FortiGate 6.0: Understanding and Implementing Deep Packet Inspection

Поделиться
HTML-код
  • Опубликовано: 19 ноя 2024

Комментарии • 33

  • @sbasalan
    @sbasalan Год назад +2

    It's good to realize that there are some report the interface so that directly run the report on the firewall without going to the portal.. wow amazing 05:39

    • @imperionllc
      @imperionllc  Год назад

      If you really want detailed reporting, you should check out the fortianalyzer.

  • @f1gtrxelaks589
    @f1gtrxelaks589 5 лет назад +3

    It's very useful...Use GPO to deploy the certs and you cannot use a public CA certificate.

    • @imperionllc
      @imperionllc  3 года назад

      good catch. I'll have to re-record this on the 7.0 firmware.

  • @rfi-cryptolab4251
    @rfi-cryptolab4251 4 года назад

    I enabled shallow packet inspection on mine for faster throughput.

    • @imperionllc
      @imperionllc  3 года назад

      its always a balance between performance and security

  • @ogelmo91
    @ogelmo91 5 лет назад

    At 2:54 you talk about SSL exemptions from reputable sites. On the Fortigate it gives you the option to still add Web Categories and Addresses without the Reputable Websites option being selected. My question to you is, will I need to enabled this option in order for the specified Web Categories and Address I set to not be inspected or can this be left disabled yet the categories and addresses I specify will still be exempt?

  • @alzain55a
    @alzain55a 5 лет назад

    Thank you 🙏🏼

  • @johnreycasipong3637
    @johnreycasipong3637 4 года назад

    Hello, i have fortigate in my gns3 and i did all the steps you said however i dont have that cloud thingy how do i know that my SSL/SSH Inspection profile is working? Thank you. I'm a student and i need it for my thesis capstone 💕

  • @mikelshilling
    @mikelshilling Год назад +1

    Yeah, you don't need IPS on 'this policy' because the 'example' at the beginning shows INBOUND inspection and what you set up checks OUTBOUND, so not helpful....

    • @imperionllc
      @imperionllc  Год назад

      You should inspect inbound and outbound traffic. The configuration 5 years ago was pretty similar between the two traffic flows. Inbound just uses a vip.

  • @VivekGangwar02
    @VivekGangwar02 5 лет назад +1

    Cant even connect to my ssh server for some useful purpose.

    • @imperionllc
      @imperionllc  3 года назад

      SSH is tricky with the certificate chain. You can exempt management traffic from deep inspection by isolating that traffic to specific policies

  • @VivekGangwar02
    @VivekGangwar02 5 лет назад +2

    making others life a hell

  • @dubbsix
    @dubbsix 5 лет назад

    Not very useful for enterprises as I am not going to add the cert manually on every machine. Hopefully there is a tutorial on how to do this on an enterprise level.

    • @firstspar
      @firstspar 5 лет назад +3

      Why would you do anything manually in an enterprise environment? Push out settings from your DC using GPO.

    • @paulstaley4245
      @paulstaley4245 5 лет назад

      @@firstspar I was thinking the same thing. I cant believe that he didn't mention using GPO to deploy the cert in the video.

    • @markeithhost
      @markeithhost 5 лет назад +1

      Even more so for Education, as 99.9% of our devices are not domain connected, so no GPO....

    • @imperionllc
      @imperionllc  3 года назад

      Presumably, your enterprise has an endpoint management system in place to push large scale changes. How do you currently refresh your on prem certificates?

  • @wladimirmendoza6669
    @wladimirmendoza6669 2 года назад

    Pretty fly for a wifi 🤣🤣🤣🤣🤣🤣🤣🤣🤣🤣🤣🤣🤣

    • @imperionllc
      @imperionllc  2 года назад

      That's one of my favorites 😁

  • @reversedpineapple8899
    @reversedpineapple8899 5 лет назад +3

    You shouldn't be snooping into other people's business in the first place.

    • @imperionllc
      @imperionllc  5 лет назад +14

      If they are on my network, it's not their business 🤙

    • @reversedpineapple8899
      @reversedpineapple8899 5 лет назад +2

      @@imperionllc That network is nothing without users to give it any worth. Respect your users and stop snooping and being nosy! You should have enough work to do without wasting time reading other people's traffic.

    • @imperionllc
      @imperionllc  5 лет назад +2

      Just block stuff from the get go and there isn't much to read.

    • @Raidz-448
      @Raidz-448 4 года назад +4

      @@reversedpineapple8899 There are many legitimate reasons to do this decryption, UTM's do this to scan the traffic for malware or other known code that can cause harm to the users browser or OS.