Logo Atlas
  • Home
  • About Me
  • Skills
  • Education
  • Recent Posts
  • Certifications
  • Posts
  • English
    Español English
  • Dark Theme
    Light Theme Dark Theme System Theme
Logo Inverted Logo
  • Tags
  • ACLs
  • ANDORID
  • APACHE
  • ARP
  • ASIR
  • ASO
  • AW
  • BIND9
  • CENTOS
  • CI/CD
  • CISCO
  • CMS
  • Comands
  • Containers
  • Contenedores
  • Controladores NVIDIA
  • DEBIAN
  • Debian 12
  • DHCP
  • DNAT
  • DNS
  • DNSMASQ
  • Docker
  • Enrutamiento
  • FIREWALL
  • FORENSE
  • FORTINET
  • FORWARDING
  • FTP
  • GNS3
  • HTTPS
  • IPTABLES
  • IPv4
  • IPv6
  • ISO
  • IWEB
  • Jenkins
  • Jenkis
  • Kubernetes
  • KVM
  • LAMP
  • LEMP
  • LINUX
  • MariaDB
  • Metrics
  • Mysql
  • NAT
  • Network
  • Networking
  • NFTABLES
  • NVIDIA Drivers
  • Observability
  • OPENVPN
  • Oracle
  • PostgreSQL
  • Prometheus
  • Redes
  • REDHAT
  • ROCKY
  • Routing
  • Services
  • Servicios
  • Sistemas
  • SMR
  • SNAT
  • SSH
  • STRONGSWAN
  • Switches
  • VPN
  • Windows
  • WIREGUARD
  • Wireshark
  • WordPress
Hero Image
Fortinet CLI

Equivalence from GUI to CLI Initially, I started the practice using the command line (CLI), however, I found it more comfortable to do it from the graphic interface. Therefore, I decided to establish an equivalence between the different actions I have carried out during practice and to compare them with their counterpart in the terminal. [NOTE] In this post I do a small summary of the equivalencies between the GUI and the CLI of Fortinet that I have used in the 2 Fortinet firewall posts.

  • FIREWALL
  • FORTINET
Thursday, March 28, 2024 | 9 minutes Read
Hero Image
Implementation of a perimeter firewall with Fortinet I

Before you start the practice, the scenario you see in the practice is as similar as I can ride to the original practice. I have used version 7.0.9-1 of FortiGate, as the higher versions bring some restrictions. You can download the image from this [link](https://drive.google.com/drive/folders/ 1VGmeLN5inkWNNNUsIvq9ewGUzJLTLkiM). Firewall start-up FortiGate devices are made with the IP 192.168.1.99 / 24, as I am from GNS3 do not need to connect to this interface with a device and change the configuration. Since I can do it from the console.

  • FIREWALL
  • LINUX
  • DEBIAN
  • FORTINET
Thursday, March 28, 2024 | 10 minutes Read
Hero Image
Implementation of a perimeter firewall with Fortinet II

Now let’s emulate firewall practice II, but on GNS3. To this end, I have transformed client 1 into Odin, and added Thor and Loki as virtual machines instead of containers on the LAN network. I have also created a new network called DMZ, in which will be the Hela machine. Since I have transformed the previous scenario into this new one, we have some rules created earlier. Therefore, I will remove from the statement those that are already created, such as making SSH to Odin from port 2222, but with the service listening in the 22.

  • FIREWALL
  • LINUX
  • DEBIAN
  • FORTINET
Thursday, March 28, 2024 | 16 minutes Read
Hero Image
VPN site to site with IPsec Fortinet

In this post I will mount an IPSEC VPN using Fortinet firewalls, for which I will visualize them on GNS3. Stage preparation To create the VPN I will add a new Fortigate to the stage. So let’s proceed to set it up, the first thing will be to know the IP that the DHCP has given you: FortiGate-VM64-KVM login: admin Password: You are forced to change your password. Please input a new password. New Password: Confirm Password: Welcome! FortiGate-VM64-KVM # get system interface physical port1 == [onboard] ==[port1] mode: dhcp ip: 192.168.122.22 255.255.255.0 ipv6: ::/0 status: up speed: 1000Mbps (Duplex: full) FEC: none FEC_cap: none This IP you’ve given me for DHCP will be configured as static.

  • VPN
  • LINUX
  • FORTINET
Thursday, March 28, 2024 | 3 minutes Read
Navigation
  • About Me
  • Skills
  • Education
  • Recent Posts
  • Certifications
Contact me:
  • contacto@javiercd.es
  • javierasping
  • Francisco Javier Cruces Doval

Liability Notice: This theme is under MIT license. So, you can use it for non-commercial, commercial, or private uses. You can modify or distribute the theme without requiring any permission from the theme author. However, the theme author does not provide any warranty or takes any liability for any issue with the theme.


Toha Theme Logo Toha
© 2023 Copyright.
Powered by Hugo Logo