Тёмный

InterVlan routing on Fortigate Firewall | Lecture#5 

Подписаться
Просмотров 48 тыс.
% 520

In this video, we will be looking at inter Vlan routing & communication between two hosts residing in different vlans.

Авто/Мото

Опубликовано:

 

13 дек 2021

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 56   
@askmethod
@askmethod 3 дня назад
nice work bro. keep it up
@miguellorenzosantos8544
@miguellorenzosantos8544 2 года назад
Waiting for the next vid on the series on fortigate! Great vid! The past 2 vids got me everything I need!
@gwlane5509
@gwlane5509 10 месяцев назад
Excellent videos! New to fortigate here.
@shaibannatha795
@shaibannatha795 Год назад
Thanks for your videos. Very helpful.
@kokoaung8536
@kokoaung8536 2 года назад
Excellent work
@AbdurRahman-kc5fq
@AbdurRahman-kc5fq Год назад
Thank you for explaining it in a simple and effective way !! Also, please explain me the difference between H/W switch, S/W switch and VLAN switch in the Fortigate! Thank you!!
@roghertrivero8721
@roghertrivero8721 2 года назад
great man! I need more of this!
@doctor.networks
@doctor.networks 2 года назад
More coming soon Man 🙂
@movisajid
@movisajid 2 года назад
Nice work, waiting for new videos..
@allrated
@allrated 2 года назад
Well explained. Thanks for this vid man.
@doctor.networks
@doctor.networks 2 года назад
Glad that helped you brother.
@zbng007
@zbng007 Год назад
thanks pal great tutorial
@balla2172
@balla2172 Год назад
Watched this super tired didn't understand a thing... rested up watched again perfect sense you are a godsend! People who say Cisco cli is easier are nuts... Keep this going with these I'd request multi vlan network and dns most secure way
@doctor.networks
@doctor.networks Год назад
Haha right, sleep is extremely important, need to have it to understand concepts 100% of the time.
@longtrinh3085
@longtrinh3085 Год назад
Great! Thanks a lot, keep it up bro!
@doctor.networks
@doctor.networks Год назад
Thanks, will do!
@netconfig999
@netconfig999 2 месяца назад
thanks for sharing this VDO, this is really helpful Thanks❤❤
@doctor.networks
@doctor.networks 2 месяца назад
You are welcome @netconfig999. Nice channel name by the way 😀
@oldengish65
@oldengish65 2 года назад
Great series so far. When will the next upload be?
@doctor.networks
@doctor.networks 2 года назад
Thank You for the appreciation! Coming Soon.
@a.visser1038
@a.visser1038 Год назад
Thanks! really love your video's. When will you post a video about the SD-WAN?
@doctor.networks
@doctor.networks Год назад
I really want to, but struggling a little with time, hopefully will get some time
@ensardemirkol4361
@ensardemirkol4361 Год назад
good explanation, thanks
@doctor.networks
@doctor.networks Год назад
Glad it was helpful!
@Neur0bit
@Neur0bit Год назад
Great video. There’s an easier way. Just add all your VLANS/Subnets into a Zone (for example, an inside or trust zone), and disable “Block intra-zone traffic”, and they will all be able to communicate with each other without having to add any policies. Cheers
@doctor.networks
@doctor.networks Год назад
Thanks for the trick! haven't done that but will give that a try as well.
@10mashood
@10mashood 4 месяца назад
Idea is good ..but all vlans in one zone is not recommended and is a security concern in real environment...
@thanakornweingteerawat1805
@thanakornweingteerawat1805 2 года назад
Thanks. You're awesome :)
@doctor.networks
@doctor.networks 2 года назад
Thanks for the super awesome comment man!
@piotrekheim5218
@piotrekheim5218 Год назад
Thank You for this video.
@doctor.networks
@doctor.networks Год назад
you're welcome brother 😀
@localfuture1484
@localfuture1484 Год назад
Thanks a lot. Could you tell me what kinds of tools you use to draw the diagram? Does it come with those cute icons?
@doctor.networks
@doctor.networks Год назад
hhhh it's actually an animation software called Videoscribe, these icons are not buildin, I make them in Adobe illustrator & call them in videoscribe. Afterwards take a screenshot & paste in PowerPoint. That is what you see in the video
