No video

Simple Fortigate Firewall Policy to protect your Network.

  Рет қаралды 19,594

TonysFortinetChannel

TonysFortinetChannel

Күн бұрын

This video shows a simple firewall policy rule you can apply to your fortigate firewall to protect your network from a significant amount of malicious traffic.

Пікірлер: 21
@networkn
@networkn 2 ай бұрын
Dude, this is awesome. I'd love you to share more of your knowledge.
@user-pk9mg2lr4e
@user-pk9mg2lr4e 7 ай бұрын
Thanks dude. I wish you were making more of these videos.
@AMROELMAKKI
@AMROELMAKKI 2 күн бұрын
good job Bro, so no need to apply security profile on each single policy if apply this policy at the top
@987CAYMAN07
@987CAYMAN07 Жыл бұрын
thanks, using this to train our users. Great narration!
@Anodynus7
@Anodynus7 8 ай бұрын
just applied to prod. thanks and looking forward to more!
@adolfofioranelli
@adolfofioranelli 7 ай бұрын
Thanks! Nice Policy
@user-vh8bp2gd3p
@user-vh8bp2gd3p Жыл бұрын
This helps a lot! thanks
@NoneRain_
@NoneRain_ 2 ай бұрын
thanks mate
@tomisac1809
@tomisac1809 10 ай бұрын
That is great
@vijay85cisco
@vijay85cisco Жыл бұрын
thks.. but this video shows outbound connection from DC to the internet... what about securing malicious in traffic from internet to DC all VLANs
@cmonwork
@cmonwork Жыл бұрын
Firewall has implicit deny for any traffic that comes from outside. Unless you have changed this by simply adding WAN as your source int and your internal interface as dest int. If you are referring to: what happens if a user tries to download a virus, When you create a security policy to allow outbound traffic from the internal network to the WAN, and if you have applied the antivirus security profile to that policy, it will protect against downloading malware or virus-infected files from the Internet to your internal network.
@tonysfortinetchannel
@tonysfortinetchannel 9 ай бұрын
The basic rule of a firewall is to block traffic. So any attempts to connect to this firewall from outside to inbound is automatically blocked, unless a policy is created to allow it.
@janoliver8713
@janoliver8713 6 ай бұрын
I know that there is an implicit deny rule at the bottom, but I am always doing a similar rule with known bad categories (and also with added third party feeds of known bad IP) an place it as the first firewall policy. It adds a little more security and it prevents known bad IP’s to hit your allowed inbound rules, e.g. a webserver.
@TheHabibalby
@TheHabibalby Ай бұрын
Excellent tip, thanks for sharing it. Just one question with regards to the source address, any reason why you have selected all your vLAN/Addresses instead of All -> SpamDestination = Deny?
@tonysfortinetchannel
@tonysfortinetchannel Ай бұрын
Two reasons. 1> When your firewall inspects traffic, it uses the firewall's processing resources. Those processing resources need to be managed with intentionality to your configuration. So It makes no sense to inspect literally every interface if there are interfaces where this inspection rule will never matter and have no benefit. Which ones are those? Well for one, the WAN interfaces do not need to be subjected to inspection of inbound traffic to malicious destinations that will never exist inside your network (or through it). That's an example of a hypothetical scenario where this would rule would not help by choosing "any". 2> Most firewall configurations do NOT have the multiple interfaces feature visible where you get to choose multiple source interface as well as the "any" source interface. so if I selected "any", ppl be like "it's not an option in my fw".
@TheHabibalby
@TheHabibalby 28 күн бұрын
@@tonysfortinetchannel Thanks for your reply, exactly, the interfaces that you have selected don't show in my list other than the interface itself.
@zahraaelsayed7154
@zahraaelsayed7154 Жыл бұрын
i'm don't have licence for this fortigate
@tonysfortinetchannel
@tonysfortinetchannel 9 ай бұрын
This is a next-gen Firewall which requires a subscriptions in order to keep up to date with worldwide threat intelligence. Threats are being created all the time, everyday. A subscription on your firewall allows it to receive this intelligence as soon as it's available. It's not enough to do classic firewall anymore. Threat intelligence is KEY to your firewall's ability to protect it's network from attacks. New Botnet domains are being created literally every moment of every day.
@pg41226
@pg41226 2 ай бұрын
And get my system infected nu the Chinese? 😅
@user-dr6gr6uk3x
@user-dr6gr6uk3x 5 ай бұрын
Tony you're great but you talk too damn fast. 🙂
@tonysfortinetchannel
@tonysfortinetchannel Ай бұрын
I do! Probably a combination of being in the Northeast where people just talk faster up here than many other parts of the world, and my 3rd cup of coffee contributed, and my desire to keep the video short. On a positive note, youtube lets you change speed of videos. I often find myself speeding up videos.
InterVlan routing on Fortigate Firewall | Lecture#5
14:51
Doctor Networks
Рет қаралды 50 М.
How to configure SD-WAN in FortiGate Firewall
15:48
IgoroTech Official
Рет қаралды 22 М.
SPONGEBOB POWER-UPS IN BRAWL STARS!!!
08:35
Brawl Stars
Рет қаралды 17 МЛН
Underwater Challenge 😱
00:37
Topper Guild
Рет қаралды 22 МЛН
What will he say ? 😱 #smarthome #cleaning #homecleaning #gadgets
01:00
FortiGate Firewall: Intrusion Prevention System (IPS) Tutorial
14:08
Fortigate - Firewall policy Inspection Modes - Flow mode Proxy Mode
16:19
FortiGate Firewall Hardening: Secure Your Network Like a Pro!
5:46
SecureGate: FortiGate & Security Insights
Рет қаралды 630
How to Configure Web Filtering on the Fortigate Firewall
4:55
CBT Nuggets
Рет қаралды 20 М.
GEO BLOCKING THE RIGHT WAY!!!
7:52
Forti Tip
Рет қаралды 11 М.
SPONGEBOB POWER-UPS IN BRAWL STARS!!!
08:35
Brawl Stars
Рет қаралды 17 МЛН