• Jul, Sun, 2023

The Power of Real-Time Threat Maps

Boost Security with Live Cyber Threat Maps

As technology evolves rapidly, so do the methods of digital warfare. In the ever-growing world of cybersecurity, accessibility to real-time threat maps has become essential. These dynamic tools not only visualize the stunning depth and breadth of global cyber threats but also provide crucial insights to repel attacks better and enhance system protections. One excellent example is Kaspersky’s real-time threat map, an exciting cocktail of features like OAS (On Access Scan), ODS (On-Demand Scan), MAV (Mail Antivirus), WAV (Web Antivirus), and more , providing a birds-eye view on the activity in the cyber world.

Numerous organizations today, offering antivirus, anti-malware, and an array of other products, serve as the frontline defense in this seemingly endless cyber warfare. As these devices tirelessly scan, protect, and report anomalies, they fuel the cloud with potent insights. These invaluable snippets of digital intelligence enable the companies to continually refine their security posture, fortification dynamics, and of course, their products’ efficiency, promising unprecedented security for their customers.

Dynamic threat maps are not only about influencing cybersecurity efforts; they also serve to entertain and educate individuals about the severity and intricacies of the digital threat landscape. Kaspersky’s online threat map, accessible here wonderfully epitomizes this claim. An immersive experience, the map displays different types of attacks ranging from botnets, intrusions, and vulnerabilities, the regions they emanate from, and their respective destinations. Plus, the user-friendly interface allows you to interact, learn, and effectually negate these threats from your devices.

Kasper Live Cyber Threat Maps

Similarly, yet uniquely, Bitdefender’s threat map (available at threatmap.bitdefender.com) emerges as another robust platform to track and understand cyber threats. Displaying a captivatingly animated, real-time threat map, Bitdefender lets you monitor, in all its realistic glory, the incidents of attacks and infections happening around the globe. It’s like having your personal watching tower, providing an eagle’s view of the digital battle unfolding worldwide.

Bitdefender Live Cyber Threat Maps

In conclusion, these real-time threat maps provide a compelling, engaging, and enlightening perspective into the universe of cyber threats. Whether you’re a cybersecurity enthusiast, an industry professional, or an organization seeking to improve its defenses, these threat maps are invaluable tools in countering the digital menace threatening our connected world. With the likes of Kaspersky and Bitdefender at the forefront, these real-time maps stand as the symbolic embodiments of our collective efforts to confront and dismantle the cyber threats looming large over the horizon.

  • Jun, Fri, 2022

FortiGate Local User & Group Authentication

Authenticating Local Users and Groups with FortiGate

Local User and Groups Authentication in FortiGate FW

FortiGate local user and group authentication is a powerful security feature that can help protect your network from unauthorized access. It allows you to create and manage local user accounts and groups, and assign them specific privileges and access rights. This ensures that only authorized users can access your network resources and that they can only do so in accordance with your security policies.

By using FortiGate local user and group authentication, you can ensure that only authorized users can access your network resources, and that they can only do so in accordance with your security policies. This helps to protect your network from unauthorized access and ensures that your data remains secure.

 

Create Local Users LocalUser01 and LocalUser02

FortiGate Local User & Group Authentication
Create two local users02
Create two local users03
Create two local users04

Create a local group called LocalGroup01 and add both users to it.

Create two local users05
Create two local users06
Create two local users08
Create two local users09

Click on the Firewall Policy rule, then click Source. Additionally, any user must be a member of the local group created in order to allow traffic (HTTP, HTTPS, SSH, FTP) through the Firewall after providing the correct username and password.

Create two local users10

On the client machine, the IP address is 10.10.0.13 (DHCP enabled on FW) and the GW is 10.10.0.1 (FW itself).

FortiGate will check its internal database to confirm the identity of the user.

Create two local users11

If you try to access a website, you may be prompted to provide authentication.

Create two local users12

In Dashboard > Users and Devices, it’s showing a firewall user.

Create two local users13

You can select that user and click on de-authenticate which will force that user next time to re-authenticate to gain internet access.

Create two local users14

  • May, Tue, 2022

FortiGate Block Malicious URLs using IPS

​Using IPS to Block Malicious URLs on FortiGate (Photos)

diagram

Implementing IPS Profiles to Block Malicious URLs on Fortigate Firewall

Client IP address

Preventing Outbound Traffic to a Malicious URL by Dropping it at the FortiGate Firewall

1- Create an intrusion prevention profile.

2- Attach it to the firewall policy that is allowing the traffic from internal to external.

clone default profile
name it

Remove Signatures to Block Malicious URLs

delete existing signatures
enable it

The IPS profile is not associated yet with any firewall policies. 

IPS profile not associated.
attach it

Testing the client with Malicious URL.

testing the client
testing the client_2

This article provides an overview of how to configure RIP routing on a Fortigate firewall. It covers the basics of RIP routing, how to configure RIP routing on a Fortigate firewall, and how to troubleshoot any issues that may arise. It also provides some tips on how to optimize RIP

 

  • May, Tue, 2022

Step-by-Step Guide to Configuring RIP Routing on FortiGate

What steps are needed to set up RIP routing on a FortiGate device (with Photos)?

network1

Dynamic routing protocols are used to automatically exchange routing information between routers in a network. They are used to find the best path for data to travel from one network to another. Examples of dynamic routing protocols include Open Shortest Path First (OSPF), Border Gateway Protocol (BGP), Enhanced Interior Gateway Routing Protocol (EIGRP), and Routing Information Protocol (RIP).

