Тёмный
Rakshit Vidyarthi
Rakshit Vidyarthi
Rakshit Vidyarthi
Подписаться
I am a B.Com graduate turned Network-Security-Engineer. Being a Spiritually grounded minimalist, I'm on a mission to help 1,00,000 Working professionals achieve next-level Career Growth using my L2-TAC Experience. For this, I have created "Fortigate Firewall Mastery" which has turned Network-Security Engineers into World-class Engineers.
Комментарии
@bounseysinnavong3963
@bounseysinnavong3963 10 дней назад
Does your perform this tutorial on your real device or simulator?
@rakshitvidyarthi
@rakshitvidyarthi 9 дней назад
this is an emulator called EVE-NG
@chaminda69
@chaminda69 16 дней назад
Thank you very much for a fantastic presentation - nothing short of awesome.
@sritechsolution9248
@sritechsolution9248 18 дней назад
IPsec tunnel down debug showing dpd down but when when ping continue from peer site and manualy up tunnel some tunnel up I need solution for this
@sridharbvnl2101
@sridharbvnl2101 24 дня назад
how to check logs for interesting traffic ? while packet capture we can only see gateway IP logs
@bobcowley9370
@bobcowley9370 Месяц назад
The firewall policy that wasn't working at 44:10 before you changed the firewall mode didn't have an action configured. The rule you created after changing the firewall mode did have an action of permit.
@maurofadda289
@maurofadda289 2 месяца назад
Why port3 has an IP? do you use that as a management?
@rakshitvidyarthi
@rakshitvidyarthi 2 месяца назад
Port3 is acting as gateway for LAN segments/Users
@maurofadda289
@maurofadda289 2 месяца назад
@@rakshitvidyarthi ok but if i had a switch attached to that port,,i would give it that network as a management ip?
@rakshitvidyarthi
@rakshitvidyarthi 2 месяца назад
@@maurofadda289 the idea behind connecting devices in such a topology is to emulate an environment of lan users connecting to their gateway which is firewall. In real scenarios, we have MGMT ports which are used to keep the management pane separate from data pane.
@mahendrakumarsahu4395
@mahendrakumarsahu4395 2 месяца назад
Truly amazing and informative lecture Sir. Many things I have learnt from this session which will improve my skills for future endeavours. A Great thanks to you for the support.🙏🙏🙏
@dineshkomakula3001
@dineshkomakula3001 3 месяца назад
Rakshit please post videos regularly
@rakshitvidyarthi
@rakshitvidyarthi 3 месяца назад
Hi Dinesh, yes absolutely. trying to manage time between projects, classes and personal challenges. will try to post something each week. Thanks for checking in. All the best!
@jakejakeson4619
@jakejakeson4619 3 месяца назад
Hey man, that was a really awesome video. Well explained, I can tell you have a lot of knowledge and you helped me understand how to create a policy in Fortigate. Thank you!
@rakshitvidyarthi
@rakshitvidyarthi 9 дней назад
Thank you so much!
@R_F_R_F
@R_F_R_F 3 месяца назад
Thanks, btw where I can download fortinet trial version to run in my Eve ng console? please advise
@rakshitvidyarthi
@rakshitvidyarthi 3 месяца назад
you need to register at support.fortinet.com and download the kvm extension
@R_F_R_F
@R_F_R_F 3 месяца назад
@@rakshitvidyarthi - Thanks. I tried to manage to bring up Eve ng and fortinet firmwares. However when I click Firewall in Eveng it's coming on and then goes off. Putty - Network error:connection refused. pls help
@rakshitvidyarthi
@rakshitvidyarthi 3 месяца назад
@@R_F_R_F its the permission command that should fix the issue. please go through the below link and ensure to follow it step by step: www.eve-ng.net/index.php/documentation/howtos/howto-add-fortinet-images/
@R_F_R_F
@R_F_R_F 3 месяца назад
@@rakshitvidyarthi - I did it but still same.
