InterVlan routing on Fortigate Firewall | Lecture#5

  Рет қаралды 51,994

Doctor Networks

Doctor Networks

Күн бұрын

In this video, we will be looking at inter Vlan routing & communication between two hosts residing in different vlans.

Пікірлер: 59
@miguellorenzosantos8544
@miguellorenzosantos8544 2 жыл бұрын
Waiting for the next vid on the series on fortigate! Great vid! The past 2 vids got me everything I need!
@gwlane5509
@gwlane5509 Жыл бұрын
Excellent videos! New to fortigate here.
@balla2172
@balla2172 2 жыл бұрын
Watched this super tired didn't understand a thing... rested up watched again perfect sense you are a godsend! People who say Cisco cli is easier are nuts... Keep this going with these I'd request multi vlan network and dns most secure way
@doctor.networks
@doctor.networks 2 жыл бұрын
Haha right, sleep is extremely important, need to have it to understand concepts 100% of the time.
@AbdurRahman-kc5fq
@AbdurRahman-kc5fq Жыл бұрын
Thank you for explaining it in a simple and effective way !! Also, please explain me the difference between H/W switch, S/W switch and VLAN switch in the Fortigate! Thank you!!
@roghertrivero8721
@roghertrivero8721 2 жыл бұрын
great man! I need more of this!
@doctor.networks
@doctor.networks 2 жыл бұрын
More coming soon Man 🙂
@shaibannatha795
@shaibannatha795 Жыл бұрын
Thanks for your videos. Very helpful.
@netconfig999
@netconfig999 5 ай бұрын
thanks for sharing this VDO, this is really helpful Thanks❤❤
@doctor.networks
@doctor.networks 5 ай бұрын
You are welcome @netconfig999. Nice channel name by the way 😀
@Neur0bit
@Neur0bit Жыл бұрын
Great video. There’s an easier way. Just add all your VLANS/Subnets into a Zone (for example, an inside or trust zone), and disable “Block intra-zone traffic”, and they will all be able to communicate with each other without having to add any policies. Cheers
@doctor.networks
@doctor.networks Жыл бұрын
Thanks for the trick! haven't done that but will give that a try as well.
@10mashood
@10mashood 7 ай бұрын
Idea is good ..but all vlans in one zone is not recommended and is a security concern in real environment...
@legendz78
@legendz78 Ай бұрын
Very cool I didnt know you could clone policies in reverse.
@movisajid
@movisajid 2 жыл бұрын
Nice work, waiting for new videos..
@mcorleone77
@mcorleone77 6 ай бұрын
thanks for posting it. Is eve-ng running on your PC or on an EXSi ?
@doctor.networks
@doctor.networks 6 ай бұрын
Specifically for this video it's a physical ForiGate box. Normally for my videos I use Eve-ng on a Esxi server to offload resources
@zbng007
@zbng007 2 жыл бұрын
thanks pal great tutorial
@oldengish65
@oldengish65 2 жыл бұрын
Great series so far. When will the next upload be?
@doctor.networks
@doctor.networks 2 жыл бұрын
Thank You for the appreciation! Coming Soon.
@kokoaung8536
@kokoaung8536 2 жыл бұрын
Excellent work
@longtrinh3085
@longtrinh3085 Жыл бұрын
Great! Thanks a lot, keep it up bro!
@doctor.networks
@doctor.networks Жыл бұрын
Thanks, will do!
@piotrekheim5218
@piotrekheim5218 Жыл бұрын
Thank You for this video.
@doctor.networks
@doctor.networks Жыл бұрын
you're welcome brother 😀
@azeem20090
@azeem20090 Жыл бұрын
Thanks a lot,do I have to allow the vlan in the trunk linke or the native vlan is enough. I noticed in my Network the data vlan and voice are not mention in the trunk but sill pc can get an ip from the data vlan ,,How come don't I need to say switch port trunk allow vlan,x,y,z .
@doctor.networks
@doctor.networks Жыл бұрын
That is because a cisco switch by default allows all vlans. You limit the vlans on a trunk by the command "Switchport trunk allow vlan x, y, z".
@marksep5294
@marksep5294 Жыл бұрын
Can I ping a printer in another VLAN, without disabling the firewall in the source laptop? assuming there is interVLAN policy between the 2 VLANs
@doctor.networks
@doctor.networks Жыл бұрын
You should be able to ping it
@ensardemirkol4361
@ensardemirkol4361 Жыл бұрын
good explanation, thanks
@doctor.networks
@doctor.networks Жыл бұрын
Glad it was helpful!
@sinade1
@sinade1 Жыл бұрын
For a stateful firewall, I believe a single policy should be enough to facilitate to and fro traffic. Is it possible to do that in the FortiGate firewall as in Cisco ASA firewall?
@doctor.networks
@doctor.networks Жыл бұрын
Bro at 11:14 you see that we pinged the server right, that happened because of stateful inspection.
@a.visser1038
@a.visser1038 Жыл бұрын
Thanks! really love your video's. When will you post a video about the SD-WAN?
@doctor.networks
@doctor.networks Жыл бұрын
