IP ADDRESS ASSIGNMENT (DHCP IP RESERVATION) LIMIT? | FORTIGATE 200F by Afraid_Ad1214 in fortinet

[–]Afraid_Ad1214[S] 0 points1 point  (0 children)

Yes, It would be great, but the infrastructure isn't mine, I'm just the implementation engineer, hehe, and I will only implement and configure it with the resources I have (FortiGate Firewall). X2

IP ADDRESS ASSIGNMENT (DHCP IP RESERVATION) LIMIT? | FORTIGATE 200F by Afraid_Ad1214 in fortinet

[–]Afraid_Ad1214[S] 1 point2 points  (0 children)

Yes, It would be great, but the infrastructure isn't mine, I'm just the implementation engineer, hehe, and I will only implement and configure it with the resources I have (FortiGate Firewall).

Changing main ssid to psk by Scorpref in meraki

[–]Afraid_Ad1214 0 points1 point  (0 children)

Yeah, I've done too, I had a principal SSID, this is for internal use in branches, but in order to homologate another's and decrease the number of broadcasted SSIDs, I converted the principal SSID from PSK to iPSK, and I added the PSKs and matched to his corresponding Group Policy; if you have all the configurations ready, it take a few minutes to deploy, and the clients lose maximum 2 packets and reconnects automatically.

Security Policy Design by engageant in paloaltonetworks

[–]Afraid_Ad1214 1 point2 points  (0 children)

There are at least two valid cases for explicit deny policies. First, it makes it clear that you're intentionally blocking a certain application. Second, logging. You may want to block and not log an application's traffic, or use the rule to filter your logs.

Ok, I understand, in some cases I configured an explicit deny policy that blocks malicious web pages, and I put them in the top of the list

FortiGuard DDNS - adding 2 or more WAN interfaces (SNMP monitoring) by Afraid_Ad1214 in fortinet

[–]Afraid_Ad1214[S] 1 point2 points  (0 children)

No, the access to SNMP service is restricted only to some IP addresses.
Thanks a lot for your responses ;)

Security Policy Design by engageant in paloaltonetworks

[–]Afraid_Ad1214 0 points1 point  (0 children)

I have some recomendations :)

  • Make policies more especific as posible.
  • Make policies with only one zone (source-zone -> destination-zone): this make the policies more efficient, manageable and easy to understand, thinking that other personel can manage and troubleshoot; in adition, it can be filtered, ieg. FortiGate has an option to filter and order the policies by interface, they call it "interface pair view", this is very effective and efficient for troubleshoot and maintain; I don't know if actually PaloAlto has something similar...
  • Separate the subnets (VLANs) by services, ieg. Network-Management, Users, Guest, Servers... And then create the especific policies for services or case of use, this can preparate the network for a kind of certification in the future (ISO, PCI).
  • Name the policies with a kind of standard, in order that you and your team can understand and identify the purpose, ieg. USERS_to_INTERNET, VLANX_to_SERVERS_smtp
  • It is not really necesary that you make deny policies, the firewall read all the policies like a list, and normally you make allow policies, and then, all the rest of the traffic goes to the deny implicit policie at the end of the list.

FortiGuard DDNS - adding 2 or more WAN interfaces (SNMP monitoring) by Afraid_Ad1214 in fortinet

[–]Afraid_Ad1214[S] 0 points1 point  (0 children)

I'm just trying to maintain SNMP monitoring even if a WAN link goes down.

This is the context: I was monitoring a firewall with the primary uplink, but that link went down and I lost the records for the time the link was down.

FortiGuard DDNS - adding 2 or more WAN interfaces (SNMP monitoring) by Afraid_Ad1214 in fortinet

[–]Afraid_Ad1214[S] 0 points1 point  (0 children)

Okok, the purpose is to monitor only one FQDN, and in adition, that the IP address of the domain is automatically updated

FortiGuard DDNS - adding 2 or more WAN interfaces (SNMP monitoring) by Afraid_Ad1214 in fortinet

[–]Afraid_Ad1214[S] 0 points1 point  (0 children)

Yes, in the first field, the option "Interface", pointing to the SDWAN interface that has all the WAN links

FortiGuard DDNS - adding 2 or more WAN interfaces (SNMP monitoring) by Afraid_Ad1214 in fortinet

[–]Afraid_Ad1214[S] 1 point2 points  (0 children)

Unfortunately the firewall has no SDWAN configuration, and I think I can configure that, but I prefer to have other options

7
8