hashem-s (34)in #fortigate • 7 years agosteemCreated with Sketch. • NoneHow to make VDOM IN FORTIGATEIn previous post we practice to make a firewall clustering with to different instance of Fortigates. In this post i…hashem-s (34)in #fortigate • 7 years agosteemCreated with Sketch. • NoneFORTIGATE HA AND VIRTUAL CLUSTER CONFIGURATIONFORTIGATE HA AND VIRTUAL CLUSTER CONFIGURATION In this document we describe how to cluster two Fortigate devices and…hashem-s (34)in #network • 7 years agosteemCreated with Sketch. • NoneSTATIC NAT WITH ROUTE-MAPYou are familiar with NAT technology. NAT help you to change IP address field in layer 3 header. In almost documents…hashem-s (34)in #security • 7 years agosteemCreated with Sketch. • NoneZone Based Firewalling (ZBF)Zone-Based Policy Firewall changes the firewall configuration from the older interface-based model to a more flexible…hashem-s (34)in #security • 7 years agosteemCreated with Sketch. • NoneNetworking Security Conceptshashem-s (34)in #security • 7 years agosteemCreated with Sketch. • NoneSocial Engineering Tactics AND DefensesSocial Engineering Tactics: Phishing: Phishing elicits secure information through an e-mail message that appears to…hashem-s (34)in #fortigate • 7 years agosteemCreated with Sketch. • NoneHow you can monitor live sessions in Fortigates firewalls via CLIIn previous post I have explained how to monitor traffic logs. Now i want to guide you how to monitor live sessions in…hashem-s (34)in #fortigate • 7 years agosteemCreated with Sketch. • NoneHow you can monitor traffics logs in fortigate CLIif you want to monitor traffic logs in a Fortigate firewall via CLI you can use following commands: FG # execute log…hashem-s (34)in #network • 7 years agosteemCreated with Sketch. • NoneTake Suggestion about Network ArticlesDears. I have started to share my experiences about Networking and Security in this site. Please inform me and about…