This is the 3rd and last part of Layer 2 Security. We have already discussed MAC Attacks, VLAN Hopping attacks in Part 1 and DHCP Attacks, and GARP Attacks in Part 2. If you really need to secure your Layer-2 of the network, then please follow all the parts, and apply Layer-2 Security in your […]
This is the second part of Layer 2 Security. We already posted Part 1, if you have not checked that then please check it out first as skipping the first part may lead you to leave the vulnerability in your network. We have already covered MAC attacks and VLAN Hopping attacks. The remaining Layer-2 attacks […]
In simple terms, DNS, DHCP, and IPAM (IP Address Management) integration into a single service or solution is referred to as DDI. All communications across an IP-based network are made possible by the foundational network services known as DDI. With DDI solutions, you can manage DNS and DHCP services centrally, as well as IPAM services. […]
Welcome back friends to Part 2 of Initial Configuration of FortiManager but if you have not checked my first part of this blog then you must check it out. In this blog, we will see ADOMS, management of FortiGate devices via Manager, and updates. Contents ADOMS. 1 Enable the ADOM feature: 1 Create an ADOM: […]
FortiManager Security Management appliance allows managing of Fortinet Network Security devices. This blog will guide you through the initial configuration of Forti-Manager. We will see the connectivity, configuration, and deployment in detail. Contents for FortiManager Connecting to the GUI Change Management IP Upgrade Process for FortiManager FMG-2000E Change an administrator’s password: Create Read-only user Change […]
In this blog, we will see the importance of Threat Grid and what are the different types of interfaces in this appliance. Threat Grid (TG) is a Sandbox appliance that is very important for the network. Importance of Threat Grid (TG) A Cisco Threat Grid appliance provides safe and highly secure on-premises advanced malware analysis, […]
Hello friends, this is the 2nd part of the Cisco NIPS Day 1 Configuration Guide, if you have not gone through my first part of this blog then you must check that first. In the end, I will share some OEM-related links as well for you, so you can overcome your all doubts and will […]
In this blog, you will see about the necessary config. of NIPS 8350 (Network Intrusion Prevention System). We will give you point-to-point information, will not complicate this by going into deep theories. We will keep it technical for your better understanding. We are using hardened operating system Cisco Sourcefire NIPS-8350 physical device in this blog […]
Hi guys, in this series of blogs, we will talk about different FortiGate HA protocols. FortiGate has different HA protocols FGCP and FGSP. In this blog, we will understand more about FGSP protocol i.e FortiGate Session Life Support Protocol. FGSP was introduced in Fortios 5.0 and above to overcome the HA restrictions over asymmetric traffic, TCP, UDP, […]
In the world of Network Security, we have the most expensive and advanced security devices which act as a strong defense and help to prevent cyberattacks. Nowadays, most of the network administrators are just fulfilling their duties with respect to their network configuration but still, some of them are smart because they use Layer 2 […]