Ready to bolster your FortiGate Firewall security? Join me in this step-by-step tutorial where I demystify the intricacies of configuring Trusted Hosts. After years in the consultancy game, I'm here to spill the beans on the common pitfalls that may unknowingly expose your device's admin panel to the wide web.
Learn the ropes as I guide you through the correct setup for Trusted Hosts, ensuring your FortiGate Firewall is locked down and impervious to potential security breaches. We'll unravel the mysteries together!
🚨 But wait, there's more! Stay tuned for the next video, where I'll unveil an alternative method through the "Local-In" Policy configuration. Double down on your firewall knowledge and fortify your network defences.
Just to also add this is a potential solution to a recent exploit - https://www.fortiguard.com/psirt/FG-I...
// Timestamps //
00:00 - Video Introduction
00:30 - What are Trusted Hosts? (Default Configuration)
00:55 - Using Two Jumpboxes (Default Behaviour)
01:20 - Trusted Host Configuration
02:10 - What is the behaviour now?
02:49 - The BIGGEST mistake I see! and why!
04:20 - Correct Configuration Example
04:50 - What is the behaviour now? (Post Configuration)
06:00 - Video Summary
// Chris SOCIAL //
/ chris-eddisford-5b676462
// Keywords //
Patch FG-IR-23-139
Fortinet
Fortinet Training
Fortinet Remote Access
Fortinet Home Worker
Secure FortiGate
Hardening FortiGate
Fortgate admin access
FortiGate
FortiGate How To?
Fortinet NSE4
Fortinet FCP
// HashTags //
#cybersecurity
#networking
#fortinet
Watch video FortiGate: Why Series? Secure Your Device (Trusted Host Configuration) online without registration, duration hours minute second in high quality. This video was added by user FortiBytes 01 January 1970, don't forget to share it with your friends and acquaintances, it has been viewed on our site 42 once and liked it 1 people.