How to create DHCP server and a policy in the Fortigate

Here is an example script that demonstrates how to use the  fortigate-api  package to create a DHCP server and a policy in the Fortigate   from fortigate_api import FortigateAPI # Create a FortigateAPI object fgt = FortigateAPI(host="host", username="username", password="password") # Create a DHCP server data = {     "default-gateway": "192.168.255.1",     "netmask": "255.255.255.0",     "interface": "vlan.123",     "ip-range": [         {"start-ip": "192.168.255.2", "end-ip": "192.168.255.254",}     ], } fgt.dhcp_server.create(data) # Create a policy in the Fortigate data = dict(     name="POLICY",     status="enable",     action="accept",     srcintf=[{"name": "any"}],     dstintf=[{"name": "any"}],     srcaddr=[{"name": "all"}],     dstaddr=[{"name&quo

Password Management

 Points to be remembered while deciding or working with password πŸ”‘:-

1. Use care when entering passwords πŸ”‘ in front of others. Never show your password to others always keep it secret, and frequently do changes in your password never keep your password same for years over years most of us are so careless that they don't even know there password just make a random password through Google password maker and forget it. Because you all should know that this a world 🌍 of digitalization and everything and everyone are coming online no age bound wheather it's old or young people so in this era if you want to be safe and secure then be sure and carefull while creating your password. Hence it is important for all of us to be careful while dealing with password.

Password πŸ”‘
2. Change your password πŸ”‘ immediately if you suspect that it has been compromised. One of the best way to know wheather your password has been found online or not 🚫 is always check ✔️ it on have i been pwned  a website by just typing if it's says  vulnerable then immediately change it. I'll not say that it's always show correct results but it will be for us somehow. Hope so that you would be understanding my suggestion and be careful.
Changing 🚼 password πŸ”‘

3. Report suspicious activity (such as slow system/unknown files on desktop πŸ–₯️/ software applications installed by unknown sources) to the IT team. Many times it's happens that when you find secretly someone is accessing your pc somehow or any unwanted software or extension has been installed on your system be careful on these types of suspect activity and always report these to trusted department never leave it uneasy or it may become harmful bacteria for your future.
Report suspicious activity

4. Don't re-use old πŸ—️ password. Re-used password are easier to crack through observing key-log πŸ” patterns or through social engineering. Which are now becoming most advanced and common way of hacking that's called social engineering, where the victim will try to show himself as trusted source and he will be somehow become your friend and then he will gain all your confidential information through a very trusted way not even make you suspect and then he will do the fraud and get out of the way by making you fool. So always be careful while making new friends online and keep an eye πŸ‘️ on it.
Password πŸ”‘ creation
5. Don't store the password πŸ”‘ in readable form in computers πŸ–₯️, notebook πŸ““, notice board etc. If you are not a technical guy then in that case you may use some tools for making your password in cypher format so that on that condition if someone gets your password he or she can't get it in humans readable format. 
Password πŸ”‘ form

6. Don't use the common password πŸ”‘ such as Name of family, pets πŸ•, friends, birthday πŸŽ‚ etc.
Avoid these passwordsπŸ”‘

Important Note:-

1. Create strong password with a minimum length of 10 characters using the combinations of  letters, numbers and special characters.
2. Use different password for different accounts. If one password get hacked, your other accounts are not compromised.
3. Change your password immediately if you suspect that it has been compromised.
4. Always decline the use of "Remember Password".  


Comments

Popular posts from this blog

How to Configure VXLAN in FortiGate Firewall

Higher Availability in FortiGate and VRRP in Cisco

Python Script to take the Backup of Multiple device in a Network