InterVlan routing on Fortigate Firewall | Lecture#5

Поделиться
HTML-код
  • Опубликовано: 12 дек 2021
  • In this video, we will be looking at inter Vlan routing & communication between two hosts residing in different vlans.
  • НаукаНаука

Комментарии • 58

  • @miguellorenzosantos8544
    @miguellorenzosantos8544 2 года назад

    Waiting for the next vid on the series on fortigate! Great vid! The past 2 vids got me everything I need!

  • @askmethod
    @askmethod 22 дня назад

    nice work bro. keep it up

  • @gwlane5509
    @gwlane5509 11 месяцев назад +1

    Excellent videos! New to fortigate here.

  • @AbdurRahman-kc5fq
    @AbdurRahman-kc5fq Год назад +1

    Thank you for explaining it in a simple and effective way !! Also, please explain me the difference between H/W switch, S/W switch and VLAN switch in the Fortigate!
    Thank you!!

  • @shaibannatha795
    @shaibannatha795 Год назад

    Thanks for your videos. Very helpful.

  • @balla2172
    @balla2172 Год назад

    Watched this super tired didn't understand a thing... rested up watched again perfect sense you are a godsend! People who say Cisco cli is easier are nuts...
    Keep this going with these I'd request multi vlan network and dns most secure way

    • @doctor.networks
      @doctor.networks  Год назад

      Haha right, sleep is extremely important, need to have it to understand concepts 100% of the time.

  • @roghertrivero8721
    @roghertrivero8721 2 года назад +1

    great man! I need more of this!

  • @kokoaung8536
    @kokoaung8536 2 года назад

    Excellent work

  • @movisajid
    @movisajid 2 года назад

    Nice work, waiting for new videos..

  • @allrated
    @allrated 2 года назад

    Well explained. Thanks for this vid man.

  • @longtrinh3085
    @longtrinh3085 Год назад

    Great! Thanks a lot, keep it up bro!

  • @zbng007
    @zbng007 Год назад

    thanks pal great tutorial

  • @netconfig999
    @netconfig999 3 месяца назад

    thanks for sharing this VDO, this is really helpful Thanks❤❤

    • @doctor.networks
      @doctor.networks  3 месяца назад +1

      You are welcome @netconfig999. Nice channel name by the way 😀

  • @oldengish65
    @oldengish65 2 года назад +1

    Great series so far. When will the next upload be?

    • @doctor.networks
      @doctor.networks  2 года назад

      Thank You for the appreciation! Coming Soon.

  • @a.visser1038
    @a.visser1038 Год назад

    Thanks! really love your video's. When will you post a video about the SD-WAN?

    • @doctor.networks
      @doctor.networks  Год назад +1

      I really want to, but struggling a little with time, hopefully will get some time

  • @Neur0bit
    @Neur0bit Год назад

    Great video. There’s an easier way. Just add all your VLANS/Subnets into a Zone (for example, an inside or trust zone), and disable “Block intra-zone traffic”, and they will all be able to communicate with each other without having to add any policies. Cheers

    • @doctor.networks
      @doctor.networks  Год назад

      Thanks for the trick! haven't done that but will give that a try as well.

    • @10mashood
      @10mashood 5 месяцев назад

      Idea is good ..but all vlans in one zone is not recommended and is a security concern in real environment...

  • @thanakorn1805
    @thanakorn1805 2 года назад

    Thanks. You're awesome :)

  • @localfuture1484
    @localfuture1484 Год назад

    Thanks a lot. Could you tell me what kinds of tools you use to draw the diagram? Does it come with those cute icons?

    • @doctor.networks
      @doctor.networks  Год назад

      hhhh it's actually an animation software called Videoscribe, these icons are not buildin, I make them in Adobe illustrator & call them in videoscribe. Afterwards take a screenshot & paste in PowerPoint. That is what you see in the video

  • @mcorleone77
    @mcorleone77 4 месяца назад

    thanks for posting it. Is eve-ng running on your PC or on an EXSi ?

    • @doctor.networks
      @doctor.networks  4 месяца назад

      Specifically for this video it's a physical ForiGate box. Normally for my videos I use Eve-ng on a Esxi server to offload resources

  • @azeem20090
    @azeem20090 Год назад

    Thanks a lot,do I have to allow the vlan in the trunk linke or the native vlan is enough. I noticed in my Network the data vlan and voice are not mention in the trunk but sill pc can get an ip from the data vlan ,,How come don't I need to say switch port trunk allow vlan,x,y,z .

