Fortigate CLI commands can be long, like really long. And it is no fun to get an error running a command of 6 words because of the typo! The solution to this is simple - command aliases. Coming from the Cisco world I got used to creating command aliases as a …
This is the easiest question I got asked about the Fortigate/FortiWeb/etc. The GEO location database provider for all the Fortinet products has been the same for many years - it is Maxmind.com. Follow me on https://www.linkedin.com/in/yurislobodyanyuk/ not to miss what I publish on …
Starting with the FortiOS 5.x Fortinet have a built-in iperf3 client in Fortigate so we can load test connected lines. If new to iperf, please read more here iperf.fr. iperf in Fortigate comes with some limitations and quirks, so let's have a better look at them: - The version …
MRV Communications (acquired in 2017 by ADVA Optical Networking) is an Israeli company known for their optical network equipment, most notably their Optiswitch Carrier Ethernet Switch series. The switches (OS904, OS906G, OS912) are not available for purchase from them anymore, but if you work for a telco company, you surely …
Entering each time username and password isn’t fun when doing it daily to the same equipment. Saving password in some automated script (Paramiko, Expect, etc) is not very secure per se. Using the SSH private/public key pair, on the other hand, answers all the needs – easy, secure, time …
Commands used in the video: Command Action F11 To open dialog window displaying the list of available on this PC modules F9 Unload previously loaded module, making it inactive Enter Once pointing on the highlighted module pressing Enter loads and runs it See also other posts in the series: Part …
Just took part in the webcast by Checkpoint How to use R80.10 API for Automation and Streamlined Security and here are some thoughts about it. API is all about working with Management server (but read on) We can set some things on a firewall Gateway as well via API …
Commands used in the video: Command Action F3 + F7 Open the Crypto window to start entering ASM commands to be run by HIEW on the file contents Ctrl + F7 Re-open the Crypto window to change the commands F7 Apply the entered commands to the data at the current cursor position …
Commands used in the video: Commands Action F8 + F5 jump to the Entry Point in the program. Shift + "+" Add a bookmark at the current cursor position. Alt + 1 / Alt + 2 / Alt + nn Jump to the 1st, 2nd , nn-th bookmark. Alt + "-" Remove the bookmark at the current position. Alt + 0 Remove …
Commands used in the video: Command Action F3 + F8 Set the XOR ASCII/Hex string to be used as a key to XOR with the file data F8 Apply 1 step of XOR operation to the data at the current cursor position. cryptopals.com challenge Challenge used as an example …