Static Route
Static Route
  • 19
  • 30 774

Video

The BEST Way to Set Up an IPSec VPN With Loopback Interface
zhlédnutí 258Před 21 dnem
Learn how to set up a site-to-site IPSec VPN with a loopback interface in this tutorial. Follow along for step-by-step instructions on creating a secure connection between two sites using this advanced networking technique. ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬ Song: Inspiring by Wavecont Music provided by [protunes.net](czcams.com/users/redirect?event=video_description&redir_token=QUFFLUhqbTZJQktKdVltWEN4RF...
Configuring IP SLA in Fortinet is EASY! // Discover Link Monitor on Fortigate!
zhlédnutí 261Před 28 dny
Learn how to easily configure IP SLA in Fortinet firewalls with this step-by-step guide. Fortinet's implementation of IP SLA is known as Link Monitor and is a powerful tool for monitoring network performance, ensuring optimal operation, allowing your network to automatically failover to a secondary ISP link, dynamically remove from the route table a route via a failed link..! ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬...
Boost IPSec VPN Security with Signature Authentication!
zhlédnutí 225Před měsícem
How to set up an IPSec VPN with certificate authentication on Fortigate firewall in this step-by-step tutorial. We cover topics from generating Certificate Signing Request (CSR) to Public Key Infrastructure (PKI) user definition in successful certificate authentication.
How to setup BGP on Fortigate over Dial-up VPN Connections with Mode-config
zhlédnutí 351Před měsícem
In this step-by-step tutorial, Learn how to setup BGP on Fortigate over Dial-up VPN connections, we use Mode-config for dynamic ip address allocation as well as iBGP to advertise networks between sites!
Sub-interfaces and Inter-VLAN Routing on Fortigate Firewall / Router on a stick configuration Guide
zhlédnutí 483Před měsícem
In this comprehensive guide, we will walk you through the ultimate Router on a Stick setup on Fortigate firewall. Learn how to configure your firewall to enable communication between different VLANs on your network, securing data flow and enhancing network security.
Dial-Up VPN Setup WITHOUT Static IP! | FortiGate Configuration Guide
zhlédnutí 1,4KPřed 2 měsíci
In this video, we will walk you through the step-by-step process of setting up a Dial-Up VPN on FortiGate Firewall without the need for a static IP address on remote sites. If you're looking to establish a secure VPN connection behind a PPPoE or DHCP service, this configuration guide is perfect for you. Follow along to learn how to configure your FortiGate device for a Dial-Up VPN with ease. Do...
Fixing IPSec VPN NAT Issue Once and For All
zhlédnutí 599Před 2 měsíci
In this comprehensive guide, we'll walk you through the challenges and solutions for setting up an IPSec VPN when it's located behind a Network Address Translation (NAT) device. We start by explaining why IPSec VPNs face issues when behind NAT, including the intricacies of IP address translation and how it affects VPN tunnels.Discover the concept of NAT Traversal and how it helps IPSec VPNs to ...
3 Simple Steps to Configure IPSec VPN on Fortigate
zhlédnutí 612Před 2 měsíci
In this video tutorial, we will guide you through the process of configuring an IPSec VPN on a Fortigate firewall in just 3 easy steps. Whether you're a beginner or an experienced network administrator, you'll find this guide straightforward and helpful. Stay tuned and learn how to set up your VPN quickly and efficiently on Fortigate.
Understanding the Fortigate Route Database (2024)
zhlédnutí 220Před 2 měsíci
In this hands-on lab we take a closer look to understand the route database on the Fortigate Firewalls and the differences between the route table and route database. Fortigate firewalls maintain routes in 2 tables, the RIB & the FIB. Time line 0:00 - Intro 0:04 - Describing the Route Database 1:00 - Route table commands 1:23 - Understanding the route database
BGP Protocol: Prefix-lists and Route-maps
zhlédnutí 640Před 2 měsíci
This is a walkthrough on prefix-lists and route-maps on Fortigate firewalls, prefix-lists and route-maps are powerful features of BGP that enable administrators to implement fine-grained control over routing decisions, ensuring optimal traffic flow and network performance.
Fortigate BGP Soft-Reconfiguration Explained!
zhlédnutí 503Před 2 měsíci
In this video we look into BGP soft reconfiguration, how to use it and typical use scenario, it allows network operators to apply configuration changes to BGP routing policies without disrupting the flow of routing updates. Unlike a hard reset, which clears BGP sessions and requires renegotiation of routes, soft reconfiguration allows changes to be applied in a non-disruptive manner.
Deploying Fortigate Firewall in AWS Like a Pro
zhlédnutí 1,7KPřed 2 měsíci
In this video, we will walk you through the best practices for deploying Fortigate in AWS to ensure that you are setting up your Fortigate in AWS the right way. By following our step-by-step process, you can ensure that your Fortigate is properly integrated into your AWS environment, providing you with the best protection possible. #Fortigate #AWS #Cybersecurity #CloudComputing #BestPractices
BGP on Fortigate - In depth Guide plus important topical exam concepts!
zhlédnutí 3,6KPřed 3 měsíci
In this comprehensive video where we explore BGP on Fortigate in-depth! We cover all the important exam concepts related to BGP topic, from really Basic to Advanced configuration, troubleshooting, and traffic engineering topics. Whether you're studying for an exam or looking to expand your networking knowledge, this video is full of valuable information to help you master BGP on Fortigate.
What is a session table and how does it work on Fortigate Firewall..
zhlédnutí 574Před 3 měsíci
For every active connection to the Fortigate firewall and through the firewall, the Fortigate keeps a record of all active sessions, in this video we use the session table to explore firewall policies and fortigate local-in policies
Fortigate IP Routing Features - What You Need To Know!
zhlédnutí 3,1KPřed 3 měsíci
Fortigate IP Routing Features - What You Need To Know!
Troubleshooting site-to-site VPN // Diagnose Debug Flow
zhlédnutí 1,1KPřed 5 měsíci
Troubleshooting site-to-site VPN // Diagnose Debug Flow
Disable auto-save on Fortigate // Auto-Restore after a failed Firewall Change
zhlédnutí 233Před 6 měsíci
Disable auto-save on Fortigate // Auto-Restore after a failed Firewall Change
Mastering Site-to-Site IPSec Tunnel & SD-WAN Setup on Fortigate
zhlédnutí 15KPřed 2 lety
Mastering Site-to-Site IPSec Tunnel & SD-WAN Setup on Fortigate

