Тёмный

Simple Fortigate Firewall Policy to protect your Network. 

TonysFortinetChannel
Подписаться 271
Просмотров 17 тыс.
50% 1

This video shows a simple firewall policy rule you can apply to your fortigate firewall to protect your network from a significant amount of malicious traffic.

Наука

Опубликовано:

 

23 мар 2023

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 20   
@987CAYMAN07
@987CAYMAN07 Год назад
thanks, using this to train our users. Great narration!
@user-pk9mg2lr4e
@user-pk9mg2lr4e 6 месяцев назад
Thanks dude. I wish you were making more of these videos.
@Anodynus7
@Anodynus7 7 месяцев назад
just applied to prod. thanks and looking forward to more!
@networkn
@networkn Месяц назад
Dude, this is awesome. I'd love you to share more of your knowledge.
@adolfofioranelli
@adolfofioranelli 6 месяцев назад
Thanks! Nice Policy
@user-vh8bp2gd3p
@user-vh8bp2gd3p Год назад
This helps a lot! thanks
@NoneRain_
@NoneRain_ 2 месяца назад
thanks mate
@tomisac1809
@tomisac1809 9 месяцев назад
That is great
@vijay85cisco
@vijay85cisco Год назад
thks.. but this video shows outbound connection from DC to the internet... what about securing malicious in traffic from internet to DC all VLANs
@cmonwork
@cmonwork Год назад
Firewall has implicit deny for any traffic that comes from outside. Unless you have changed this by simply adding WAN as your source int and your internal interface as dest int. If you are referring to: what happens if a user tries to download a virus, When you create a security policy to allow outbound traffic from the internal network to the WAN, and if you have applied the antivirus security profile to that policy, it will protect against downloading malware or virus-infected files from the Internet to your internal network.
@tonysfortinetchannel
@tonysfortinetchannel 8 месяцев назад
The basic rule of a firewall is to block traffic. So any attempts to connect to this firewall from outside to inbound is automatically blocked, unless a policy is created to allow it.
@janoliver8713
@janoliver8713 5 месяцев назад
I know that there is an implicit deny rule at the bottom, but I am always doing a similar rule with known bad categories (and also with added third party feeds of known bad IP) an place it as the first firewall policy. It adds a little more security and it prevents known bad IP’s to hit your allowed inbound rules, e.g. a webserver.
@TheHabibalby
@TheHabibalby 27 дней назад
Excellent tip, thanks for sharing it. Just one question with regards to the source address, any reason why you have selected all your vLAN/Addresses instead of All -> SpamDestination = Deny?
@tonysfortinetchannel
@tonysfortinetchannel 6 дней назад
Two reasons. 1> When your firewall inspects traffic, it uses the firewall's processing resources. Those processing resources need to be managed with intentionality to your configuration. So It makes no sense to inspect literally every interface if there are interfaces where this inspection rule will never matter and have no benefit. Which ones are those? Well for one, the WAN interfaces do not need to be subjected to inspection of inbound traffic to malicious destinations that will never exist inside your network (or through it). That's an example of a hypothetical scenario where this would rule would not help by choosing "any". 2> Most firewall configurations do NOT have the multiple interfaces feature visible where you get to choose multiple source interface as well as the "any" source interface. so if I selected "any", ppl be like "it's not an option in my fw".
@TheHabibalby
@TheHabibalby 16 часов назад
@@tonysfortinetchannel Thanks for your reply, exactly, the interfaces that you have selected don't show in my list other than the interface itself.
@zahraaelsayed7154
@zahraaelsayed7154 Год назад
i'm don't have licence for this fortigate
@tonysfortinetchannel
@tonysfortinetchannel 8 месяцев назад
This is a next-gen Firewall which requires a subscriptions in order to keep up to date with worldwide threat intelligence. Threats are being created all the time, everyday. A subscription on your firewall allows it to receive this intelligence as soon as it's available. It's not enough to do classic firewall anymore. Threat intelligence is KEY to your firewall's ability to protect it's network from attacks. New Botnet domains are being created literally every moment of every day.
@pg41226
@pg41226 Месяц назад
And get my system infected nu the Chinese? 😅
@user-dr6gr6uk3x
@user-dr6gr6uk3x 4 месяца назад
Tony you're great but you talk too damn fast. 🙂
@tonysfortinetchannel
@tonysfortinetchannel 6 дней назад
I do! Probably a combination of being in the Northeast where people just talk faster up here than many other parts of the world, and my 3rd cup of coffee contributed, and my desire to keep the video short. On a positive note, youtube lets you change speed of videos. I often find myself speeding up videos.
Далее
InterVlan routing on Fortigate Firewall | Lecture#5
14:51
БАТЯ И ТЁЩА😂#shorts
00:58
Просмотров 4,4 млн
Configuring a Firewall's Ruleset
9:23
Просмотров 85 тыс.
Introduction to Link Aggregation on Fortigate.
11:58
Просмотров 15 тыс.
GEO BLOCKING THE RIGHT WAY!!!
7:52
Просмотров 11 тыс.
10 МИНУСОВ IPHONE 15
18:03
Просмотров 41 тыс.
#engineering #diy #amazing #electronic #fyp
0:59
Просмотров 2,3 млн