How to create DHCP server and a policy in the Fortigate

Here is an example script that demonstrates how to use the  fortigate-api  package to create a DHCP server and a policy in the Fortigate   from fortigate_api import FortigateAPI # Create a FortigateAPI object fgt = FortigateAPI(host="host", username="username", password="password") # Create a DHCP server data = {     "default-gateway": "192.168.255.1",     "netmask": "255.255.255.0",     "interface": "vlan.123",     "ip-range": [         {"start-ip": "192.168.255.2", "end-ip": "192.168.255.254",}     ], } fgt.dhcp_server.create(data) # Create a policy in the Fortigate data = dict(     name="POLICY",     status="enable",     action="accept",     srcintf=[{"name": "any"}],     dstintf=[{"name": "any"}],     srcaddr=[{"name": "all"}],     dstaddr=[{"name&quo

Network Security || Why Network Security ? || Advantages of Network security

 

So, let us start with the question of why security? to answer this we have to go into the history when people used to send their letters by Post, we were having something called a post-box and the post office was the entity involved in sending and receiving messages so how we used to send our letters by making it up into the envelope making is secure so that no one else can able to read the information when it is passing by if anyone tries to do so it can easily be identified because the envelope needs to be open for doing it.

So from this whole story, I want to make you understand how this network security works the same as sending an envelope from Source-to-Destination which contains your secret message that we don't want to share with anyone. These are the process involved in the Network Security for sending any message to someone are as follows:

Firstly, data is taken in a plain text format and converted into an encrypted secure message with the help of a key.

Secondly, it is that sent to the destination through a public network i.e.; the Internet.

Thirdly, when the data reaches its destination it needs to be opened back into the Plain text format by decrypting it.

Now let us discuss the need for network security so that you need to question yourself whenever you are having any personal conversation inside your home do you allow others to listen to it 'Yes' or 'No' absolutely no because it's personal in the same way when you are sending any data over the internet you ensure that it may not go to the wrong hand or it should not be hijacked in between. This is the reason why we require network security so that our data which is personal and confidential as well should not get hacked or sniffed in a channel of transmission from Source-to-Destination we always try to maintain a secure connection between the sender and the receiver of the message.

No alt text provided for this image
Comparison between Secure and Unsecure Network

The following component involved in network security first and foremost is Encryption i.e.; the message should not be in clear text or anyone can able to read the information easily by that sniffing in between second is Gatekeeper at the entry point i.e.; Firewall will check each and every traffic passes through. The third one is the internal network vulnerability where someone within the network has access to unauthorized systems.

Four major Steps need to be taken for making an effective Network Security Model:

  1. Designing an effective security Algorithm
  2. Generation of secret information is the secure encryption key
  3. Development of methods for distribution & sharing of the information (Say, Encryption keys)
  4. Specify a Security Protocol (Like IPsec)

Comments

Popular posts from this blog

How to Configure VXLAN in FortiGate Firewall

Higher Availability in FortiGate and VRRP in Cisco

Python Script to take the Backup of Multiple device in a Network