Komentáře

  • @npham1198
    @npham1198 Před 5 dny

    Wouldn’t this prevent IPsec from being offloaded on anything less than a 400F?

    • @staticroute
      @staticroute Před 3 dny

      To my knowledge any Fortigate with hardware acceleration chipset can offload IPSec unless disabled. ADVPN just has an additional extension and should still offload to NPx…

    • @staticroute
      @staticroute Před 3 dny

      Maybe someone knows more about this and can show us with hardware 300x hardware…

  • @Rejo-ni3hz
    @Rejo-ni3hz Před 5 dny

    @staticroute can you do DLP policy and acme certificate policy

  • @rjnasr8078
    @rjnasr8078 Před 5 dny

    Hey .. Upgrading to Eve-NG .. nice to see.

    • @staticroute
      @staticroute Před 5 dny

      @@rjnasr8078 😬 hey bro, to be honest, I’m not yet loyal to either one of them, but I want to give EVE a chance for a while…

    • @rjnasr8078
      @rjnasr8078 Před 5 dny

      @@staticroute I had a lot of issues with GNS3 and it was very time consuming. So far eve-ng seems to be smoother.

    • @staticroute
      @staticroute Před 3 dny

      ​​⁠I noticed the same thing but both on EVE and GNS3, in my case configs that works one moment stop working for no reason, turns out it was related to device license status, if it turns to ‘invalid’, then all hell breaks loose…be on the lookout for that

  • @staticroute
    @staticroute Před 5 dny

    ADVPN is an enhancement to dialup VPNs that allows Spoke to Spoke VPNs to dynamically form on demand, therefore virtually achieving a full mesh VPN with just a single IPSec VPN configuration. The auto-discovery packets exchange between sender (Hub) and receiver (Spokes) make this possible through shortcut messages! the biggest advantage is simplified routing whether you choose to use BGP or OSPF, the config remains relatively simple! Enjoy!

