How to create DHCP server and a policy in the Fortigate

Here is an example script that demonstrates how to use the  fortigate-api  package to create a DHCP server and a policy in the Fortigate   from fortigate_api import FortigateAPI # Create a FortigateAPI object fgt = FortigateAPI(host="host", username="username", password="password") # Create a DHCP server data = {     "default-gateway": "192.168.255.1",     "netmask": "255.255.255.0",     "interface": "vlan.123",     "ip-range": [         {"start-ip": "192.168.255.2", "end-ip": "192.168.255.254",}     ], } fgt.dhcp_server.create(data) # Create a policy in the Fortigate data = dict(     name="POLICY",     status="enable",     action="accept",     srcintf=[{"name": "any"}],     dstintf=[{"name": "any"}],     srcaddr=[{"name": "all"}],     dstaddr=[{"name&quo

Top 5 SKILLS TO GET INTO CYBERSECURITY

 If you new to the field or looking for a career transaction than this blog post is for you read out. There are so much information available on the internet but it's hard to even start like you might heard of super Certification such as:

  • CEH: Certified Ethical Hacker.
  • CISM (Certified Information Security Manager)
  • CompTIA Security+
  • CISSP (Certified Information Systems Security Professional)
  • GSEC: GIAC Security Essentials. 
  • ECSA: EC-Council Certified Security Analyst. 
  • GPEN: GIAC Penetration Tester. 
  • SSCP: Systems Security Certified Practitione etc.

Cybersecurity Certifications

But I will tell you that these are not that important as seems while there is some value when you are studying for certs but what is important is your skills and experience because in this field what you will do will make so much more successful than then these Certification would make you know.

Solving technical problems is the way to earn the trust and  confidence with the people you work.

So common let's start the top 🔝 5 skills:

  1. Building and using VM (virtual machines).
  2. Learn the Command line.
  3. Master the art of System Administration.
  4. Computer Networking
  5. Personal Digital Security.
Virtual Machines:-

Virtual Machines


Virtual Machines are also called VMs than runs on top of operating system's it may be your existing OS or host OS is commanly refers to as a guest and is managed by a software called HYPERVISOR, the hypervisor lets you managed and allocate resources such as CPU, memory and disk 📀 space on your guest how many of hypervisor you have heard of these are:

1. Hyperv by Microsoft.

2. Virtualbox by Oracle.

3. VMware 

4. K-VM 

Hypervisors


Many times you would heard of the word clouds ☁️ it usually means thousands of VMs running or specialised hypervisors on someone else system reforms and data center somewhere. So these makes you PLATFORM AGNOSTIC meaning you are no longer limited to anyone single OS and also the tools available for it many people spend all their time on just one OS and debate on which one is best let me tell you, it doesn't matter. 

Being a pro you should be advese in all of them and become comfortable with any platforms it maximize the scope of your skills and make you handle any situation virtual environment also give the the freedom to research and explore in the virtual isolated environment without affecting the main driver you can quickly take snapshots of the guest OS and Store to any state opening up suspect file you received using VM, want to practice configuring a server using VM, sling X ps as a target use a VM.

Learn the Command line:-

Command Line Tools


Don't go away from the black screen and the text but be familiar with it the command line interface commanly refers to as a shell it is the simplest and most effective way to interact with your operating systems OS for example if you want to open a CSV file excel might get freez or crash but running a light weight shell Command gets me what I need in Milly time. Why it is called a shell the important part of the OS that actually makes it runs is called the Kernel because it functions at the centre of the system the part that has been exposed to user is called the shell since it's wrap around the Kernel is just like a car 🚗 all you give the control 🛂 of the car by the starring, gear ⚙️, brake, dashboard.  It gives you the lowest level access of the software functionality that comes with an OS many of the most useful tools not have GUI (Graphical User Interface).

