Simple Fortigate Firewall Policy to protect your Network.

แชร์
ฝัง
  • เผยแพร่เมื่อ 28 ม.ค. 2025

ความคิดเห็น • 32

  • @MikrotikGM
    @MikrotikGM ปีที่แล้ว

    Thanks dude. I wish you were making more of these videos.

  • @walter.bellini
    @walter.bellini 4 หลายเดือนก่อน

    Just found you and appreciate this video! Need to learn more about FortiNet Routers as I am trying to choose a brand of router to use for current and future clients. Thank you

  • @robsawyer8034
    @robsawyer8034 4 หลายเดือนก่อน +1

    Straight forward and to the point. THank you.

  • @networkn
    @networkn 7 หลายเดือนก่อน

    Dude, this is awesome. I'd love you to share more of your knowledge.

  • @987CAYMAN07
    @987CAYMAN07 ปีที่แล้ว

    thanks, using this to train our users. Great narration!

  • @Anodynus7
    @Anodynus7 ปีที่แล้ว

    just applied to prod. thanks and looking forward to more!

  • @saadsabir9665
    @saadsabir9665 หลายเดือนก่อน

    Thanks for the video, but I have a question. These services that you added on the list are not supposed to be blocked when we use Web, app , and DNS filter on Policy?

  • @xlv600tr
    @xlv600tr 2 หลายเดือนก่อน

    Hi, thank you, it's been very interesting. What's the difference between using this policy and apply to a policy from lan to wan the security profiles ( I think they refer to same databases)?

  • @topo22albertoguti
    @topo22albertoguti 3 หลายเดือนก่อน

    Hello! good job! thanks One Question, its a nice practicese do the same with the incoming services conexion? Rule WAN (Bad Service) to LAN ?

  • @RozzClips
    @RozzClips 4 หลายเดือนก่อน

    This deserve more subscribe and likes.

  • @AMROELMAKKI
    @AMROELMAKKI 5 หลายเดือนก่อน

    good job Bro, so no need to apply security profile on each single policy if apply this policy at the top

  • @vijay85cisco
    @vijay85cisco ปีที่แล้ว +2

    thks.. but this video shows outbound connection from DC to the internet... what about securing malicious in traffic from internet to DC all VLANs

    • @cmonwork
      @cmonwork ปีที่แล้ว +1

      Firewall has implicit deny for any traffic that comes from outside. Unless you have changed this by simply adding WAN as your source int and your internal interface as dest int. If you are referring to: what happens if a user tries to download a virus, When you create a security policy to allow outbound traffic from the internal network to the WAN, and if you have applied the antivirus security profile to that policy, it will protect against downloading malware or virus-infected files from the Internet to your internal network.

    • @tonysfortinetchannel
      @tonysfortinetchannel  ปีที่แล้ว +3

      The basic rule of a firewall is to block traffic. So any attempts to connect to this firewall from outside to inbound is automatically blocked, unless a policy is created to allow it.

    • @janoliver8713
      @janoliver8713 11 หลายเดือนก่อน

      I know that there is an implicit deny rule at the bottom, but I am always doing a similar rule with known bad categories (and also with added third party feeds of known bad IP) an place it as the first firewall policy. It adds a little more security and it prevents known bad IP’s to hit your allowed inbound rules, e.g. a webserver.

  • @techexpert6961
    @techexpert6961 3 หลายเดือนก่อน

    Excellent video

  • @TheHabibalby
    @TheHabibalby 7 หลายเดือนก่อน

    Excellent tip, thanks for sharing it.
    Just one question with regards to the source address, any reason why you have selected all your vLAN/Addresses instead of All -> SpamDestination = Deny?

    • @tonysfortinetchannel
      @tonysfortinetchannel  6 หลายเดือนก่อน

      Two reasons. 1> When your firewall inspects traffic, it uses the firewall's processing resources. Those processing resources need to be managed with intentionality to your configuration. So It makes no sense to inspect literally every interface if there are interfaces where this inspection rule will never matter and have no benefit. Which ones are those? Well for one, the WAN interfaces do not need to be subjected to inspection of inbound traffic to malicious destinations that will never exist inside your network (or through it). That's an example of a hypothetical scenario where this would rule would not help by choosing "any". 2> Most firewall configurations do NOT have the multiple interfaces feature visible where you get to choose multiple source interface as well as the "any" source interface. so if I selected "any", ppl be like "it's not an option in my fw".

    • @TheHabibalby
      @TheHabibalby 6 หลายเดือนก่อน

      @@tonysfortinetchannel Thanks for your reply, exactly, the interfaces that you have selected don't show in my list other than the interface itself.

  • @adolfofioranelli
    @adolfofioranelli ปีที่แล้ว

    Thanks! Nice Policy

  • @ahmedalmarri4515
    @ahmedalmarri4515 4 หลายเดือนก่อน

    i cant add multiple interfaces in the incoming interfaces like you i have to do a policy for each how can i fix that

    • @michaelhood1815
      @michaelhood1815 4 หลายเดือนก่อน

      Enable multiple interface policies under feature visibility.

  • @JuniperoSerra-v1n
    @JuniperoSerra-v1n ปีที่แล้ว

    This helps a lot! thanks

  • @dfoxguru
    @dfoxguru 3 หลายเดือนก่อน

    In my Fortigate-60F there is no way to add multiple Incoming Interfaces. FortiGate 60F v7.4.5 build2702

    • @dfoxguru
      @dfoxguru 3 หลายเดือนก่อน

      I found the answer from one of the questions posted earlier. Thanks @michaelhood1815

  • @zahraaelsayed7154
    @zahraaelsayed7154 ปีที่แล้ว

    i'm don't have licence for this fortigate

    • @tonysfortinetchannel
      @tonysfortinetchannel  ปีที่แล้ว +2

      This is a next-gen Firewall which requires a subscriptions in order to keep up to date with worldwide threat intelligence. Threats are being created all the time, everyday. A subscription on your firewall allows it to receive this intelligence as soon as it's available. It's not enough to do classic firewall anymore. Threat intelligence is KEY to your firewall's ability to protect it's network from attacks. New Botnet domains are being created literally every moment of every day.

  • @NoneRain_
    @NoneRain_ 8 หลายเดือนก่อน

    thanks mate

  • @tomisac1809
    @tomisac1809 ปีที่แล้ว

    That is great

  • @pg41226
    @pg41226 7 หลายเดือนก่อน

    And get my system infected nu the Chinese? 😅

  • @MattChilders-d8f
    @MattChilders-d8f 10 หลายเดือนก่อน

    Tony you're great but you talk too damn fast. 🙂

    • @tonysfortinetchannel
      @tonysfortinetchannel  6 หลายเดือนก่อน

      I do! Probably a combination of being in the Northeast where people just talk faster up here than many other parts of the world, and my 3rd cup of coffee contributed, and my desire to keep the video short. On a positive note, youtube lets you change speed of videos. I often find myself speeding up videos.