  • @swissactiontv5128
    @swissactiontv5128 Před 6 dny

    I have similar situation, but i have the problem, that with 2 Peers, only one stay online, second is disconnected, if other shows activity the active peer changes, like only one Peer can stay online?

    • @staticroute
      @staticroute Před 5 dny

      Hey there, you're probably looking for something like ADVPN, I'm uploading a video on that very topic right now, should publish in a few hours. ADVPN improves on Dialup VPNs by enabling spokes to make on-demand connections to each other therefore literally achieving "full-mesh". In the video, I setup BGP with Hub as route reflector, in the case of OSPF, the config is a tiny bit different...please check it out, I'd be interested to know if it's what you're looking for.

    • @swissactiontv5128
      @swissactiontv5128 Před 5 dny

      @@staticroute Finally i could fix it, no ADVPN needed. Well on the HUB, Phase2 Selectors is Local and Remote 0.0.0.0 0.0.0.0 and i had to delete static routes toward the branches, cause Only if the Interface Name in the routes is with "_0" or "_1" etc. it knows to which tunnel the traffic needs to go, if there is a static route on the Hub toward the branches the interface in the route not has "_0" in it, so it can`t know which peer it should take On the Branches, the Phase2 Selector is local the local Subnets and Remote is also just 0.0.0.0 0.0.0.0, cause Fortinet can handle that.

  • @esmatullahjalali3474

    Thanks for the Video. It is very Helpfull. I would be appreciate if you can upload a video of how we can deploy Fortigate in HA mode and Load Balancer, because the deployment is a little bit tricky.

    • @staticroute
      @staticroute Před 5 dny

      I will certainly look into it shortly...thank you ..

  • @LorenzoLukas-s7z
    @LorenzoLukas-s7z Před 8 dny

    Could you clarify why weight is not scalable? Great vid btw!

    • @staticroute
      @staticroute Před 5 dny

      Hey Lorenzo, the big idea with this lab was eBGP, weight doesn't get exported out to eBGP peers, it doesn't even get exported to local peers within the AS because it's locally significant to the router. Unlike LocalPref, which can atleast propagate within the AS. I'm actually going to post a follow up video on BGP soon based on a lot of interest I'm seeing on this topic...I hope I've answered you..?

    • @LorenzoLukas-s7z
      @LorenzoLukas-s7z Před 5 dny

      @@staticroute You definitely have, thank you - looking forward to that next video!

  • @ryancheungkkable
    @ryancheungkkable Před 18 dny

    Will use it in our production environment soon

  • @funmemes5915
    @funmemes5915 Před 21 dnem

    This is the greatest tutorial for the BGP configuration in CZcams. Sound and Clear. Thanks for your time and effort.. Cheers!!!!

  • @sandunsulochana3671
    @sandunsulochana3671 Před 21 dnem

    Superb.

  • @thiagoferreira05
    @thiagoferreira05 Před 22 dny

    Sorry to bother you, but I can't understand in the beginning the way the loopback interface flows data, how was it possible?

    • @staticroute
      @staticroute Před 22 dny

      I think of the loopback interface the same as VLAN interface,they’re both logical interfaces

    • @staticroute
      @staticroute Před 20 dny

      Hey Thiago, were you satisfied with the answer?

  • @eoghancullen
    @eoghancullen Před 22 dny

    Thanks man. Appreciate all your work, find the background music distracting though.

    • @staticroute
      @staticroute Před 21 dnem

      Hey, just curious and looking to improve things always, do you mean the background music volume is too high or you’d prefer no background music altogether?

    • @eoghancullen
      @eoghancullen Před 21 dnem

      @@staticroute seems particularly high in this video but I'd prefer none at all.

    • @SelvaKumar-rl5wn
      @SelvaKumar-rl5wn Před 21 dnem

      Better pls proceed without background music

  • @staticroute
    @staticroute Před 22 dny

    IPSec VPN over loopback interface is an increasingly popular deployment because of its many benefits, including ability to control preferred primary and secondary paths leveraging the link monitor config for dynamic failover...this improves the reliability and stability of VPN tunnels significantly!!