RIP (Routing Information Protocol) is a network routing protocol used to determine the best path for data to travel across a network. It is used to exchange routing information between routers and is supported by most modern devices. Version 1 and Version 2 of RIP are the two versions available, with Version 2 being the most widely used.

If you have an older device that only supports RIP, you may want to consider using RIP as your dynamic routing protocol.

In RIP routing, each device will broadcast information about the networks connected to its interfaces to its neighboring devices.

FW1 is going to advertise 10.10.0.0/16 Network.

FW2 is going to advertise 10.10.0.0/16 and 10.20.0.2/16.

FW2 RIP Networks
FW1 RIP Networks 1

click on Dashboard > Network > Routing

RIP on FW1

on FW2 >  configure static route

static route FW2
FW2 interfaces
FW2 ping

ping 8.8.8.8 from PC03

PC ping

Follow these steps to configure RIP on a Fortigate Firewall.

  1.  Log into the FortiGate web-based manager.
  2. Go to Network > Static Routes and select Create New.
  3. Enter a name for the route.
  4. Select RIP as the routing protocol.
  5. Enter the destination network and subnet mask.
  6. Enter the gateway IP address.
  7. Select the interface that will be used for the route.
  8. 8. Select the administrative distance for the route.
  9. Select the metric for the route. 10. Select the RIP version.
  10. Select the RIP authentication type.
  11. Select the RIP authentication key.
  12. Click OK to save the route.
  • May, Sat, 2022

How to configure DHCP relay on FortiGate FW (Photos)

How to Configure DHCP Relay on FortiGate FW (Photos)?

  • DHCP (Dynamic Host Configuration Protocol) is a network protocol used to automatically assign IP addresses and other settings to devices on a network.

  • As networks grow, it becomes increasingly difficult to manage and configure each device manually. To address this problem, most companies use DHCP Relay instead of including a DHCP server on every subnet. By enabling DHCP relay, one DHCP server can support multiple subnets and simplify the configuration process. This helps reduce administrative overhead and allows for more efficient management of IP addresses across the network.

On windows Server 2022, install DHCP service

network1
Server IP address
Add DHCP Role
DHCP
DHCP Installed

Right-click on IPv4 and create a new scope.

new scope
1 1
2
Gateway IP
5

FW2 

Configure the interfaces (inside and outside) on Fortigate FW.

click on DHCP server > Advanced > Relay > IP address of DHCP Server (10.10.2.200).

FW2 interface_inside
FW2 interface outside
FW1 interfaces

FW2 can reach DHCP Server 10.10.0.200 which has the scope for 10.20.0.0 network.

FW2 ping DHCP Relay

on Windows 10 client machine which configured as DHCP client (Before DHCP Relay).

no IP

On Windows 10 client machine(After DHCP Relay).

with IP
kali-linux

On Kali-Linux Client

Kali IP
kali-linux on scope

PC3, 

PC3 DCHP Client
PC3
PC3 internet

Check out, configure RIP routing protocol
  • May, Sat, 2022

FortiGate VM Trial license not working

Troubleshooting a FortiGate VM Trial License: A Step-by-Step Guide to Resolving the Issue

If you have been having trouble getting a FortiGate VM Trial license to work, then you are not alone. Many users have encountered this issue and have found it difficult to resolve. Fortunately, this article will provide you with the steps necessary to get your VM Trial license working properly. We will discuss the necessary steps for activating and validating your FortiGate VM Trial license as well as troubleshooting any issues that may arise during the process. By following these instructions, you should be able to get your FortiGate VM Trial license up and running in no time.

download-vm images
select Hyper-V
new-deployment
FortiGate VM Trial license not working

Understanding the FortiGate VM Trial License Limitations

Before troubleshooting, it’s crucial to understand the limitations of the evaluation license. The FortiGate Trial license does not support HTTPS for management, which means that you would have to manage it via HTTP.

Moreover, when the Fortigate default login is used, which is the admin, no password is required. After pressing enter, the firewall system forces you to set up a new password for better security.

FortiGate_default username and password

Diagnosis: Identifying the VM License Issue

Often, the problem begins with your FortiGate VM trial license not working as expected.

To troubleshoot this, enter #execute factoryreset then type y. This action is aimed at restoring the factory settings and fixing the VM license issue.

FortiGate_FactoryReset
FortiGate Login

Setting up the initial configuration of a FortiGate Firewall.

To show the current IP address and the mode

#get system interface physical

IP_DHCP

Configuring Network Settings

Next step: switch your network configuration to static and enter the IP address manually. Use the commands below to achieve this:

#config system interface

#show

To edit (configure) certain port number

#edit port1

#set mode static

#set ip 192.168.0.135 255.255.255.0

To access the firewall through that port, you must enable HTTP (included with the evaluation license). Upgrading to the full version will give you the added benefit of accessing the firewall via HTTPS and SSH as well.

The command for this is:

#set allowaccess http ssh ping https

change IP to static
mode:static
allowaccess

Setting up Internet Access and DNS Serve

By default, the system utilizes Fortinet’s DNS servers. However, you have the flexibility to modify the DNS settings if required.

You need to set up a static default route to get an internet access route.

Network > Static Routes

By default, Fortinet’s DNS servers are being used, but you can alter the DNS settings if desired.

You can launch a new console window from the graphical user interface (GUI).

Concluding thoughts

Finally, it is important to note that a new console window can be launched from the graphical user interface (GUI) for more convenience.

In the end, while the FortiGate VM Trial license has its limitations, understanding and working around these constraints can allow you to explore the robust benefits of FortiGate VM and eventually make an informed decision about upgrading to the full version.

internet_access
DNS
console