Autoplay
Autocomplete
Previous Lesson
Complete and Continue
FortiGate Firewall Masterclass 2025 – Fortinet NSE Configuration, VPN & Security
All About Firewalls
What is Firewall (7:42)
Statefull packet Filtering (8:05)
Stateless Packet Filtering (3:31)
Application Level Gateways - Proxy Servers (5:10)
Next Generation Firewalls (5:30)
Which Firewall - Vendors (6:24)
Next Gen Firewalls
Next-Generation Firewall – Features - PART 1 (15:52)
NGFW History - Unified Threat Management (UTM) (9:10)
Next-Generation Firewall – Features - PART 2 (11:45)
Fortigate Virtual Labs
Fortigate Labs - VIrtual Options (5:42)
Firewalls Lab Topology (11:13)
Fortigate - EVEng Image Setup (4:42)
GNS3 Image Setup - Fortigate (8:56)
GNS3 Lab Topology Setup - Fortigate (7:14)
Fortigate Lab Topology Setup - EVENG (7:40)
Fortigate Configurations
Fortigate Basic CLI Configuration - GNS3 Topol (13:09)
Fortigate Basic CLI Configuration - EVENG (5:46)
Interface Configuration - Fortigate Firewall (12:06)
Router Side Configurations (4:36)
CLI Options - Fortigate (4:48)
Static Routing - Foundations - CCNA CCNP
What is ROUTING (12:00)
Types of Routing (5:20)
Static Routing (3:20)
Static Routing - Configuration Example 1 (9:19)
Static Routing - Configuration Example 2 (9:26)
Static Routing - Next Hop or Exit interface (5:34)
Routing - How it Works (6:11)
Static Routing - Multiple Paths (4:44)
Floating Static Routes (8:27)
Default Routing - CCNA CCNP
Default Routing - Configuration Example (13:11)
Whst is Default Routing (18:40)
Floating Default Routing (11:26)
Default Routing Verfification - Real Scenario (24:45)
Default Routing - Real Scenario (7:27)
Dynamic Routing - CCNA
Dynamic Routing Protocols - Introduction (19:53)
Dynamic Routing (12:05)
IGP - EGP Routing Protocols (3:30)
Classfull vs Classless Protocols (6:04)
RIPv2 - Cisco - CCNA
Routing Information Protocol (RIP) (11:25)
Dynamic Routing Protocols - Introduction (19:53)
RIP Timers (5:36)
RIPv1 vs RIPv2 (5:00)
RIP Configuration on Cisco Routers (15:28)
Drawbacks of RIPv2 - Limitations (4:46)
OSPF Basics
OSPF - Overview (6:12)
Knowledge - Prerequisite (2:01)
OSPF - How it Works (3:28)
OSPF – Becoming Neighbors (11:04)
Router-ID (12:41)
OSPF - LSDB- Database (5:18)
Exchanging the LSDB (6:26)
Synchornize LSDB- Best Route (4:57)
Maintaining Neighbors - LSDB (7:36)
OSPF -Tables (2:31)
OSPF COnfiguration- Single Area
OSPF - Wild Card Mask (9:14)
OSPF Configuration Syntax (8:15)
OSPF Single Area - Pre-Requiste (2:30)
OSPF Single Area-Configuration (7:00)
OSPF - Single Area- Verification (8:52)
OSPF - Advertisement Example (4:07)
OSPF Metric - Cost
OSPF Metric - COst (5:59)
Calculate Best Routes - OSPF (5:48)
Changing Interface Bandwidth (5:49)
Default Reference BW- LImitiations (1:25)
Manual Cost (3:49)
Auto-Cost Reference BW (6:04)
OSPF Areas
OSPF Single Area - Limitations (7:13)
Multiple Areas (7:05)
MUlti-Ares -Design Rules (14:31)
Multi-Area - Configurations (5:05)
LAB - Mutl-Area- Configuration (11:51)
OSPFv2 Interface SubCommands (9:33)
OSPF Network Types
OSPF Network Types (7:29)
OSPF Broadcast Networks- DR-BDR (9:40)
DR-BDR - ELections (9:12)
OSPF DR-BDR - Lab (12:48)
OSPF Point to Point LInks (8:52)
Default Routes - OSPF
OSPF Default Routes Advertisements (3:32)
Advertiing Default Routes -IGP (8:45)
OSPF Default Route- LAB (12:54)
OSPF Default Routes - Options (9:52)