  • @imranxkamal5522
    @imranxkamal5522 Před 23 dny

    Please lower the background music

    • @staticroute
      @staticroute Před 21 dnem

      Thank you very much, noted, yours is one of 2 comments about the background music, I appreciate it 👍🏼

    • @imranxkamal5522
      @imranxkamal5522 Před 21 dnem

      Apologies, I should have started how good your tutorials are, very easy to understand and quite professionally edited. I'd appreciate if you do a video on advance BGP scenarios with route tags, route target, and how to use communities to accept routes and based on community route to specific peer

  • @SelvaKumar-rl5wn
    @SelvaKumar-rl5wn Před 28 dny

    @ Thanks for the video. I have one doubt here . What's the different bw link Monitor and sdwan. I hope sdwan also do the link failure based on jitter and packet loss . I am not much aware,if you clear will be good for my understanding

    • @staticroute
      @staticroute Před 28 dny

      you're 100% right SDWAN does it's own link monitoring and I hope to cover that in later video

    • @SelvaKumar-rl5wn
      @SelvaKumar-rl5wn Před 28 dny

      @@staticroute Thank you

    • @Rejo-ni3hz
      @Rejo-ni3hz Před 28 dny

      please create one sir ​@@staticroute

  • @staticroute
    @staticroute Před 28 dny

    Fortinet's implementation of IP SLA is really awesome, I'm interested to know how popular this is in your deployments, please put a comment and let us know if you are keen to use it if you aren't already...

  • @pouyasaberi3359
    @pouyasaberi3359 Před měsícem

    Thanks. You have explained so simple

  • @phutapongsuanyim
    @phutapongsuanyim Před měsícem

    I very like how you teach , the content is hard but you can made it look easier and your accent is clear to understanding for asian people who not know so many vocabulary like me. Thank you❤

  • @phutapongsuanyim
    @phutapongsuanyim Před měsícem

    Is that id with strange no. from the local-in policy ?

    • @staticroute
      @staticroute Před měsícem

      Yes it is, it turns out that’s how it works and I suppose it does make sense

  • @rjnasr8078
    @rjnasr8078 Před měsícem

    Can you use this as a backup to a static IPSec VPN ?

  • @julespatrick2125
    @julespatrick2125 Před měsícem

    Thanks very much for the video. Very useful as I'm starting working on the Fortigate. What's the next video, please?

  • @jayanvv-oi8hp
    @jayanvv-oi8hp Před měsícem

    Please do a video about packet flow on fortigate

    • @staticroute
      @staticroute Před měsícem

      I’m probably doing that one next..

  • @MrSatadal
    @MrSatadal Před měsícem

    Awesome

  • @thiagoferreira05
    @thiagoferreira05 Před měsícem

    Hey man very nice to share with us, but I saw you created user and group for authentication proposal on Hub, but I can't see you use it for ftg2 and 3, how does it works and why don't you set it on remote ftg?

    • @thiagoferreira05
      @thiagoferreira05 Před měsícem

      @staticroute

    • @staticroute
      @staticroute Před měsícem

      remote firewalls present their "local-id", which we set to ftg02 and ftg03 on each site plus the psk. FTG01 will be expecting these specific Peer-IDs so they have to match. FTG01 is like domain controller with user accounts, etc, and local-id is like username, psk being the password. it works in the same way with certificates

    • @thiagoferreira05
      @thiagoferreira05 Před měsícem

      @@staticroute ok budy, now i got it, make all sense right now for me, thank you so much

  • @rjnasr8078
    @rjnasr8078 Před měsícem

    Nice job, you must have read my mind! .. I was about to ask you about this. I was wondering the dynamic IP addresses used as VTIs for BGP at the spoke will change every time you reload ?

    • @staticroute
      @staticroute Před měsícem

      Ah man I’m so happy this has been of value, let’s keep at it…

    • @rjnasr8078
      @rjnasr8078 Před měsícem

      ok so the VTI's stay the same always when you reload .. Is that correct? ..

