Deep Inspection on FortiGate firewall with 5 Examples

Поделиться
HTML-код
  • Опубликовано: 19 авг 2024

Комментарии • 26

  • @fran_je3283
    @fran_je3283 Год назад +5

    The best explanation I had found about how to configure and use SSL inspection for FG, Thanks.

  • @vivekbannore2250
    @vivekbannore2250 2 года назад +4

    Short and direct to the point.

  • @faisal04021987
    @faisal04021987 Год назад +1

    Great Video with Clear Explanation.

  • @sinnedam
    @sinnedam 10 месяцев назад +2

    Thank you for the good explanation.

  • @psnfilms
    @psnfilms Год назад +3

    Incredible explanation, thanks mate!

  • @rexmundi273
    @rexmundi273 Год назад +4

    Great explanation, thanks.

  • @norbertovelazquez320
    @norbertovelazquez320 2 года назад +2

    Great explanation!

  • @rajanrkv
    @rajanrkv Год назад +1

    Awesome mate, thank you😊

  • @MihaiIonescu-fx3yv
    @MihaiIonescu-fx3yv Год назад

    Hi TTPF, great video(s), I see search support as bookmark , this means that you are already on the Dark Side!

  • @user-hb4nw4mb8v
    @user-hb4nw4mb8v Год назад

    감사합니다!

  • @Jisamaniac
    @Jisamaniac 8 месяцев назад

    Video is much appreciated.
    Question can this work for Transparent Proxy?

  • @raffickmca
    @raffickmca Год назад

    Thanks for your video, great work and I have 2 questions,
    1. I disabled the deep inspection and expect from DPI, eventhough I am intermediately getting SSL fatal error received error for proxy policy
    2. You uploaded the CA and Intermediate certificate to certificate authority and it show the validity of 2032 and the browser show 2022...

  • @JheromSarmiento
    @JheromSarmiento Год назад

    Great tutorial...Just one question, how can I implement deep inspection for inbound traffic going to a public-facing website? We can't just instruct the public to install the fortinet CA cert everytime they have certificate warnings when accessing our public websites.

    • @tothepointfortinet3823
      @tothepointfortinet3823  Год назад

      You'd have to implement SSL offloading (also called inbound deep inspection) on the fortigate. And youll need to have a 3rd party CA like GoDaddy, Verisign etc to sign the cert for you since each PC/device has trusted root CAs with certs from third party CAs preinstalled

  • @Salmankhan-wb4xi
    @Salmankhan-wb4xi 2 года назад +1

    Great work, can we buy ssl and use it for outbound deep inspection ? The user will not face any issue ?

    • @tothepointfortinet3823
      @tothepointfortinet3823  2 года назад +2

      Hi Salman, great question. You cannot purchase an SSL certificate that can be used for deep inspection, and that is because the certificate provider (ie. say GoDaddy, Verisign, Google) will not provide an intermediate certificate (ie. a certificate that can sign other certificates) because it would eliminate the purpose for a 3rd party trusted root CA -> it gets a bit technical, but it's essentially possible from a technical standpoint, but not realistic due to how public CA's work
      What you can do, is use the built in Fortinet certificate, or create an intermediate certificate using an internal CA (such as using Microsoft CA, XCA, FortiAuthenticator etc.). Using an internal CA is a good approach for scalability and certificate revocation.

    • @movisajid
      @movisajid Год назад

      @@tothepointfortinet3823 thanks for the answer, so if i wants to use deep packet inspection in workgroup environment and guest laptops/phones i have to import ssl cert manually on every device.. right

    • @tothepointfortinet3823
      @tothepointfortinet3823  Год назад

      @@movisajid Yes, the certificate needs to be on every device. As for whether you have to do it manually, or if there is an automatic alternative -> I haven't experienced this in a non-GPO environment. I'm sure there is a way to do it at scale, one thing that comes to mind is something like a NAC solution, but this would require some time/consideration.

    • @Salmankhan-wb4xi
      @Salmankhan-wb4xi Год назад

      @@tothepointfortinet3823 so is it intermediate certificate authority on FortiGate ?

    • @tothepointfortinet3823
      @tothepointfortinet3823  Год назад

      @@Salmankhan-wb4xi Sort of. The FortiGate comes with an intermediate certificate that can be used for Deep Inspection -> it's automatically created and you can't for example go on the FortiGate and create more intermediate certificates to use for DPI -> if you want an application that can generate certificates (including intermediate certificates) then you could use FortiAuthenticator, or XCA, or Microsoft CA

  • @0x4b55
    @0x4b55 2 года назад

    Blockig QUIC is still the answer? It is not a Google protocol but in the meantime standardized by the IETF. The Firewall Vendors should Start to learn how to do Deep Inspektion on QUIC…

    • @truantj
      @truantj Год назад

      Deep Inspection of HTTP3 over QUIC is supported in 7.2.0 and newer.

  • @Michael-er8dh
    @Michael-er8dh Год назад

    Hello, can we also do full ssl with firewall policy set to flow based instead of proxy based?