How to create Fortigate SSL VPN

How to create Fortigate SSL VPN SSL-VPN provides remote users with access to the corporate network using SSLVPN  client while connecting through the Internet to the corporate FortiGate unit. During the connecting phase, the FortiGate unit will also verify that the remote user’s antivirus software is installed and current… Step 1. Create an SSL VPN portal […]

How to configure Wired 802.1x

How to configure Wired 802.1x on ISE 1.3… 1. Add an external identity source e.g. AD If you have multiple identity sources, create an identity source sequence Add ISE(s) as join points to AD Add AD OUs as groups To enable machine authentication; go to Administration, external ID sources, Advance settings – Tick the check […]

Types of DDoS Attacks – volumetric, asymmetric, computational, and vulnerability-based

Soft side on Cyber Security DDoS attacks are rapidly evolving in frequency and unpredictability. While the objective is still to cause a service outage, attacks and attackers are becoming more sophisticated. While the threat landscape continues to expand, some security experts think that DDos fall within four major types: volumetric, asymmetric, computational, and vulnerability-based. Defensive […]

Different types of firewall…

Different types of firewalls… How it works Packet-Filtering Firewall – ACLs – IPs and Port numbers Operates at layer 3 and 4 Stateful Firewall – Operates at layer 5 Application/Proxy Firewall – Proxy for clients with security app like Websense, McAfee – Layer 7 FWs Reverse-Proxy Firewall – Proxy for server with security app like […]