@vamsikrishna7658
@vamsikrishna7658 4 месяца назад
Thanks for the amazing video
@netconfig999
@netconfig999 4 месяца назад
Thanks for your sharing, this video is really helpful for me.
@user-ti9hj5lu6t
@user-ti9hj5lu6t 4 месяца назад
which tool / materials you are using in order to draw on the screen ? thansk you
@giovanniruffato9588
@giovanniruffato9588 4 месяца назад
Amazing!
@kevins6886
@kevins6886 5 месяцев назад
NICE
@yvesneptune
@yvesneptune 5 месяцев назад
Good job sir!
@j.m3108
@j.m3108 5 месяцев назад
I dont recognize that simulator whay you are using? What it is?
@netlogis
@netlogis 6 месяцев назад
Good Stuff Thanks for sharing
@GumbyTube
@GumbyTube 6 месяцев назад
Excellent video. Thank you very much for your time and perfect explanations. This helped me out huge.
@sanglikarsantoshnikam8909
@sanglikarsantoshnikam8909 7 месяцев назад
as you say at one point cisco asa is stateless firewall is that correct??
@nedatula2974
@nedatula2974 7 месяцев назад
Great . Thank you.
@nanibrv3572
@nanibrv3572 7 месяцев назад
Hi sir, In this lecture you have configured simple policy in fw and in policy config you have mentioned services as ALL(which allows all tcp udp..etc) . but if BGP routing is configured and what if I want to allow only https service in policy . should I enable both tcp port 179(Bgp) , 443(https)?
@avinashgawade822
@avinashgawade822 7 месяцев назад
Awesome teaching skill man. Thank you.
@deepbanerji99
@deepbanerji99 7 месяцев назад
You've stated that Target Client is for traffic from outside to lan. When http request is coming from outside(client) to our server, shouldn't the Target be Server??
@dhavalvartak1883
@dhavalvartak1883 8 месяцев назад
Your all tutorials are Informative 👍
@EngrDJDebug
@EngrDJDebug 8 месяцев назад
@rakshit can please share your eve-ng file.
@user-fz7jz5hw8i
@user-fz7jz5hw8i 9 месяцев назад
What we miss sir I don't found yet
@mantid83
@mantid83 9 месяцев назад
Saving this for later. Thank you@
@Nawaz7861
@Nawaz7861 9 месяцев назад
What is rhe procdedure in active passive setup with zero downtime.
@mananmakkar9096
@mananmakkar9096 9 месяцев назад
The main goal of anti-replay is to avoid hackers injecting or making changes in packets that travel from a source to a destination. Anti-replay protocol uses a unidirectional security association in order to establish a secure connection between two nodes in the network. Once a secure connection is established, the anti-replay protocol uses packet sequence numbers to defeat replay attacks as follows: When the source sends a message, it adds a sequence number to its packet; the sequence number starts at 0 and is incremented by 1 for each subsequent packet. The destination maintains a 'sliding window' record of the sequence numbers of validated received packets; it rejects all packets which have a sequence number which is lower than the lowest in the sliding window (i.e. too old) or already appears in the sliding window (i.e. duplicates/replays). Accepted packets, once validated, update the sliding window (displacing the lowest sequence number out of the window if it was already full)
@mananmakkar9096
@mananmakkar9096 9 месяцев назад
ek overlapping subnets pe bhi karde bhai
@explorewithamitava
@explorewithamitava 9 месяцев назад
great job done
@rahulkushwah9022
@rahulkushwah9022 9 месяцев назад
How can I join your course?
@azhar2051991
@azhar2051991 10 месяцев назад
can you share your system configuration.. eveng is working so good in your system..
@sridharbvnl2101
@sridharbvnl2101 10 месяцев назад
plz show VDOM
@sridharbvnl2101
@sridharbvnl2101 10 месяцев назад
nice
@user-wp3mr3ex2u
@user-wp3mr3ex2u 10 месяцев назад
Can you share this flowchart?