@mcorleone77
@mcorleone77 3 месяца назад
thanks for posting it. Is eve-ng running on your PC or on an EXSi ?
@doctor.networks
@doctor.networks 3 месяца назад
Specifically for this video it's a physical ForiGate box. Normally for my videos I use Eve-ng on a Esxi server to offload resources
@user-zz8rn8es8q
@user-zz8rn8es8q 3 месяца назад
Thx❤❤
@azeem20090
@azeem20090 Год назад
Thanks a lot,do I have to allow the vlan in the trunk linke or the native vlan is enough. I noticed in my Network the data vlan and voice are not mention in the trunk but sill pc can get an ip from the data vlan ,,How come don't I need to say switch port trunk allow vlan,x,y,z .
@doctor.networks
@doctor.networks Год назад
That is because a cisco switch by default allows all vlans. You limit the vlans on a trunk by the command "Switchport trunk allow vlan x, y, z".
@sinade1
@sinade1 Год назад
For a stateful firewall, I believe a single policy should be enough to facilitate to and fro traffic. Is it possible to do that in the FortiGate firewall as in Cisco ASA firewall?
@doctor.networks
@doctor.networks Год назад
Bro at 11:14 you see that we pinged the server right, that happened because of stateful inspection.
@ranghelsoto6516
@ranghelsoto6516 2 года назад
Hello, Dr. Do you have any video related to ADVPN on Fortigate? It would be a great help, because of the amount of customers using this service nowadays. Regards.
@doctor.networks
@doctor.networks 2 года назад
Let me note that down & I will surely make a video on it
@aghrissamohamed2735
@aghrissamohamed2735 Год назад
I have all that setup with a Netgear smart managed switch. I can ping all vlans from a machine in VLan1 but I can't ping the machine on vlan 1 from the other vlans?
@doctor.networks
@doctor.networks Год назад
Im not sure about netgear actually. Possibly a policy is blocking the traffic from other vlans to your target vlan 1
@psychoticapex
@psychoticapex 10 месяцев назад
Will there be a loss of processing speed? Is it better to use a dedicated L3 Switch in this scenario?
@doctor.networks
@doctor.networks 10 месяцев назад
Well actually it depends, if you have a very small environment, then this approach is fine. If you're network is medium to large then YES, you need to separate via an L3 switch.
@psychoticapex
@psychoticapex 10 месяцев назад
@@doctor.networks got it, thanks!
@marksep5294
@marksep5294 9 месяцев назад
Can I ping a printer in another VLAN, without disabling the firewall in the source laptop? assuming there is interVLAN policy between the 2 VLANs
@doctor.networks
@doctor.networks 9 месяцев назад
You should be able to ping it
@jimchen4269
@jimchen4269 2 года назад
Can the ip address of the SVI be completely different from the main interface ip? For example, the main would be 192.168.1.99/24, then can a I use 30.30.25.1/24 for one of my SVI?
@doctor.networks
@doctor.networks 2 года назад
Sorry Jim your comment was in the spam of RU-vid, RU-vid blocks comments containing IP addresses i guess. Yes you can, the main interface will be as a native vlan with no vlan tag of course & the other SVI can be any Ip you want
@jimchen4269
@jimchen4269 2 года назад
@@doctor.networks Thank you.
@shaibannatha795
@shaibannatha795 Год назад
Is there a Lecture #6 ? Or the videos end here?
@doctor.networks
@doctor.networks 11 месяцев назад
Unfortunately My career took a huge turn here, couldn't continue. But now I'm thinking of resuming the series soon
@swgvoyage3878
@swgvoyage3878 Месяц назад
Why need this much of policies for intervlan, i think just create a zone and add the vlan's to that zone, that's bettee to simplifying 😊
@doctor.networks
@doctor.networks Месяц назад
Yeah but but you may need different policies for a set of vlans, you can actually create multiple zones referencing multiple vlans. The video is to give a concept that's why kept it simple. Obviously zones will be a better approach in the long term.