80. Lecture-80: FortiGate Firewall CLI Basic Commands. Before doing to do troubleshowing in 48 for a while, we need to know command, you know, commander’s instruction, what they would have you do graphically, the same thing can be done by commands as well and commands in English. This is my command. You have to obey them. Sukma does nothing but an instruction to give to console. They do this job and the console. Normally we call them Seelie command line interface and these […]
79. Lecture-79: Remote Access IPsec VPN Theory and Lab. We can use the same technology to configure SSL, VPN, but not this time a Web portal. But this time I want to encrypt my entire PC until unless I can figure out how to to only, you know, to what is called. I forgot the name split family until at least you can figure split tunnel. They will encrypt entire PC traffic and SSL VPN. We are only limited to the web only. […]
78. Lecture-78: Remote Access SSL VPN Web Portal Theory & Lab. So, last time we discussed about remote access will be in remote access, which means some if some user from home or other premises, and they want to access your enterprise network remotely, as we call them, remote access will be. And they can use their mobile phone, they can use the ABC, they can use their laptop. And there are two way to configure remote access to VPN when its client […]
76. Lecture-76: Configure Syslog in FortiGate Firewall. Smart because she said she slugged me system logging every device nowadays in the network is really important to generate logs and send them to any centralized location so that we can monitor them for target purposes, for monitoring purposes, for many other purposes, for forensic use, for security order, and for many of the reasons we are using SIS logs. Again, we discussed this log in five courses, so I’m going through quickly. These logs […]
75. Lecture-75: Configure SNMP V1/V2 and SNMP V3 in FortiGate. Another topic is how we can configure S&P because we discuss S&P and five courses, I remember most of you guys take my five courses. So, let me go through quickly those who are new simple network management protocol, S&P, we are using this for monitoring and management purposes. It’s an obvious application based protocol. It work on, let’s say, one. Reconfiguration and be under water switch for a while and many other […]
74. Lecture-74: Backup & Restore, Revision & Firmware Upgrade. Another topic we have backup and restore our we can do backup in destroying for Great Firewall backup is really important. You know, to keep your configuration, you can give this configuration inside your firewall and outside either. And you must be on hard drive and any other network area. And you can take backup through local bcuz B you can take through FPP. You can take them to the BP. If BB&T is […]
73. Lecture-73: Site-to-Site IPsec Policy-Based VPN Lab. We discuss about two and sorry to third one is policy based and other is based VPN. Right now we done road based VPN with a broad based VPN and two method manually and play the bass. But there is a side to side with byan policy based VPN. What is policy based VPN policy based VPN, which sometimes we call them Actonel. More visible Darnel more Repin. And we need only one policy to create […]
72. Lecture-72: Site-to-Site IPsec Route-Based VPN Custom Lab. Last time we danced side to side, we’d in, but using a template just next, next, next, and that thing was done so easy to create a side to side with, in and by the good to know. First of all, we will do men really in this way. We will see the things, what they whatever we study in first class or related to VPN. So, now we will see step by step each […]