    • @staticroute
      @staticroute Před měsícem

      That's a critical point you're raising and the simple way to address that I think would be with the following config update on the DC fortigate: config router bgp set as 100 set router-id 1.1.1.1 set recursive-next-hop enable config neighbor-group edit "remote-fw" set remote-as 100 next end config neighbor-range edit 1 set prefix 172.16.100.0 255.255.255.0 ----->define the range as the VTI address scope, you can make this smaller if you need to. set max-neighbor-num 2 ----------> also this should probably match the number of peers you expect should peer with your DC FW. set neighbor-group "remote-fw" next end

    • @staticroute
      @staticroute Před měsícem

      There's a similar config here: community.fortinet.com/t5/Support-Forum/BGP-Neighbor-Ranges/m-p/290127

    • @rjnasr8078
      @rjnasr8078 Před měsícem

      Thanks, could you please explain the neighbor-group and neighbor range configs? So if I defined the phase1 range as set ipv4-start-ip 10.215.1.1 set ipv4-end-ip 10.215.1.250 set ipv4-netmask 255.255.255.0 and then defined the prefix as set prefix 10.215.1.0 255.255.255.0 Does that mean the hub will setup a bgp neighbor for each ip it address it's allocated for the spokes ? Is there a way to control which ip address is allocated for which spoke and keep it that way. I'm trying to make sense of the below config, I can add the max-neighbor command . config router bgp set as 65410 set router-id 10.20.41.1 set ibgp-multipath enable config neighbor-group edit "SPOKE_ISP_1" set interface "TUN_INET_ISP1" set remote-as 65400 set update-source "TUN_INET_ISP1" set route-reflector-client enable next edit "SPOKE_ISP_2" set interface "TUN_INET_ISP2" set remote-as 65410 set update-source "TUN_INET_ISP2" set route-reflector-client enable next end config neighbor-range edit 1 set prefix 10.215.1.0 255.255.255.0 set neighbor-group "SPOKE_ISP_1" next edit 2 set prefix 10.215.1.0 255.255.255.0 set neighbor-group "SPOKE_ISP_2" next end

  • @jayanvv-oi8hp
    @jayanvv-oi8hp Před měsícem

    Could you please share packet flow in fortigate firewall

    • @staticroute
      @staticroute Před měsícem

      Yea I’m definitely doing a video on that soon…

  • @staticroute
    @staticroute Před měsícem

    This has been a definate learning experience for me making this video....again 😀 I want to thank @oinkersable for spotting an issue with the video...which is now rectified... The video covers: 1. Basic Dialup VPN 2. How to use Mode-config (DHCP for tunnel interfaces) 3. Basic Fortigate tests and verifications 4. BGP! Enjoy!

    • @MrSatadal
      @MrSatadal Před měsícem

      Thank you

    • @staticroute
      @staticroute Před měsícem

      @@MrSatadal for sure! I'm particularly interested to hear your thoughts about this config 😀

  • @dineshkomakula3001
    @dineshkomakula3001 Před měsícem

    Aws cloud networking

  • @staticroute
    @staticroute Před měsícem

    If you'd like to quizz yourself on this topic, check it out here: courses.staticroute.io

  • @staticroute
    @staticroute Před měsícem

    Inter-vlan routing lab, this config is useful when you need to aggregate switch ports, which is almost always recommended! Enjoy and as always, I'm happy to hear your thoughts!

  • @MrSatadal
    @MrSatadal Před měsícem

    In FGT 01 Where to define dialup client Tunnel IP range?

    • @staticroute
      @staticroute Před měsícem

      In our example, we don’t require the use of routing protocols, so the tunnel interface doesn’t need an ip address.

    • @MrSatadal
      @MrSatadal Před měsícem

      @@staticroute can you please make a video of dial UP ipsec with BGP? If already have the video please share link.

    • @staticroute
      @staticroute Před měsícem

      I’m publishing that video today, thank you for the suggestion..

    • @staticroute
      @staticroute Před měsícem

      Fortigate BGP over a Dialup VPN Site-to-Site Configuration czcams.com/video/-porUcCZhxE/video.html

    • @staticroute
      @staticroute Před měsícem

      I hope this is what you were looking for, let me know..

