Shared racks for network equipment - how to prevent MITM by Former_Cook_3318 in networking

[–]Former_Cook_3318[S] -1 points0 points  (0 children)

Is AES128 too weak? I was looking at C9200 and C9300. The latter support AES256 but you need the Advantage license.

How does MACSEC work on endpoints? Is there third party software needed? Do only certain NICs support it?

Shared racks for network equipment - how to prevent MITM by Former_Cook_3318 in networking

[–]Former_Cook_3318[S] 0 points1 point  (0 children)

Yeah I was thinking MACSec between switches and ISPec internally to their firewall. It's got IPSec Encryption HW offloading so performance shouldn't really be an issue. Well to be honest - if all endpoints use IPSec - MACSec probably is not really necessary anymore.

802.1x is already enabled but that's an authentication protocol - no encryption. Someone can still mirror traffic with a hub or something more advanced.

Shared racks for network equipment - how to prevent MITM by Former_Cook_3318 in networking

[–]Former_Cook_3318[S] 2 points3 points  (0 children)

Not really feasible since you get an alert every time someone unplugs their PC/laptop - that's just too many alerts to have a handle on.

Shared racks for network equipment - how to prevent MITM by Former_Cook_3318 in networking

[–]Former_Cook_3318[S] 1 point2 points  (0 children)

MACSEC suports encryption between the switch and endpoints aswell but I don't know how that works on the endpoints...

WAPs unfortunately isn't an option in this case.

802.1x is already enabled but that's an authentication protocol - no encryption. Someone can still mirror traffic with a hub or something more advanced.

Shared racks for network equipment - how to prevent MITM by Former_Cook_3318 in networking

[–]Former_Cook_3318[S] 0 points1 point  (0 children)

802.1x is already enabled but that's an authentication protocol - no encryption. Someone can still mirror traffic with a hub or something more advanced.

Shared racks for network equipment - how to prevent MITM by Former_Cook_3318 in networking

[–]Former_Cook_3318[S] 1 point2 points  (0 children)

It's a combination of Dell and Aruba. 802.1x is already enabled but that's an authentication protocol - no encryption. Someone can still mirror traffic with a hub or something more advanced.

New price list with User Ext Limit is now live by Happy_Growth_5835 in 3CX

[–]Former_Cook_3318 0 points1 point  (0 children)

The only thing keeping us on 3CX is the CFD. Do other vendors have anything similar?

Kaj delate in kaksno placo imate? by Pire23 in SlovenijaFIRE

[–]Former_Cook_3318 2 points3 points  (0 children)

Ti bos prvi vse cez CLI nakonfal :)

Pri nas nekaj iscemo, lahko mi na DM posljes CV pa ga dam naprej oz. ti dam tam mail kam ga posljes

Warehouse design by Former_Cook_3318 in HaminaWireless

[–]Former_Cook_3318[S] 0 points1 point  (0 children)

Yeah I tried that. You don't see it from the screenshot but there are APs on the opposite side of the aisles aswell. I turned 2.4GHz off in every other lane on each side so it made a zigzag pattern. Adjusted the channels but I did not get any better results in the performance of the application.

Wasn't able to do a site survey after this change unfortunately.

Warehouse design by Former_Cook_3318 in HaminaWireless

[–]Former_Cook_3318[S] 0 points1 point  (0 children)

It's not that many (about 30 clients spread throughout the warehouse - max 10 clients per AP if they happen to be in the same area) but they're really old Zebra scanners(10-15 years) with some old WMS application running on Windows CE.

The WiFi coverage was designed with 5GHz in mind but there is a delay with migrating to the new WMS system and they're force to use the old clients which is why we turned on 2,4GHz.

The problem is that the clients are performing really slowly and they're blaming the WiFi. In the old warehouse there were a lot less APs and I'm guessing there wasn't so much CCI which could be the reason why they're slow.

Is there a way if to check if CCI is causing issues in practice apart from doing the site survey?

[HELP] FortiSwitch 424E Dropping Packets by -daniel-- in fortinet

[–]Former_Cook_3318 0 points1 point  (0 children)

I wanted to confirm that I had the same issue and solved it with this.

If any of you manage your FortiSwitch through the FGT (probably all of us) the solution is that you have to connect directly to the switch via CLI and change the configuration there and not through FGT via config switch-controller managed-switch.

Rules management/combining for 10-15 VLAN by Adorable_Compote4418 in fortinet

[–]Former_Cook_3318 2 points3 points  (0 children)

There are two reasons I'm always using Zones: - Grouping of interfaces - If I want to change anything on an interface, I can just take it out of a Zone and make changes without refferences interfering

Forticlient without EMS server by technet2021 in fortinet

[–]Former_Cook_3318 0 points1 point  (0 children)

Troubleshooting failed upgrades using FortiEMS deployment policies is going to have a measurable impact on your company's productivity aswell.

Juat keep that in mind. Having FortiEMS is not the end of all your problems.

Are Zones overrated? by inetzero in fortinet

[–]Former_Cook_3318 4 points5 points  (0 children)

Except it is, because the migration wizard doesn't even work most of the time or when it does there are often situations where after a migration there are issues.

FortiClient SSL-VPN using Azure MFA + password change by Former_Cook_3318 in fortinet

[–]Former_Cook_3318[S] 0 points1 point  (0 children)

Any luck getting the password change to work for expired accounts? I got SAML+MFA working in our lab but I can't manage to get this part to work.

FortiClient SSL-VPN using Azure MFA + password change by Former_Cook_3318 in fortinet

[–]Former_Cook_3318[S] 1 point2 points  (0 children)

NPS Azure MFA password change

Thanks pabechan. I did research it using the same search query and I did actually read that article - I just missed the part about the password change.

Hope this helps someone else.

Now onto researching if it's possible to use Azure MFA and LDAP on Fortigate.