71. Lecture-71:Site-to-Site IPSec Route-Based VPN Template Lab. So now let’s start the lab. We will create a topology like this one side to side VPN. First we will do site to site VPN and this is route based VPN we discussed there are two type of VPN routebased VPN side to side and the other […]
68. Lecture-68:Introduction to Internet Protocol Security IPSec. Is IPsec protocol. What is IPsec? Internet protocol security. Basically, IPsec is an open standard. It’s like a suit, you know, like a kit, football kit, hockey kit, either like your exercise kit, where everything is available. Like a first aid kit, first aid kit. What there is, […]
66. Lecture-66:Cryptography Symmetric & Asymmetric Encryption. Today topic is VPN. But before starting VPN, we need to know some basic terminologies. So let me go through quickly, okay? And that is cryptography. What is cryptography? Basically is a Greek word which you know, it’s made from two words, kryptos and griffin. It’s a Greek word. […]
65. Lecture-65:Configure & Verify Virtual Domains (VDOMs). Another topic is virtual domains. Either. We call them Vdomes. What is VDOM? Virtual domain means virtually you creating domain. And domain is nothing but an area. Like if you divide one room and partition, we call them domain, that you have a separate domain, I have a […]
64. Lecture-64:FortiGate Passive Authentication (AD). Method is pace of authentication with active directory which we call them 14 eight single sign on FSSO and this is seamless authentication. No need of anything, you can integrate them to active directory, end depth anything and it is best solution. But all the PC has to join the […]
63. Lecture-63:FortiGate Active Authentication(AD). Done basic setup. We create active directory, we enable domain, we configure DNS. We have done basic setup. We enable DHCP and everything is ready now, first thing first, we will do active authentication. In active authentication it will ask the user. It will prompt to put username and password whenever […]
62. Lecture-62:FortiGate Authentication With AD & Lab Setup. Student hopkins 40 gate authentication with active directory. How we can integrate for tgate for wall with active directory? Active Directory we know LDAP, active Directory, all of these in every organization you will find this integration. This is a common method not only in FortiGate but […]
61. Lecture-61:High Availability HA Active-Active Lab. Another mode we discuss about a 40 gate firewall is active active an active active both the far wall will work. I did not say that both will work for each and every no again one farwell will be as a primary and master, the other will be save […]
86. Unicast Reverse Path Forwarding Let’s now talk about an interesting topic called unicast reverse path forwarding. And let’s understand how this can be used to prevent spoofing of IP addresses. Let’s first start by understanding what is IP spoofing? IP spoofing is a method of attempting to gain access by inserting a false source […]
83. Firewall Filters Let’s now talk about firewalled filters, firewalled filters provide rules that define whether to accept or discard packets that are transiting an interface. At first it sounds like we’re talking about a security policy. Security policies can be configured to control traffic that is passing through the device. It sounds like firewalls, […]