Redistribution - CCNP
RIPv2 - EIGRP Redistribution (17:34)
Redistribution -Overview (12:32)
RIPv2 - OSPF Redistribution (16:35)
OSPF Different Process - Redistribution (13:03)
Border Gateway Protocol
BGP Autonomous system Number (8:10)
IGP - EGP Routing Protocols (3:30)
Border Gateway Protocol -BGP (8:19)
BGP -When to use-When not to use (8:22)
ISP Connection Types (5:13)
BGP route Exchange with ISP (8:29)
BGP Neighbors - Internal-External
IBGP neighbors - Configuration (16:00)
Internal BGP - External BGP (4:27)
BGP Split Horizon Rule (8:24)
BGP Split horzon rule - Full mesh Neighbors (5:36)
IBGP using Loopbacks (9:11)
IBGP loopbacks Configuration (14:46)
IBGP Update Source Loopback (11:18)
EBGP Neighbors -Configuration (5:42)
BGP Next-Hop-Self (18:52)
BGP Attributes
As-Path Attribute (7:29)
BGP Attributes (8:18)
Next-Hop Attribute (2:16)
Origin Attribute (4:13)
Show ip bgp - output (7:36)
Weight Attribute (7:19)
Verify Weight Attribute - LAB 1 (11:24)
Weight - using Route-maps (18:05)
Local Preference Attribute (9:51)
Local Prefernce- LAB 1 (8:21)
Local Preference- LAB 2 (8:18)
Inbound vs Outbound (7:04)
BGP Path Selecttion Steps (13:31)
Routing - Fortigate Firewall
Static Default Routing-Internet (5:57)
OSPF Routing - LAN (8:38)
Advertising Default Routes - OSPF (7:39)
RIPv2 Routing - DMZ3 (8:27)
OSPF Routing - DMZ4 (9:28)
Firewall - BGP Routing (6:43)
BGP-Routing - Redistribution (14:10)
Network Address Translation - NAT
Public-Private IP (5:14)
What is NAT (7:55)
Why do we need NAT (6:33)
NAT Types (11:39)
Firewall Policy - NAT Rules - Fortigate
Dynamic NAT - Security Policy LAN - INTERNET (12:26)
Rule1- LAN-Internet-Allow Fortigate (13:16)
Static NAT - Fortigate (18:37)
Static PAT - Fortigate (7:13)
Policy NAT-Manual NAT (28:59)
Firewall Policies -Rules Zones Objectgroups Action
Firewall Policies - Rules (5:43)
Firewall Security Zones (5:18)
Firewall objects-groups (7:23)
Firewall Actions -permit block monitor (7:17)
Firewall Policies - Source Destination Address
Rule-1 LAN-Internet-Allow (7:08)
Rule-1 LAN-Internet-Allow Configuration (8:54)
Rule1- LAN-Internet-Allow Fortigate (13:16)
Rule 2 INTERNET_DMZ3_SERVERS (4:13)
Rule 2 INTERNET_DMZ3_SERVERS Config (5:21)
Rule 3 - LAN-to-DMZ-Servers (4:45)
LAN-to-DMZ-Servers - Configuration (9:14)
Rule4-DMZ-to-Internet (5:01)
Rule4-DMZ-to-Internet Configuration (7:03)
Rule5- DMZ3-to-DMZ4 (3:30)
Rule5- DMZ3-to-DMZ4 Configuration (5:02)
Rule6 -DENY_LAN_DMZ3 (5:00)
Rule6 -DENY_LAN_DMZ3 Configuration (8:59)
Rule7 -Implicit-Deny-All (4:17)
Rule7 -Implicit-Deny-All Configuration (3:59)
Fortigate Policies - Ports Services
Rule1-Services LAN to INTERNET (6:24)
Policies -Service ports (9:52)
Ports-Services - Fortigate RULE1 - LAN to INTERNET (7:55)
Services Rule2-Internet to DMZ3 (5:53)
Fortigate Ports-Services - Rule 2 - INTERNET to DMZ (3:33)
Services Rule3-LAN to DMZ (3:58)
Firewall Policies Ports-Services - Rule 3 - LAN to DMZ (4:00)
Services Rule4- DMZ to Internet (4:13)
Firewall Policies Ports-Services - Rule 4 - DMZ to INTERNET (2:16)
Services Rule5- DMZ to DMZ (3:17)
Firewall Policies Ports-Services - Rule 5 - DMZ to DMZ (2:43)
Services Rule5- LAN to DMZ Deny (3:36)
URL Filtering - Fortigate Firewall
URL Filtering-Block Categories (11:06)
Firewall URL Filtering (22:03)
URL Filtering-Allowed Categories (6:05)
Custom URL Filtering - Fortigate (8:58)
