based reverse shell for example communicating back to a know C&K server.

  • @rogergaudet9786
    @rogergaudet9786 ปีที่แล้ว +1

    Just to get a clarification, if for example, I am protecting a DNS server in an inter-VLAN scenario and I create a filtered IPS sensor like you described, there is no reason to enable deep packet inspection on the policy if all I have is port 53 allowed in the policy since I'm not doing DNS over TLS, correct?

    • @FortiBytes
      @FortiBytes  ปีที่แล้ว +1

      Yes this is correct if your only limiting to DNS meaning all other potential exploits that might be wrapped inside tls/ssl are mitigated only leaving things specific to dns like reflection attacks. I’ll be honest I wanted to expand more on this whole deep packet discussion but the video had already massively overran! I’ll be doing a video at some point specially around deep packet inspection. There are clients out there such as programmable logic controllers in the OT space where you cannot even install a certificate to be able to do it! Thanks for reaching out!

    • @sn3aky-t217
      @sn3aky-t217 ปีที่แล้ว +1

      @@FortiBytes I would love to see a video about SSL deep inspection. I notice a lot of companies struggle with it and because of the impact it gives, they are not using it. Causing blind spots. I hope you can do a video that also explains how to deal with apps/websites that don't like SSL deep inspection and also what are like the basic design/implementation routes you take before turning it on and causing a big bang.

    • @FortiBytes
      @FortiBytes  ปีที่แล้ว

      ​@@sn3aky-t217Thanks for reaching out Its the next video I'm doing! (I promise). Its a complex topic that's super important and I want to ensure I hit the spot with it. The videos I have been releasing this week and the one tonight are leading up to it!

  • @SuperDaddyof2DD
    @SuperDaddyof2DD 11 หลายเดือนก่อน

    a lot of discussion prior to showing the actual tutorial, and then when showing how to create the sensor you gloss over how you actually created the sensor. I would prefer less discussion in the beginning, and a more exact route to create the sensor.

    • @FortiBytes
      @FortiBytes  11 หลายเดือนก่อน

      Hi 👋 ok no problem I’ll try and do more to the point technical stuff in future. Thanks for taking the time to feedback.