    • @doctor.networks
      @doctor.networks  Год назад

      That is because a cisco switch by default allows all vlans. You limit the vlans on a trunk by the command "Switchport trunk allow vlan x, y, z".

  • @piotrekheim5218
    @piotrekheim5218 Год назад

    Thank You for this video.

  • @sinade1
    @sinade1 Год назад

    For a stateful firewall, I believe a single policy should be enough to facilitate to and fro traffic. Is it possible to do that in the FortiGate firewall as in Cisco ASA firewall?

    • @doctor.networks
      @doctor.networks  Год назад

      Bro at 11:14 you see that we pinged the server right, that happened because of stateful inspection.

  • @ensardemirkol4361
    @ensardemirkol4361 Год назад

    good explanation, thanks

  • @aghrissamohamed2735
    @aghrissamohamed2735 Год назад

    I have all that setup with a Netgear smart managed switch. I can ping all vlans from a machine in VLan1 but I can't ping the machine on vlan 1 from the other vlans?

    • @doctor.networks
      @doctor.networks  Год назад

      Im not sure about netgear actually. Possibly a policy is blocking the traffic from other vlans to your target vlan 1

  • @SandeepKumar-bv6wl
    @SandeepKumar-bv6wl 2 дня назад

    Single trunk link is enough to get All vlans from switch pls.tell.reason for three links to switch

    • @doctor.networks
      @doctor.networks  2 дня назад

      Hi Sandeep. It is a single physical Interface. There are 3 logical interfaces with vlan tags,same as you would do via a trunk.

  • @marksep5294
    @marksep5294 9 месяцев назад

    Can I ping a printer in another VLAN, without disabling the firewall in the source laptop? assuming there is interVLAN policy between the 2 VLANs

  • @ranghelsoto6516
    @ranghelsoto6516 2 года назад

    Hello, Dr.
    Do you have any video related to ADVPN on Fortigate?
    It would be a great help, because of the amount of customers using this service nowadays.
    Regards.

    • @doctor.networks
      @doctor.networks  2 года назад

      Let me note that down & I will surely make a video on it

  • @psychoticapex
    @psychoticapex 10 месяцев назад

    Will there be a loss of processing speed? Is it better to use a dedicated L3 Switch in this scenario?

    • @doctor.networks
      @doctor.networks  10 месяцев назад

      Well actually it depends, if you have a very small environment, then this approach is fine. If you're network is medium to large then YES, you need to separate via an L3 switch.

    • @psychoticapex
      @psychoticapex 10 месяцев назад

      @@doctor.networks got it, thanks!

  • @user-zz8rn8es8q
    @user-zz8rn8es8q 4 месяца назад

    Thx❤❤

  • @jimchen4269
    @jimchen4269 2 года назад

    Can the ip address of the SVI be completely different from the main interface ip? For example, the main would be 192.168.1.99/24, then can a I use 30.30.25.1/24 for one of my SVI?

    • @doctor.networks
      @doctor.networks  2 года назад +1

      Sorry Jim your comment was in the spam of RUclips, RUclips blocks comments containing IP addresses i guess. Yes you can, the main interface will be as a native vlan with no vlan tag of course & the other SVI can be any Ip you want

    • @jimchen4269
      @jimchen4269 2 года назад

      @@doctor.networks Thank you.

  • @shaibannatha795
    @shaibannatha795 Год назад

    Is there a Lecture #6 ? Or the videos end here?

    • @doctor.networks
      @doctor.networks  Год назад

      Unfortunately My career took a huge turn here, couldn't continue. But now I'm thinking of resuming the series soon

  • @swgvoyage3878
    @swgvoyage3878 2 месяца назад

    Why need this much of policies for intervlan, i think just create a zone and add the vlan's to that zone, that's bettee to simplifying 😊

    • @doctor.networks
      @doctor.networks  2 месяца назад +1

      Yeah but but you may need different policies for a set of vlans, you can actually create multiple zones referencing multiple vlans. The video is to give a concept that's why kept it simple. Obviously zones will be a better approach in the long term.