  • @hamada99457
    @hamada99457 Před měsícem

    Your video it's really helpful. We wanna more videos on Tshoot thank you

    • @staticroute
      @staticroute Před měsícem

      Sure thing! I have a plan for more videos on the topic

  • @AnandNarine
    @AnandNarine Před 2 měsíci

    Great videos. Can you please do a "Life of a Packet" video?

    • @staticroute
      @staticroute Před 2 měsíci

      hey Anand, yes certainly, that is in fact part of an upcoming "Networking Fundamentals" series, I estimate I will only begin working on it near the end of the year...

    • @AnandNarine
      @AnandNarine Před 2 měsíci

      From the fortigate packet flow perspective - dnat then to route lookup to snat order and where the session table fits in that. Thank u

    • @staticroute
      @staticroute Před 2 měsíci

      @@AnandNarineI’m so glad you’re quiet right… about the order and I found this document to support your statement: docs.fortinet.com/document/fortigate/6.4.0/parallel-path-processing-life-of-a-packet/86811/packet-flow-ingress-and-egress-fortigates-without-network-processor-offloading Session table is part of stage 3 - stateful inspection and session management, after traffic is forwarded and a 3-way handshake is complete and session established… Thank you for a great question…I had to double check it before answering 😅

    • @AnandNarine
      @AnandNarine Před 2 měsíci

      Do u know if a policy lookup needs to be done to allow new traffic Before it gets entered into the session table?

    • @staticroute
      @staticroute Před 2 měsíci

      @@AnandNarine yes correct, otherwise you won’t see that traffic in session table

  • @AnandNarine
    @AnandNarine Před 2 měsíci

    what version fortios here ?

  • @MuhammadImran-xu4fw
    @MuhammadImran-xu4fw Před 2 měsíci

    Again very helpful. Thanks.

  • @staticroute
    @staticroute Před 2 měsíci

    Dialup VPNs are useful where remote branches have no fixed ip address, such as LTE, etc…I hope you find the video useful and as always, I’m curious to know how many people are using Dialup or intend using dialup VPN

  • @mrmendes4ever
    @mrmendes4ever Před 2 měsíci

    i have a challenge. A tunnel has failed to come up between Fortigate and Linux server running strongSwan. The Fortigate has NAT-T enabled and they are translating their external IP from Private to Public. Can you assist.

    • @staticroute
      @staticroute Před 2 měsíci

      Hi @mrmendes4ever, I assume you have NAT-T enabled on the StrongSwan as well? From Fortigate try to run the following and observe output: 1. get vpn ipsec tunnel summary we are interested in status: selectors(total,up).. 2. diagnose sniffer packet any 'host x.x.x.x' 4 we want to see bidirectional IKE exchange, be sure to use the public address of the StrongSwan. 3. diagnose vpn ike gateway list name "tunnel-name" or simply diagnose vpn ike gateway list if there's only 1 tunnel The idea is to see what status phase 1 tunnel is in: connecting or Established. Then we can take it from there..

    • @staticroute
      @staticroute Před 2 měsíci

      Assuming the 2 devices are in fact correctly exchanging IKE and UDP/500 UDP/4500 and ESP are not blocked anywhere, try this to see what the peers are disagreeing on: - diagnose debug application ike -1 observe the output and hopefully this leads us to the root cause. Best of luck!

  • @bph3649
    @bph3649 Před 2 měsíci

    Not many people can explain clearly like this, good job!

  • @Rejo-ni3hz
    @Rejo-ni3hz Před 2 měsíci

    You're better than my teachers

    • @staticroute
      @staticroute Před 2 měsíci

      Thank you @Rejo-ni3hz, I try to be rooted in theory but apply practical application so that anyone can easily understand, I’m glad the content is achieving that…😀 thank you for being part of this community..

  • @staticroute
    @staticroute Před 2 měsíci

    Hey everyone, this has been the second video on the VPN topic, I value your feedback, let me know your thoughts...!

  • @MuhammadImran-xu4fw
    @MuhammadImran-xu4fw Před 2 měsíci

    That is a great and simple explanation. Thank you. Can you also create a video on how to set up FortiGate and multiple WAN/ISP links setup for SDwan labs in GNS3?