@Nawaz7861
@Nawaz7861 10 месяцев назад
This is very good information which we hardly find on RU-vid. Would you be able to share the document that is show in the video.
@lumpiataoge9536
@lumpiataoge9536 11 месяцев назад
question, can I use the 802.3ad interface as my vlan connection? i have a 100d running with version 5. i know this is an old device but I want to know if I can do this on the latest OS?
@rakshitvidyarthi
@rakshitvidyarthi 11 месяцев назад
yes absolutely possible. All the best!
@umeshprajapati7546
@umeshprajapati7546 11 месяцев назад
Are going to deliver any fortigate session in upcoming days.
@zpark88
@zpark88 11 месяцев назад
Hi, i was tasked with a setup of the following. 4 Vlans where they all have dhcp vlan 1 and vlan 2 should have access between eachother. And vlan 3 and 4 should be stand alone. They are also all suppose to have 100 adresses each. I created 4 vlans on 4 different internal switches and i added a 4 policys on vlan 1 and vlan 2. Since im unsure how the access between 2 vlans is suppose to be so that they can fully access eachother. but not allowing the others in. Now im not sure if this video is the correct one to use for such a setup. also i might as im very new to this kind of stuff. So would be nice to get some help.
@rakshitvidyarthi
@rakshitvidyarthi 11 месяцев назад
If i understand this correctly, let me share what needs to be done on fortigate: reate VLAN interfaces (vlan1, vlan2, vlan3, and vlan4) on the FortiGate. Assign IP addresses to each VLAN interface. Allowed necessary services (like ping, SSH, HTTP) on each VLAN interface. et up DHCP servers for each VLAN interface. Configure a range of 100 IP addresses for each VLAN. reate firewall policies: Allowed traffic from vlan1 to vlan2. Allowed traffic from vlan2 to vlan1. This ensures vlan1 and vlan2 can communicate but vlan3 and vlan4 remain standalone. (if needed): Create NAT policies to allow internet access from each VLAN to the internet (assuming this was required). config system interface edit vlan1 set type vlan set vlanid 1 set interface <your_internal_switch_interface> set ip 192.168.1.1 255.255.255.0 set allowaccess ping https ssh snmp http telnet next edit vlan2 set type vlan set vlanid 2 set interface <your_internal_switch_interface> set ip 192.168.2.1 255.255.255.0 set allowaccess ping https ssh snmp http telnet next edit vlan3 set type vlan set vlanid 3 set interface <your_internal_switch_interface> set ip 192.168.3.1 255.255.255.0 set allowaccess ping https ssh snmp http telnet next edit vlan4 set type vlan set vlanid 4 set interface <your_internal_switch_interface> set ip 192.168.4.1 255.255.255.0 set allowaccess ping https ssh snmp http telnet next end config system dhcp server edit 1 set interface vlan1 set default-gateway 192.168.1.1 set netmask 255.255.255.0 set ip-range start 192.168.1.10 end 192.168.1.109 next edit 2 set interface vlan2 set default-gateway 192.168.2.1 set netmask 255.255.255.0 set ip-range start 192.168.2.10 end 192.168.2.109 next edit 3 set interface vlan3 set default-gateway 192.168.3.1 set netmask 255.255.255.0 set ip-range start 192.168.3.10 end 192.168.3.109 next edit 4 set interface vlan4 set default-gateway 192.168.4.1 set netmask 255.255.255.0 set ip-range start 192.168.4.10 end 192.168.4.109 next end config firewall policy edit 1 set name "VLAN1 to VLAN2" set srcintf vlan1 set dstintf vlan2 set srcaddr all set dstaddr all set action accept next edit 2 set name "VLAN2 to VLAN1" set srcintf vlan2 set dstintf vlan1 set srcaddr all set dstaddr all set action accept next end You can always modify the source and destination address as per the real IP address requirements. Treat this as a high level overview of what needs to be executed on Fortigate. Hope this help. All the best!