Here is an example script that demonstrates how to use the fortigate-api package to create a DHCP server and a policy in the Fortigate from fortigate_api import FortigateAPI # Create a FortigateAPI object fgt = FortigateAPI(host="host", username="username", password="password") # Create a DHCP server data = { "default-gateway": "192.168.255.1", "netmask": "255.255.255.0", "interface": "vlan.123", "ip-range": [ {"start-ip": "192.168.255.2", "end-ip": "192.168.255.254",} ], } fgt.dhcp_server.create(data) # Create a policy in the Fortigate data = dict( name="POLICY", status="enable", action="accept", srcintf=[{"name": "any"}], dstintf=[{"name": "any"}], srcaddr=[{"name": "all"}], dstaddr=[{"name&quo
Removable Information Storage Media
- Get link
- Other Apps
Points to be remembered while working with storage media:-
1. Try to encrypt the data before copying into removable storage media. Because by encryption we can process the data into a coded format so that this process can convert the original representation of the information, into a plain text or we can say an alternative form known as cypher. All the text which are encoded cannot be illegally access and seen in plain text format and the original information is always hidden and kept confidential. When you encrypt any data it is in cypher format and if unfortunately anyone gets access to the data it then also he or she will not be able to see your data in plain text format and its will be kept secret.
![]() |
Encryption 🔑 |
2. Always scan all removable media with antivirus. Because many times hacker or scammer trys to get access your information in a pendrive or any removable media through malware or virus 🦠 attack which can only be saved by regularly scanning and checking it through antivirus. Mainly all kinds of antivirus programs works to remove the worms, virus and malware. Some of the common antivirus programs are Avast, Avg-antivirus, Eset-Smart security, Quick-Heal.
![]() |
Scanning of removable media |
1. Don't take removable media out of office without permission.
2. Erase/remove the contents of removable media after use.
3. Always scan the removable media before working with it with antivirus.
4. Some times it's happens that when you insert any removable media it can't even detected by antivirus also so always be careful.
- Get link
- Other Apps
Popular posts from this blog
How to Configure VXLAN in FortiGate Firewall
How to Configure VXLAN in FortiGate Firewall A brief explanation of the given topology: - Ø On top of all, there are two FortiGate Firewalls with L3 connectivity in between. Ø Under Each Firewall we have one Cisco Switch with two VLAN configured i.e.;3500 & 3600 Ø Uplink for switches has been configured with 802.1Q trunk which is connected to FortiGate Firewall. Ø Each switch has two PCs connected one in VLAN 3500 & other one in 3600 VLAN. Ø We have configured VLAN and VXLAN on both the FortiGate Firewall. Ø In this topology PCs in the same VLAN will be able to communicate with each other through a L3 link using VXLAN technology and they will be encapsulated such that both the PCs will think that they are within the L2 domain. FortiGate Firewall Configuration VXLAN Configuration: - FGT-1: config system vxlan edit "vxlan3500" set interface "port
Higher Availability in FortiGate and VRRP in Cisco
Higher Availability in FortiGate and VRRP in Cisco A brief explanation of the given topology: - Ø On top of all, there are two FortiGate Firewalls one Active other one as Standby. Ø With the Higher Availability (HA) configured for handling the Failover of active Firewall. Ø There are two CORE switches with VRRP Configuration: CORE-1 as Master and CORE-2 as Slave. Ø Between two CORE-1 and CORE-2, two links in the Port Channel have been configured. Ø SVIs and static default route toward the Firewall has been configured for LAN users. Ø Also, the DHCP server has been configured for DATA and VOICE VLANs. Ø Two Layer 2 switches with uplinks as trunk and VLANs. FortiGate Firewall Configuration HA Configuration in FortiGate Firewall: - Here I have kept by default priority i.e.; 128 for “ ACTIVE-FIREWALL ” whose role is primary and I have set 100 for the “ STANDBY-FIREWALL ” whose role is secondary. By default, the selection process of HA in FortiGat
Python Script to take the Backup of Multiple device in a Network
from netmiko import ConnectHandler Sw_1 = { 'device_type': 'cisco_ios', 'host': '192.168.6.10', 'username': 'admin', 'password': 'Admin@123', 'port': 22, # optional, defaults to 22 'secret': 'secret', # optional, defaults to '' } Sw_2 = { 'device_type': 'cisco_ios', 'host': '192.168.6.20', 'username': 'admin', 'password': 'Admin@123', 'port': 22, # optional, defaults to 22 'secret': 'secret', # optional, defaults to '' } Sw_3 = { 'device_type': 'cisco_ios', 'host': '192.168.6.30', 'username': 'admin', 'password': 'Admin@123', 'port': 22, # optional, defaults to 22 'secret': 'secret', # optional,
Comments
Post a Comment