Custom URL Filtering - Fortigate - ALlowed (6:50)
Fortigate Policies - Applications
Application Filtering-Firewalls (6:10)
Application Filtering-How it works (7:10)
Application Filtering-Examples (6:40)
Application Filtering-Allowed List (7:18)
Application Filtering-Allowed List -22 (1:22)
Application Filtering - Fortigate (10:36)
Geolocation Based Filtering
Geolocation Based Filtering (12:19)
Geolocation Based Filtering-Benifits (4:07)
Geolocation Based Filtering-Rule1 (6:56)
Geolocation Based Filtering-Rule1 - Fortigate (9:08)
Geolocation Based Filtering-Rule2 (2:41)
Geolocation Based Filtering-Rule2 - - Fortigate (5:40)
Geolocation Based Filtering-Rule3 (4:04)
Geolocation Based Filtering-Rule4 (2:13)
High Availablty Concepts
Understanding High Availability (HA) (12:30)
High Availability - Network (16:03)
High Availability-Switches (16:03)
High Availability-Firewalls (7:29)
High Availability-Servers (6:51)
High Availability-Summary (15:46)
High Availability-Best Practices (8:44)
HA in Firewalls (8:39)
HA Firewall Concepts (10:25)
HA - FIrewall Vendors (4:21)
High Availablty - Firewalls
High Availablity - Modes (8:12)
HA - Firewalls HA - (7:08)
High Availablity - Ports (7:00)
High Availablity - HearBeat (11:25)
High Availablity - Failover Trigger (10:30)
High Availablity - Config Sync (7:18)
High Availablity - Session Sync (13:17)
HA Link Path Monitoring (6:51)
Cryoptography
What is Cryptography (3:40)
Goals of Cryptography (3:47)
What is Hashing and How it works (2:56)
Hashing Drawbacks (2:15)
Hashing with HMAC (3:16)
What is Encryption - Decryption (1:53)
Encryption Algorithms - Symmetric vs Assymetric (5:26)
Cryptanalysis - Attacks (4:23)
Assymetric Encryption - Drawbacks (3:13)
Public Key Infrastructure (4:16)
VPN-Basics
VPN-Introduction (5:09)
VPN Types (3:49)
VPN Logical Topologies (1:25)
VPN Default Lab Setup- Routers (5:22)
VPN Default Topology - IOU - GNS3 (11:49)
About IPSEC
IPsec Security Services (6:53)
what is ipsec (2:48)
IPsec Modes - Tunnel vs Transport (5:29)
IPSec Site to site VPN
Step-1 Interesting Traffic Configuration (3:02)
How IPsec VPN works (5:19)
Step-2 IKE Phase-1 (7:36)
Step-3- IKE - Phase 2 (8:30)
IKE Phase -2 Configuration- Verification (6:56)
IPSEC VPN - With NAT (12:43)
IPSEC VPN - Dynamic IP Remote Site (16:45)
IKEv1 Phase 1-2 - Modes-Messages
IKE Phases -Modes (1:57)
IKE Phase 1 - Main Mode (5:47)
IKE Phase 1 - Aggressive Mode (8:12)
Phase1 - Agressive vs Main Mode (1:11)
IKE Phase 2 - Main Mode (8:12)
IPSEC VPN - LImitations (5:00)
IKEv2- Foundations
IPSEC KEv2 (8:47)
IKEv1 vs IKEv2 (13:47)
IKEv2 - Phase 1-IKE-SA_INIT_AUTH (12:22)
IKEv2 - Phase 2 - CHILD SA (7:02)
IKEv2 - Platform Support (4:16)
IKEv2 - Supported VPNs (4:56)
IKEv2-SIte-Site VPN
IKEv2- Site-Site VPN -Lab Setup (5:05)
IKEv2 -Site-Site VPN - Proposals (12:04)
IKEv2 -Site-Site VPN - Policy (8:32)
IKEv2 -Site-Site VPN - KeyRing (10:25)
IKEv2 -Site-Site VPN - Profile (7:23)
IKEv2 -Site-Site VPN - IPSec (7:09)
IKEv2 -Site-Site VPN - Verification (4:36)
SSL VPN-OVerview
What is SSL - TLS (3:06)
Remote Access VPN (2:32)
How SSL-TLS Works (7:53)
What is SSL VPN (4:17)
SSL VPN Modes (6:02)
Fortigate VPN
Site Site VPN - Lab Setup - Fortigate (16:32)
Site Site VPN - Config- Fortigate (11:31)
Teach online with
HA in Firewalls
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock