Monthly Archives: April 2023
64. Lecture-64:FortiGate Passive Authentication (AD). Method is pace of authentication with active directory which we call them 14 eight single sign on FSSO and this is seamless authentication. No need of anything, you can integrate them to active directory, end depth anything and it is best solution. But all the PC has to join the […]
63. Lecture-63:FortiGate Active Authentication(AD). Done basic setup. We create active directory, we enable domain, we configure DNS. We have done basic setup. We enable DHCP and everything is ready now, first thing first, we will do active authentication. In active authentication it will ask the user. It will prompt to put username and password whenever […]
62. Lecture-62:FortiGate Authentication With AD & Lab Setup. Student hopkins 40 gate authentication with active directory. How we can integrate for tgate for wall with active directory? Active Directory we know LDAP, active Directory, all of these in every organization you will find this integration. This is a common method not only in FortiGate but […]
61. Lecture-61:High Availability HA Active-Active Lab. Another mode we discuss about a 40 gate firewall is active active an active active both the far wall will work. I did not say that both will work for each and every no again one farwell will be as a primary and master, the other will be save […]
86. Unicast Reverse Path Forwarding Let’s now talk about an interesting topic called unicast reverse path forwarding. And let’s understand how this can be used to prevent spoofing of IP addresses. Let’s first start by understanding what is IP spoofing? IP spoofing is a method of attempting to gain access by inserting a false source […]
83. Firewall Filters Let’s now talk about firewalled filters, firewalled filters provide rules that define whether to accept or discard packets that are transiting an interface. At first it sounds like we’re talking about a security policy. Security policies can be configured to control traffic that is passing through the device. It sounds like firewalls, […]
80. Route Filters Let’s talk about roof filters. What are root filters? Well, rock filters are list of prefixes configured to be used within a single routing policy or policy term. Unlike a prefix list, which is configured once and used multiple times within a configuration, a root filter is configured within a single routing […]
77. Routing Policy Example Now that we’ve understood what a routing policy is and what the structure of a routing policy looks like, let’s look at an example. So we know that a routing policy has a policy statement. It then has terms defined within it. Terms are like if then statements, if everything matches, […]
74. Routing Policy Overview Let’s now focus our attention on routing policies. Let’s understand what a routing policy is. And what are the use cases for configuring a routing policy? By default, all routing protocols running on a Junos device will install their routes into the routing table. Routing protocols also advertise a limited set […]
70. Static Routing – Part 2 Let’s continue our discussion on static routing. So here we have the three routers, router one, two and three. And here we have the IP addresses of the interfaces of these routers. Router two has a connected network. And similarly, router three also has a connected network, which is […]