I did upgrade to my fortigate and then I lost the ha and is not showing can anyone help
@techy-world37162 күн бұрын
@@azeem20090 Follow the steps in the video.
@chettabusayarat902310 күн бұрын
How many users can use by this method? Thank you very much.
@techy-world371610 күн бұрын
@chettabusayarat9023 I have not gotten to the limit yet, you may refer to Fortinet documentation on that but my guts sames depending on the SSL user limit of your firewall
@EricBrokeItАй бұрын
Please make a route based video, VTI.
@phearonphinАй бұрын
Thanks 🙏❤
@castle4757Ай бұрын
Why you gave the sdn route? if i deploy fortigate with external ip at ExterneL nic and mgmt nic, will i be able to get acces via both ip? i am able to get access with externl subnet public ip but not with mgmt subnet public ip?
@techy-world3716Ай бұрын
@castle4757 a VIP should help you get into your management IP from outside your network, but your should be able to access your management interface on the same subnet. You can also add a policy to enable you do that
@castle4757Ай бұрын
@techy-world3716 I have created ingress and egress rule for mgmt subnet at Gcp allowing everything. Are u saying I need to configure a vip on Fortigate to get access from management external ip?
@rajenderverma5180Ай бұрын
Thank you so much for this video :)
@rajkumarsankarapandian22892 ай бұрын
Thank you sir vey nice
@saifemran45282 ай бұрын
Hey! Did you have to create two vSwitches one for Wan and one For your Lan?
@CriminalKSA9992 ай бұрын
Really amazing video, what if i need to remove the 2FA by email after enabled ? What is the cli command?
@ZagoDjАй бұрын
the same command but with "disable" option
@_ezeee3 ай бұрын
Great video!! thanks!!
@jacobkuma9243 ай бұрын
love your video my vpn works however i got one problem i can seems to aacess an erp system via the vpn any clue why?
@techy-world37163 ай бұрын
@@jacobkuma924 Go to SSL VPN Portal and disable Split Tunneling if you want to use Full Tunnel. If you want to use Split Tunneling, ensure that you define the ERP subnet inside the routing address under the Split Tunnel options in your SSL VPN Portal
@jacobkuma9243 ай бұрын
It's done but still
@techy-world37163 ай бұрын
@@jacobkuma924 Question: Are you using full tunnel or Split Tunneling?
@jacobkuma9243 ай бұрын
@@techy-world3716 full tunnel
@techy-world37162 ай бұрын
Please make sure you have a firewall policy to route your traffic from SSLVPN to your ERP subnets
@Ilitan0043 ай бұрын
Thank you! Is there a way to use azure ad connect, as it is possible with ssl vpn?
@techy-world37163 ай бұрын
Absolutely you can you SAML SSO
@פרוייקטמעטפתАй бұрын
@@techy-world3716 Can you make a video on how to connect IPSEC to MFA 365 (saml sso)
@Ben.N3 ай бұрын
great video thanks :)
@henryldr3 ай бұрын
This help me a lot. Im doing a lab with fortiAnalyzer and fortigate in the fortiAnalyzer this work good, but in the fortigate doesnt seems to work. But thanks for the video. Keep going!
@AbdurrahmanAlkan3 ай бұрын
Great works! Thanks. I looked at good guide how to enable ipsec for end users and your video is clear and smooth.
@145bamboo4 ай бұрын
Thanks ❤. This worked
@techy-world37164 ай бұрын
Great!
@xlv600tr4 ай бұрын
Precious! Thanks!
@xlv600tr4 ай бұрын
THANK YOU!
@KernelKrunch6634 ай бұрын
Very good
@xlv600tr4 ай бұрын
Hi. Thank you for video. I am not able to make ito work yet but there are the concept. I keep trying on my 60F ando managed Zyxel switch...
@techy-world37164 ай бұрын
@@xlv600tr Tell me exactly where you need support. I can give you some pointers
@xlv600tr4 ай бұрын
@@techy-world3716 thank you so much! I made 2 VLAN on FortiGate 60F (VLAN 10 and VLAN 25) using a a Zyxel GS1900 managed switch in testing enviroment. If I configure clients with fixed IP it works, but they aren't able to get IP from DHCP server ( configured on eachFortigate vlan, 192.168.10.1/24 and 192.168.25.1/24). I don't understand if the problem is the switch that is stopping DHCP service or if there is other configuration to do on firewall.
