Steps to Hardening FortiGate SSL VPN

Поделиться
HTML-код
  • Опубликовано: 15 окт 2024
  • This video go over the steps to Hardening FortiGate SSL VPN
    1. Changing default ports or popular ports
    2. Using MFA for Local user account
    3. Limiting access to specific geography
    4. Limit concurrent connection
    5. Create NoAccess Portal
    6. Block access to/from Tor Exit Node and Relays

Комментарии • 7

  • @techy-world3716
    @techy-world3716  Месяц назад

    Please like, Share this videos to encourage more training videos. Thanks

  • @mayankbisht3385
    @mayankbisht3385 7 месяцев назад +2

    i didn't know that we can add email address under the user from the CLI. That's new to me. Thanks

  • @myself-tp2my
    @myself-tp2my 2 месяца назад +1

    best practice is to change the FGT management port also, not just the SSLVPN. Also hotels, motels and other such sites will probably block SSLVPN on a port other than 443.

    • @techy-world3716
      @techy-world3716  2 месяца назад

      You are absolutely correct about hotels and motels blocking port 443. I recommend people use their own personal Hotspot if possible. Public WiFi is not the best.

    • @myself-tp2my
      @myself-tp2my 2 месяца назад

      @@techy-world3716 I have seen here that cell hotspots also block non typical ports so 443 is also the best there

    • @capricornnnn
      @capricornnnn Месяц назад

      @@techy-world3716 Agree that public wifi is not best if you have using split tunnel then user can use ssl vpn and then all their traffic will be encrypted. Personal hotspot doesnt work well for sales or other guys if you are in different region due to cost.

  • @mitchellsmith4601
    @mitchellsmith4601 5 месяцев назад +1

    I didn’t know you could set SMS for two-factor. Not great, but better than nothing.