Linux Command line

 So that you can click mastering the command line expand your knowledge and makes you more done with less it's lets you scripting and automation takle your repetitive tasks thats may cause you waste lots of time automating your work flow by using command line makes you tremendously valuable asset to the team and I would recommend you start with $bash which is bon again shell since it comes default with every linux distribution Mac Os use in its terminal is has used zsh% which has given use many awesome features if bash is like a Toyota then zsh% is like a Lexus. Bash is so popular and effective that Microsoft has recently released Windows Subsystem for Linux or (WSL 2) and let's you intall different linux app and runs on your system this is super as if I can access all of my linux tools without switching to any of the other OS or Virtual Machines.

Now understand that the PowerShell is actually to go to native shell for windows Command line but it's very different from linux bash but it's actually give you very powerful Windows Administration abilities. If you work in an environment where windows is primary OS then definitely learn PowerShell as well.

Master the Art of System Administration:-

Nowadays all of us use computer from grandma to the IT personalities so everyone requires Sys Admin but depends upon her what is the level of your system administration system admin usually means to configuring and maintaining a computer whether a personal device or a high powered server you should be going to each and every settings of the computer and going to understand that what each and every system set is to do with the changes required to do and what these changes are doing you should be reading the online guides and the manuals on the  internet and playing to croves the further so that you also become the family IT helper.

SysAdmin



System Administration means knowing your platform in every aspect inside and out. It would be your responsibility to delete some files and then try to recover it download and install or get some viruses into your virtual machine and see what happens windows sysinternals to what they do try to extract files and password without knowing the login information ℹ️. Push your limit to whatever you know to expand your knowledge. You should be reading guides up there and reads internet acticles.

Computer Networking:-

This is the heart and soul of each and everything which you learn I would call it the physics of learning computer networking, it is the way of understanding how devices interact with each other and how data gets from one place to another point to point. It is the way of how data gets from point a to point b and if you will be a master this then this will be make you the most career was efficient troubleshooter in your field of Technology. 

Computer Networking



It deals with the protocols and IP addresses which some of the Mac addresses and how the physical devices works with each other makes a computer networks, whether you are in the red team of cybersecurity all you are defending or if you are an IT field of cybersecurity it will help you in each and every aspect. There are two most conceptual models which govern the Computer Network TCP/IP and OSI. These group all your different networking protocols into "layer".

TCP IP/OSI model



TCP/IP is older and use four layer : Application, Transport, Internet and Network. Whereas OSI reference model which stands for Open System Interconnection it was developed by International organization or ISO for standardization, these guys define everything from country code to time and date 📅 format. OSI is newer and uses seven layers: Application, presentation, session, transport, Network, data link, physical. All these layers are just to describe that what's happening where so if you receiving a package from someone in a different country it gonna get passed between envelope ✉️, boxes 🎁, vehicles and planes, each with their own addressing method and operating features when the post office tells you there is an airline issue, you know where it is in the transportation system that delaying the 🚚. Likewise the Network layer all of different function, but as whole they work together to form a network let you stream videos from a server in a rack to a device in your hand knowing what's happening at each layer let's you "the matrix" and be much more skilled at your craft.

Personal Digital Security:-

This is an area where I have been particularly passionate about it affects our family, friends and organisations, the cyber Crime industry is booming you don't have to scroll and see what the online black market place looks like as technology becomes more intertwined with our lives, from internet connected cars to refrigerators, the vulnerability and attack vector gonna increase more and more if you wanna go deep into cybersecurity there no better place to start than yourself, from password encryption 🔑 to security. 

Personal Digital Security



Stay up-to-date with the latest news updates regarding security and Cybersecurity with best practices. You might be the subject matter expert in your office than others go for advice and that advice might just protect your company from becoming front page news but most importantly is living it out yourself as well.

Conclusion

So from the above conversation we would say that if you want to be a cyber security expert then this should be the starting point of your skill set to make you more and more effective in your organisation and in yourself the five most important topics which we have covered in this post where building virtual machines understanding command line and also using it and the Art of IT and system administration with a good knowledge of networking and personal Digital security.

Comments

Popular posts from this blog

How to Configure VXLAN in FortiGate Firewall

Higher Availability in FortiGate and VRRP in Cisco

Python Script to take the Backup of Multiple device in a Network