@techy-world37164 ай бұрын
@xlv600tr If you scroll down on your VLAN 10 and VLAN 20 interfaces there, you will see the option to enable DHCP. The DHCP can be configured on your firewall, or you can configure it on your Zyxel GS1900 switch. If DHCP is configured on your switch, you will need to enable DHCP relay under the advance option below the DHCP on the fortigate 60F firewall.
@xlv600tr4 ай бұрын
@@techy-world3716 Thank you again. In switch menu I find only if switch receive ip from dhcp or if it has to fixed (for management). On fw it is active on both VLANS
@dmytroizotov4 ай бұрын
why do this path traversal attack blocking mechanism works while you do not have any active licenses?
@619Hiker4 ай бұрын
Can you add a new ISP to wAN2, while users are currently using WAN1 for internet access ? Will active users notice anything, if I create a SDWAN while they are using WAN1 ? WAN2 is new and nobody is using it yet.
@techy-world37164 ай бұрын
@@619Hiker You can add a new ISP to WAN 2 without losing WAN internet access. As long as the Administrative Distance on WAN 1 is not higher than WAN 2. It should continue to work
@psksuresh88004 ай бұрын
Thanks you for valuable support
@techy-world37164 ай бұрын
It's my pleasure
@hashimhashi56254 ай бұрын
my check sums are different if i run the command the it will re sync ? i need to confirm because it is my production environment
@techy-world37164 ай бұрын
Yes it show resync
@hashimhashi56254 ай бұрын
@@techy-world3716 hello sir, i have some technical questions about this ? could you able to help me ?
@techy-world37164 ай бұрын
Please like and share this videos to encourage more training videos. Thanks
@techy-world37164 ай бұрын
Please like and share this videos to encourage more training videos. Thanks
@techy-world37164 ай бұрын
Please like and share this videos to encourage more training videos. Thanks
@techy-world37164 ай бұрын
Please like, Share this videos to encourage more training videos. Thanks
@techy-world37164 ай бұрын
Please like, Share this videos to encourage more training videos. Thanks
@techy-world37164 ай бұрын
Please like, Share this videos to encourage more training videos. Thanks
@techy-world37164 ай бұрын
Please like, Share this videos to encourage more training videos. Thanks
@psksuresh88004 ай бұрын
Maximum number of entries has been reached. Object set operator error, -4 discard the setting. This error comming,plz support
@techy-world37164 ай бұрын
This error is due to a trial license you are using which only allow 4 interfaces. What you can do is to use 2 interface (1 for WAN and the other for LAN which will include VLAN sub interfaces)
@techy-world37164 ай бұрын
This video will show you how to remove interfaces kzbin.info/www/bejne/oHStfaqjm7Vjq68
@psksuresh88004 ай бұрын
Sir I am unable to sub interface
@techy-world37164 ай бұрын
Watch between 2mins - 5mins of this video that shows how to create VLAN which is the sub interfaces you are trying to create
@psksuresh88004 ай бұрын
Iam unable to create sub interface in fortigate firewall, below error is coming Maximum number of entries has been reached. Object set operator error, -4 discard the setting.
@techy-world37164 ай бұрын
@@psksuresh8800 Delete 2 of your physical interfaces. You are using a trial license. You will be allowed 4 interfaces on a trial version. So best is to delete 2 physical interfaces and use 1 for WAN and the other interfaces for your sub interfaces
@psksuresh88004 ай бұрын
Sir, how to delete interface port3
@psksuresh88004 ай бұрын
Kindly support sir,we suffer last two weeks for this issue
@bounseysinnavong39635 ай бұрын
Very good, Is there any configuration for beginners?
@techy-world37165 ай бұрын
I recommend you watch this video kzbin.info/www/bejne/l5SUfWx3pdx_os0
@mayarmalongmajokamaach58536 ай бұрын
very good video Sir.
@victorjames62426 ай бұрын
Thank you for sharing. what is the possibility of using both links at the same time. or combining both links to increase the bandwidth size
@techy-world37166 ай бұрын
@victorjames6242 You can balance the traffic across both link, you can select both outgoing interface as your interface preferences. The short answer is YES you can use both link simultaneously
@myself-tp2my6 ай бұрын
best practice is to change the FGT management port also, not just the SSLVPN. Also hotels, motels and other such sites will probably block SSLVPN on a port other than 443.
