Simple Fortigate Firewall Policy to protect your Network.

แชร์
ฝัง
  • เผยแพร่เมื่อ 2 ต.ค. 2024
  • This video shows a simple firewall policy rule you can apply to your fortigate firewall to protect your network from a significant amount of malicious traffic.

ความคิดเห็น • 26

  • @RozzClips
    @RozzClips 10 วันที่ผ่านมา

    This deserve more subscribe and likes.

  • @robsawyer8034
    @robsawyer8034 22 วันที่ผ่านมา +1

    Straight forward and to the point. THank you.

  • @walter.bellini
    @walter.bellini 3 วันที่ผ่านมา

    Just found you and appreciate this video! Need to learn more about FortiNet Routers as I am trying to choose a brand of router to use for current and future clients. Thank you

  • @Anodynus7
    @Anodynus7 9 หลายเดือนก่อน

    just applied to prod. thanks and looking forward to more!

  • @vijay85cisco
    @vijay85cisco ปีที่แล้ว +2

    thks.. but this video shows outbound connection from DC to the internet... what about securing malicious in traffic from internet to DC all VLANs

    • @cmonwork
      @cmonwork ปีที่แล้ว

      Firewall has implicit deny for any traffic that comes from outside. Unless you have changed this by simply adding WAN as your source int and your internal interface as dest int. If you are referring to: what happens if a user tries to download a virus, When you create a security policy to allow outbound traffic from the internal network to the WAN, and if you have applied the antivirus security profile to that policy, it will protect against downloading malware or virus-infected files from the Internet to your internal network.

    • @tonysfortinetchannel
      @tonysfortinetchannel  10 หลายเดือนก่อน +2

      The basic rule of a firewall is to block traffic. So any attempts to connect to this firewall from outside to inbound is automatically blocked, unless a policy is created to allow it.

    • @janoliver8713
      @janoliver8713 7 หลายเดือนก่อน

      I know that there is an implicit deny rule at the bottom, but I am always doing a similar rule with known bad categories (and also with added third party feeds of known bad IP) an place it as the first firewall policy. It adds a little more security and it prevents known bad IP’s to hit your allowed inbound rules, e.g. a webserver.

  • @ahmedalmarri4515
    @ahmedalmarri4515 19 วันที่ผ่านมา

    i cant add multiple interfaces in the incoming interfaces like you i have to do a policy for each how can i fix that

    • @michaelhood1815
      @michaelhood1815 15 วันที่ผ่านมา

      Enable multiple interface policies under feature visibility.

  • @AMROELMAKKI
    @AMROELMAKKI หลายเดือนก่อน

    good job Bro, so no need to apply security profile on each single policy if apply this policy at the top

  • @networkn
    @networkn 3 หลายเดือนก่อน

    Dude, this is awesome. I'd love you to share more of your knowledge.

  • @pg41226
    @pg41226 3 หลายเดือนก่อน

    And get my system infected nu the Chinese? 😅

  • @MikrotikGM
    @MikrotikGM 8 หลายเดือนก่อน

    Thanks dude. I wish you were making more of these videos.

  • @NoneRain_
    @NoneRain_ 4 หลายเดือนก่อน

    thanks mate

  • @TheHabibalby
    @TheHabibalby 3 หลายเดือนก่อน

    Excellent tip, thanks for sharing it.
    Just one question with regards to the source address, any reason why you have selected all your vLAN/Addresses instead of All -> SpamDestination = Deny?

    • @tonysfortinetchannel
      @tonysfortinetchannel  2 หลายเดือนก่อน

      Two reasons. 1> When your firewall inspects traffic, it uses the firewall's processing resources. Those processing resources need to be managed with intentionality to your configuration. So It makes no sense to inspect literally every interface if there are interfaces where this inspection rule will never matter and have no benefit. Which ones are those? Well for one, the WAN interfaces do not need to be subjected to inspection of inbound traffic to malicious destinations that will never exist inside your network (or through it). That's an example of a hypothetical scenario where this would rule would not help by choosing "any". 2> Most firewall configurations do NOT have the multiple interfaces feature visible where you get to choose multiple source interface as well as the "any" source interface. so if I selected "any", ppl be like "it's not an option in my fw".

    • @TheHabibalby
      @TheHabibalby 2 หลายเดือนก่อน

      @@tonysfortinetchannel Thanks for your reply, exactly, the interfaces that you have selected don't show in my list other than the interface itself.

  • @adolfofioranelli
    @adolfofioranelli 8 หลายเดือนก่อน

    Thanks! Nice Policy

  • @987CAYMAN07
    @987CAYMAN07 ปีที่แล้ว

    thanks, using this to train our users. Great narration!

  • @JuniperoSerra-v1n
    @JuniperoSerra-v1n ปีที่แล้ว

    This helps a lot! thanks

  • @tomisac1809
    @tomisac1809 ปีที่แล้ว

    That is great

  • @MattChilders-d8f
    @MattChilders-d8f 6 หลายเดือนก่อน

    Tony you're great but you talk too damn fast. 🙂

    • @tonysfortinetchannel
      @tonysfortinetchannel  2 หลายเดือนก่อน

      I do! Probably a combination of being in the Northeast where people just talk faster up here than many other parts of the world, and my 3rd cup of coffee contributed, and my desire to keep the video short. On a positive note, youtube lets you change speed of videos. I often find myself speeding up videos.

  • @zahraaelsayed7154
    @zahraaelsayed7154 ปีที่แล้ว

    i'm don't have licence for this fortigate

    • @tonysfortinetchannel
      @tonysfortinetchannel  10 หลายเดือนก่อน +2

      This is a next-gen Firewall which requires a subscriptions in order to keep up to date with worldwide threat intelligence. Threats are being created all the time, everyday. A subscription on your firewall allows it to receive this intelligence as soon as it's available. It's not enough to do classic firewall anymore. Threat intelligence is KEY to your firewall's ability to protect it's network from attacks. New Botnet domains are being created literally every moment of every day.