    • @staticroute
      @staticroute Před 2 měsíci

      It’s part of the schedule, will definitely be doing that soon

    • @MuhammadImran-xu4fw
      @MuhammadImran-xu4fw Před 2 měsíci

      @@staticroute awesome thanks.

  • @venkatachalapathykanchana
    @venkatachalapathykanchana Před 2 měsíci

    Hi, your video was very much helpful and knowledge gaining session as well. So kindly bring up with many lab sessions with the fortinet it will be more helpful to others. I really enjoyed.

    • @staticroute
      @staticroute Před 2 měsíci

      I’m real happy this content is useful, I am working to create more….so more will be coming!

  • @staticroute
    @staticroute Před 2 měsíci

    Hello everyone.... this is our first video of the IPSec video series I'm working on. I'll be making several videos focusing on various VPN-specific topics...If there's a specific topic you want me to cover, just leave comment and I'll get to it and make it happen..

  • @AhmedNtt
    @AhmedNtt Před 2 měsíci

    Great content! Thank you for your efforts! For the policy ID in the session list, this is usually one of the local in policies of the fortigate that allowed the traffic. You can view these policies via the following command: #diagnose firewall iprope list

    • @staticroute
      @staticroute Před 2 měsíci

      Hi Ahmed, thank you for being part of our community! about this command...I've seen it around but I have no experience personally using it...thanks for this..I'm going to check it out for sure :-D

  • @staticroute
    @staticroute Před 2 měsíci

    Hi everyone, thanks for tuning in… Leave your comments below, let me know what I’m doing right, and what needs improvement… most importantly, I’ll do my best to create video content as you request..

    • @VishnuK-br7ee
      @VishnuK-br7ee Před měsícem

      I have two IPsec tunnel using two different ISP. I would like to manipulate the outgoing and incoming traffic through specific tunnel using BGP. Can you please provide the configuration ?

    • @staticroute
      @staticroute Před měsícem

      @@VishnuK-br7ee Hi Vishnu, This article may be useful: community.fortinet.com/t5/FortiGate/Technical-Tip-How-to-modify-route-preference-using-Local/ta-p/305018 so for inbound traffic, the best way might just be to work with your ISP to edit the attributes on their end being advertised to you. Also keep in mind the default BGP behavior like this: community.fortinet.com/t5/FortiGate/Technical-Tip-BGP-route-selection-process/ta-p/195932

    • @VishnuK-br7ee
      @VishnuK-br7ee Před měsícem

      @@staticroute IPsec tunnels between site to site not with ISP.

    • @staticroute
      @staticroute Před měsícem

      @@VishnuK-br7eehey Vishnu, try to please draw it and indicate clearly what you would like us to achieve…share on Google docs or Dropbox, etc I promise I’ll have a look

  • @MuhammadImran-xu4fw
    @MuhammadImran-xu4fw Před 2 měsíci

    Awesome, Do you provide online training classes also?

    • @staticroute
      @staticroute Před 2 měsíci

      Hi Muhammad, thank you for tuning in and being part of our little community..to answer your question, I'm not yet ready for that but it is definately the plan.

  • @staticroute
    @staticroute Před 2 měsíci

    This is a remake of an older video, enjoy everyone 🎉🎉...remember to let me know what other videos you'd like to see on the channel..

  • @lumkagxara443
    @lumkagxara443 Před 2 měsíci

    OMG! A South African!!!! Subscribed the moment I heard "My name is Tegobo" I want to recreate our SD-WAN, hoping to get insight from your channel.

    • @staticroute
      @staticroute Před 2 měsíci

      Hi sis, thank you 🤣

    • @staticroute
      @staticroute Před 2 měsíci

      This particular video is up for a redo, I definately plan to go deeper on SDWAN because there’s so much to it

  • @omarbel-yazid
    @omarbel-yazid Před 3 měsíci

    This is extremely helpful. Thank you.

  • @saidsabar3184
    @saidsabar3184 Před 3 měsíci

    Great work sir, Thanks

    • @staticroute
      @staticroute Před 3 měsíci

      Thank you for being part of our Static Route community…

    • @staticroute
      @staticroute Před 3 měsíci

      I’m preparing more content as part of my re-certification journey and I’m happy its useful to you as well 🙏🏽