FortiGate: Why Series? Secure Your Device (Trusted Host Configuration)

Поделиться
HTML-код
  • Опубликовано: 25 июл 2024
  • Ready to bolster your FortiGate Firewall security? Join me in this step-by-step tutorial where I demystify the intricacies of configuring Trusted Hosts. After years in the consultancy game, I'm here to spill the beans on the common pitfalls that may unknowingly expose your device's admin panel to the wide web.
    Learn the ropes as I guide you through the correct setup for Trusted Hosts, ensuring your FortiGate Firewall is locked down and impervious to potential security breaches. We'll unravel the mysteries together!
    🚨 But wait, there's more! Stay tuned for the next video, where I'll unveil an alternative method through the "Local-In" Policy configuration. Double down on your firewall knowledge and fortify your network defences.
    * Just to also add this is a potential solution to a recent exploit - www.fortiguard.com/psirt/FG-I...
    // Timestamps //
    00:00 - Video Introduction
    00:30 - What are Trusted Hosts? (Default Configuration)
    00:55 - Using Two Jumpboxes (Default Behaviour)
    01:20 - Trusted Host Configuration
    02:10 - What is the behaviour now?
    02:49 - The BIGGEST mistake I see! and why!
    04:20 - Correct Configuration Example
    04:50 - What is the behaviour now? (Post Configuration)
    06:00 - Video Summary
    // Chris SOCIAL //
    / chris-eddisford-5b676462
    // Keywords //
    Patch FG-IR-23-139
    Fortinet
    Fortinet Training
    Fortinet Remote Access
    Fortinet Home Worker
    Secure FortiGate
    Hardening FortiGate
    Fortgate admin access
    FortiGate
    FortiGate How To?
    Fortinet NSE4
    Fortinet FCP
    // HashTags //
    #cybersecurity
    #networking
    #fortinet

Комментарии • 2