hashem-s (34)in #fortigate • 7 years agosteemCreated with Sketch.How to make VDOM IN FORTIGATEIn previous post we practice to make a firewall clustering with to different instance of Fortigates. In this post i…hashem-s (34)in #fortigate • 7 years agosteemCreated with Sketch.FORTIGATE HA AND VIRTUAL CLUSTER CONFIGURATIONFORTIGATE HA AND VIRTUAL CLUSTER CONFIGURATION In this document we describe how to cluster two Fortigate devices and…hashem-s (34)in #network • 7 years agosteemCreated with Sketch.STATIC NAT WITH ROUTE-MAPYou are familiar with NAT technology. NAT help you to change IP address field in layer 3 header. In almost documents…hashem-s (34)in #security • 8 years agosteemCreated with Sketch.Zone Based Firewalling (ZBF)Zone-Based Policy Firewall changes the firewall configuration from the older interface-based model to a more flexible…hashem-s (34)in #security • 8 years agosteemCreated with Sketch.Networking Security Conceptshashem-s (34)in #security • 8 years agosteemCreated with Sketch.Social Engineering Tactics AND DefensesSocial Engineering Tactics: Phishing: Phishing elicits secure information through an e-mail message that appears to…hashem-s (34)in #fortigate • 8 years agosteemCreated with Sketch.How you can monitor live sessions in Fortigates firewalls via CLIIn previous post I have explained how to monitor traffic logs. Now i want to guide you how to monitor live sessions in…hashem-s (34)in #fortigate • 8 years agosteemCreated with Sketch.How you can monitor traffics logs in fortigate CLIif you want to monitor traffic logs in a Fortigate firewall via CLI you can use following commands: FG # execute log…hashem-s (34)in #network • 8 years agosteemCreated with Sketch.Take Suggestion about Network ArticlesDears. I have started to share my experiences about Networking and Security in this site. Please inform me and about…