How to create DHCP server and a policy in the Fortigate

Here is an example script that demonstrates how to use the  fortigate-api  package to create a DHCP server and a policy in the Fortigate   from fortigate_api import FortigateAPI # Create a FortigateAPI object fgt = FortigateAPI(host="host", username="username", password="password") # Create a DHCP server data = {     "default-gateway": "192.168.255.1",     "netmask": "255.255.255.0",     "interface": "vlan.123",     "ip-range": [         {"start-ip": "192.168.255.2", "end-ip": "192.168.255.254",}     ], } fgt.dhcp_server.create(data) # Create a policy in the Fortigate data = dict(     name="POLICY",     status="enable",     action="accept",     srcintf=[{"name": "any"}],     dstintf=[{"name": "any"}],     srcaddr=[{"name": "all"}],     dstaddr=[{"name&quo

Do's And Don'ts

Do's and don'ts for approvals and mid-level officials:-

1. All classified work should be done on stand alone computers.

2. Take backup of all important information and files.

3. Do not enable remote access of file sharing form remote account.

4. Use secure deletion software for save file purging.

5. Use private browsing mode on public computers.

6. Don't store the information on private cloud service like Google drive Dropbox iCloud if it is an official purpose.

7. Store information only on original located removable storage media.

8. Always reboot when required to use public computers.

9. Clean up cache files after use.

10. Regularly update the firmware of wireless devices.

11. Disable remote management features in routers to protect against unauthorised access.

Do's and don'ts for System and Network Administrators:-

1. Administrator login should be restricted to account management.

2. Update software patches regularly on all systems.

3. DON'T use the built-in windows Administrator account for administrator functions/activities.

4. DON'T use generic / normal user account as a service account

5. DON'T reboot a system if-- 

  • You don't know who logged onto it;
  • You don't suspend the system monitors;
6. Take regular backups of all critical systems.

7. Regularly check your lock files for errors and warnings commerce so they can alert you to problems before they become a threat.

8. Power supply should be controlled throw UPS or surge protector.

9. Do not install computer systems industry environment.

10. Implement strong security protocols and policies.

11. Always enable the option in computers with "show hidden files and folders".

12. Implement of workflow process with proper documentation.

13. All system changes should be only on the basis of document approval.

14. Do not take up task which may not be completed on time-Beware the late Friday afternoon task.

15. Do perform regular security audits and test.

16. Do you constantly update and patch your network and devices.

17. Disable the auto turn / autoplay features for insecure download software application.

18. Create and implement policies and procedures:

  • Mobile device security policy,
  • Computer use policy,
  • Social media policy,
  • Password policy,
  • An email policy,
  • Least privilege security policy,
  • A Business Continuity (BC) plan, and
  • A Data Backup and Disaster Recovery (BDR) plan.
19. Do remind user to use hard to guess an uncommon passwords.

20. Don't use your admin account for non admin purpose.

21. Don't leave your network ID mercy of password protection.

22. Ensure regular cyber security updates are received by all employees.

23. Do stay virus updated. Follow cert-in and receive frequent bulletins about no in new exploit and attacks.

24. Don't allow your email program to "auto open" attachments.

******




Comments

Popular posts from this blog

How to Configure VXLAN in FortiGate Firewall

Higher Availability in FortiGate and VRRP in Cisco

Python Script to take the Backup of Multiple device in a Network