I really want to, but struggling a little with time, hopefully will get some time
@localfuture1484
@localfuture1484 Жыл бұрын
Thanks a lot. Could you tell me what kinds of tools you use to draw the diagram? Does it come with those cute icons?
@doctor.networks
@doctor.networks Жыл бұрын
hhhh it's actually an animation software called Videoscribe, these icons are not buildin, I make them in Adobe illustrator & call them in videoscribe. Afterwards take a screenshot & paste in PowerPoint. That is what you see in the video
@SandeepKumar-bv6wl
@SandeepKumar-bv6wl 2 ай бұрын
Single trunk link is enough to get All vlans from switch pls.tell.reason for three links to switch
@doctor.networks
@doctor.networks 2 ай бұрын
Hi Sandeep. It is a single physical Interface. There are 3 logical interfaces with vlan tags,same as you would do via a trunk.
@psychoticapex
@psychoticapex Жыл бұрын
Will there be a loss of processing speed? Is it better to use a dedicated L3 Switch in this scenario?
@doctor.networks
@doctor.networks Жыл бұрын
Well actually it depends, if you have a very small environment, then this approach is fine. If you're network is medium to large then YES, you need to separate via an L3 switch.
@psychoticapex
@psychoticapex Жыл бұрын
@@doctor.networks got it, thanks!
@ranghelsoto6516
@ranghelsoto6516 2 жыл бұрын
Hello, Dr. Do you have any video related to ADVPN on Fortigate? It would be a great help, because of the amount of customers using this service nowadays. Regards.
@doctor.networks
@doctor.networks 2 жыл бұрын
Let me note that down & I will surely make a video on it
@jimchen4269
@jimchen4269 2 жыл бұрын
Can the ip address of the SVI be completely different from the main interface ip? For example, the main would be 192.168.1.99/24, then can a I use 30.30.25.1/24 for one of my SVI?
@doctor.networks
@doctor.networks 2 жыл бұрын
Sorry Jim your comment was in the spam of KZbin, KZbin blocks comments containing IP addresses i guess. Yes you can, the main interface will be as a native vlan with no vlan tag of course & the other SVI can be any Ip you want
@jimchen4269
@jimchen4269 2 жыл бұрын
@@doctor.networks Thank you.
@thanakorn1805
@thanakorn1805 2 жыл бұрын
Thanks. You're awesome :)
@doctor.networks
@doctor.networks 2 жыл бұрын
Thanks for the super awesome comment man!
@shaibannatha795
@shaibannatha795 Жыл бұрын
Is there a Lecture #6 ? Or the videos end here?
@doctor.networks
@doctor.networks Жыл бұрын
Unfortunately My career took a huge turn here, couldn't continue. But now I'm thinking of resuming the series soon
@撥號衝浪
@撥號衝浪 6 ай бұрын
Thx❤❤
@swgvoyage3878
@swgvoyage3878 4 ай бұрын
Why need this much of policies for intervlan, i think just create a zone and add the vlan's to that zone, that's bettee to simplifying 😊
@doctor.networks
@doctor.networks 4 ай бұрын
Yeah but but you may need different policies for a set of vlans, you can actually create multiple zones referencing multiple vlans. The video is to give a concept that's why kept it simple. Obviously zones will be a better approach in the long term.
@aghrissamohamed2735
@aghrissamohamed2735 Жыл бұрын
I have all that setup with a Netgear smart managed switch. I can ping all vlans from a machine in VLan1 but I can't ping the machine on vlan 1 from the other vlans?
@doctor.networks
@doctor.networks Жыл бұрын
Im not sure about netgear actually. Possibly a policy is blocking the traffic from other vlans to your target vlan 1
@askmethod
@askmethod 2 ай бұрын
nice work bro. keep it up
@allrated
@allrated 2 жыл бұрын
Well explained. Thanks for this vid man.
@doctor.networks
@doctor.networks 2 жыл бұрын
Glad that helped you brother.
Deploying Fortigate Firewall | Lecture#4
34:51
Doctor Networks
Рет қаралды 11 М.
The Joker wanted to stand at the front, but unexpectedly was beaten up by Officer Rabbit
00:12
АЗАРТНИК 4 |СЕЗОН 2 Серия
31:45
Inter Production
Рет қаралды 1,1 МЛН
How Strong is Tin Foil? 💪
00:26
Preston
Рет қаралды 113 МЛН
POV: Your kids ask to play the claw machine
00:20
Hungry FAM
Рет қаралды 21 МЛН
DO NOT design your network like this!! // FREE CCNA // EP 6
19:36
NetworkChuck
Рет қаралды 3,2 МЛН
How to create Virtual Domains (VDOMs) on Fortigate Firewall
32:38
Silesio Carvalho
Рет қаралды 4 М.
How to configure FortiGate for VLANs and Inter-VLAN Routing.
16:20
Rakshit Vidyarthi
Рет қаралды 15 М.
Cisco Route Map's for NAT (Network Address Translation)
19:58
Doctor Networks
Рет қаралды 2 М.
Fortinet SD-WAN Architecture & Demo
58:56
Tech Field Day
Рет қаралды 70 М.
The Joker wanted to stand at the front, but unexpectedly was beaten up by Officer Rabbit
00:12