hashem-s(25)•in #fortigate•3095 days agoHow to make VDOM IN FORTIGATEIn previous post we practice to make a firewall clustering with to different instance of Fortigates. In this post i want to describe how to make virtual firewal...2hashem-s(25)•in fortigate•3095 days agoHow to make VDOM IN FORTIGATEIn previous post we practice to make a firewall clustering with to different instance of Fortigates. In this post i want to describe how to make virtual firewal...2
hashem-s(25)•in #fortigate•3103 days agoFORTIGATE HA AND VIRTUAL CLUSTER CONFIGURATIONFORTIGATE HA AND VIRTUAL CLUSTER CONFIGURATION In this document we describe how to cluster two Fortigate devices and then make virtualization in this cluster wi...3hashem-s(25)•in fortigate•3103 days agoFORTIGATE HA AND VIRTUAL CLUSTER CONFIGURATIONFORTIGATE HA AND VIRTUAL CLUSTER CONFIGURATION In this document we describe how to cluster two Fortigate devices and then make virtualization in this cluster wi...3
hashem-s(25)•in #network•3108 days agoSTATIC NAT WITH ROUTE-MAPYou are familiar with NAT technology. NAT help you to change IP address field in layer 3 header. In almost documents you have read that static NAT makes one to ...4hashem-s(25)•in network•3108 days agoSTATIC NAT WITH ROUTE-MAPYou are familiar with NAT technology. NAT help you to change IP address field in layer 3 header. In almost documents you have read that static NAT makes one to ...4
hashem-s(25)•in #security•3120 days agoZone Based Firewalling (ZBF)Zone-Based Policy Firewall changes the firewall configuration from the older interface-based model to a more flexible, more easily understood zone-based model. ...0hashem-s(25)•in security•3120 days agoZone Based Firewalling (ZBF)Zone-Based Policy Firewall changes the firewall configuration from the older interface-based model to a more flexible, more easily understood zone-based model. ...0
hashem-s(25)•in #security•3120 days agoNetworking Security Concepts...1hashem-s(25)•in security•3120 days agoNetworking Security Concepts...1
hashem-s(25)•in #security•3120 days agoSocial Engineering Tactics AND DefensesSocial Engineering Tactics: Phishing: Phishing elicits secure information through an e-mail message that appears to come from a legitimate source such as a serv...0hashem-s(25)•in security•3120 days agoSocial Engineering Tactics AND DefensesSocial Engineering Tactics: Phishing: Phishing elicits secure information through an e-mail message that appears to come from a legitimate source such as a serv...0
hashem-s(25)•in #fortigate•3120 days agoHow you can monitor live sessions in Fortigates firewalls via CLIIn previous post I have explained how to monitor traffic logs. Now i want to guide you how to monitor live sessions in Fortigate firewalls. live sessions or in ...1hashem-s(25)•in fortigate•3120 days agoHow you can monitor live sessions in Fortigates firewalls via CLIIn previous post I have explained how to monitor traffic logs. Now i want to guide you how to monitor live sessions in Fortigate firewalls. live sessions or in ...1
hashem-s(25)•in #fortigate•3120 days agoHow you can monitor traffics logs in fortigate CLIif you want to monitor traffic logs in a Fortigate firewall via CLI you can use following commands: FG execute log display when you execute this command your fi...0hashem-s(25)•in fortigate•3120 days agoHow you can monitor traffics logs in fortigate CLIif you want to monitor traffic logs in a Fortigate firewall via CLI you can use following commands: FG execute log display when you execute this command your fi...0
hashem-s(25)•in #network•3120 days agoTake Suggestion about Network ArticlesDears. I have started to share my experiences about Networking and Security in this site. Please inform me and about your hobbies in these fields and ask me you...5hashem-s(25)•in network•3120 days agoTake Suggestion about Network ArticlesDears. I have started to share my experiences about Networking and Security in this site. Please inform me and about your hobbies in these fields and ask me you...5