Fortigate - enable e-mail as a two-factor authentication for a user and increase token timeout

I'll say outright that FortiToken (be it a mobile app or a physical token) is the most secure and preferable way today for multi-factor authentication. The other two - SMS message and e-mail message are vulnerable to many attacks, including not so technically sofisticated SIM swapping. But sometimes less secure method …



Fortigate CLI command alias to create shortcuts and save time

Fortigate CLI commands can be long, like really long. And it is no fun to get an error running a command of 6 words because of the typo! The solution to this is simple - command aliases. Coming from the Cisco world I got used to creating command aliases as a …



What GEO location database Fortinet products are using?

This is the easiest question I got asked about the Fortigate/FortiWeb/etc. The GEO location database provider for all the Fortinet products has been the same for many years - it is Maxmind.com. Follow me on https://www.linkedin.com/in/yurislobodyanyuk/ not to miss what I publish on …



Fortigate has iperf client for traffic testing built in, here are all the details

Starting with the FortiOS 5.x Fortinet have a built-in iperf3 client in Fortigate so we can load test connected lines. If new to iperf, please read more here iperf.fr. iperf in Fortigate comes with some limitations and quirks, so let's have a better look at them: - The version …



MRV Optiswitch OS904 OS906 OS912 debug and diagnostic commands

MRV Communications (acquired in 2017 by ADVA Optical Networking) is an Israeli company known for their optical network equipment, most notably their Optiswitch Carrier Ethernet Switch series. The switches (OS904, OS906G, OS912) are not available for purchase from them anymore, but if you work for a telco company, you surely …



Fortigate ssh access with public key authentication

Entering each time username and password isn’t fun when doing it daily to the same equipment. Saving password in some automated script (Paramiko, Expect, etc) is not very secure per se. Using the SSH private/public key pair, on the other hand, answers all the needs – easy, secure, time …



HIEW tutorial hexadecimal editor part 6 using HEM modules

Commands used in the video: Command Action F11 To open dialog window displaying the list of available on this PC modules F9 Unload previously loaded module, making it inactive Enter Once pointing on the highlighted module pressing Enter loads and runs it See also other posts in the series: Part …



Checkpoint How to use R80.10 API for Automation and Streamlined Security webcast main points

Just took part in the webcast by Checkpoint How to use R80.10 API for Automation and Streamlined Security and here are some thoughts about it. API is all about working with Management server (but read on) We can set some things on a firewall Gateway as well via API …



HIEW tutorial hexadecimal editor part 5 using Crypto module to program a keygen

Commands used in the video: Command Action F3 + F7 Open the Crypto window to start entering ASM commands to be run by HIEW on the file contents Ctrl + F7 Re-open the Crypto window to change the commands F7 Apply the entered commands to the data at the current cursor position …



HIEW tutorial hexadecimal editor part 3 Navigation

Commands used in the video: Commands Action F8 + F5 jump to the Entry Point in the program. Shift + "+" Add a bookmark at the current cursor position. Alt + 1 / Alt + 2 / Alt + nn Jump to the 1st, 2nd , nn-th bookmark. Alt + "-" Remove the bookmark at the current position. Alt + 0 Remove …