@techy-world37166 ай бұрын
You are absolutely correct about hotels and motels blocking port 443. I recommend people use their own personal Hotspot if possible. Public WiFi is not the best.
@myself-tp2my6 ай бұрын
@@techy-world3716 I have seen here that cell hotspots also block non typical ports so 443 is also the best there
@capricornnnn4 ай бұрын
@@techy-world3716 Agree that public wifi is not best if you have using split tunnel then user can use ssl vpn and then all their traffic will be encrypted. Personal hotspot doesnt work well for sales or other guys if you are in different region due to cost.
@narfnn21116 ай бұрын
tks a loot !!!!
@vicentegonzales3696 ай бұрын
HI what is the default gateway of the Winserver 2016 ? plase it is 192.168.177.3? or 192.168.177.1/24 and what happen if i put the server behind the Fortiwe which will be the default gateway?
@AlwaysbeingLu6 ай бұрын
thanks for this man.
@AlcidesFerreira20247 ай бұрын
No need to setup smtp server and port first in settings?
@techy-world37167 ай бұрын
Yes, there is no need to setup smtp server and port.
@AlcidesFerreira20247 ай бұрын
@@techy-world3716 Thanks
@AlcidesFerreira20247 ай бұрын
@@techy-world3716 But if I have my smtp server in cloud or local, how to specify?
@adrianmisischia19537 ай бұрын
tkns
@maurofadda2897 ай бұрын
the LAN 2 network is basically the management,right?Great video
@techy-world37167 ай бұрын
LAN 2 network has some management features, such as HTTPS or FMG. Once any of the Administrative Access is enabled on that interface that makes it a management interface.
@abdullahkuspnar53127 ай бұрын
First of all, thank you for a very useful video. But how can you access GUI interfaces from your own Windows Machine by saying 192.168.177.3 or 192.168.177.1? There must be a setting here. In addition, how is it that you can ping 192.168.177.54 ip address from your own machine again? I think there is a configuration here that we have not seen in the previous video before?
@techy-world37167 ай бұрын
Please watch the Part I of this Video kzbin.info/www/bejne/l3-reoSarL2Vl9Usi=0OUvlJpzNP0zxui3
@disconnected587 ай бұрын
Hello, help, the token code does not arrive in my Gmail inbox, my question is if something additional has to be done in Gmail so that it receives the Fortigate token messages
@techy-world37167 ай бұрын
Check your SPAM inbox, FortiToken can be sent into your GMAIL inbox without issue.
@zinenhleDhludhlu-bf7ez8 ай бұрын
Very informative , I've just solve my ticket with this knowledge , thank you
@livestronger19818 ай бұрын
Oh cool. What program did you use to draw the Topology?
@techy-world37168 ай бұрын
GNS3 is the application used to draw the topology
@livestronger19818 ай бұрын
I have a questions. Is there a difference between enabling NAT on the Policy? What does it do?
@techy-world37168 ай бұрын
When NAT is enabled on a policy you are stating that you need the private IP translated to the public and vice versa. This is mostly used when you intend for that policy to go to the internet. If the traffic is going to the LAN or VLANs only there is no need to enabled the NAT option on the policy.
@livestronger19818 ай бұрын
This is great. The only improvement I see is to setup the actual outgoing Destination in the Firewall policy rather then just selecting "ALL". This is a best practice so that the SDwan service is only dedicated to that one remote network. If you have two or 3 then maybe selecting ALL makes more sense. Right?
@techy-world37168 ай бұрын
I am not too sure I fully understand your point. Here is a pointer, if the traffic is destined for the internet selecting all as the destination is best since you don't want to create different policy for traffic going to teams, zoom, Facebook, outlook etc. But if you the destination is local, then selecting a single remote network is best practices.
@yvesneptune8 ай бұрын
Can I configure IP addresses on both the physical interface and VLAN interface as router on a stick. And reach the physical interface on a switch that has a port in Access mode???
@techy-world37168 ай бұрын
The answer is Yes. You can configure multiple physical and Virtual interfaces and even route between them. What you need is policy. To answer your question YES it is possible