<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Thu, 09 Apr 2026 19:03:05 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/@hashem-s/rss" rel="self" type="application/rss+xml"/><item><title><![CDATA[How to make VDOM IN FORTIGATE]]></title><description><![CDATA[In previous post we practice to make a firewall clustering with to different instance of Fortigates. In this post i want to describe how to make virtual firewall On this scenario. virtual firewall in Fortigaes]]></description><link>http://direct.ecency.com/fortigate/@hashem-s/how-to-make-vdom-in-fortigate</link><guid isPermaLink="true">http://direct.ecency.com/fortigate/@hashem-s/how-to-make-vdom-in-fortigate</guid><category><![CDATA[fortigate]]></category><dc:creator><![CDATA[hashem-s]]></dc:creator><pubDate>Mon, 24 Jul 2017 07:56:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/FxX5caie56yqUbvo2DTJv1i6qm8z4ixTabBTrjodKSK8t9zDEhbgjo3b7ZSqBZ7yTWButrjhMfGNrNb67d3mKCLFK7VjdCYAE2ci2v9rSwYJ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[FORTIGATE HA AND VIRTUAL CLUSTER CONFIGURATION]]></title><description><![CDATA[FORTIGATE HA AND VIRTUAL CLUSTER CONFIGURATION In this document we describe how to cluster two Fortigate devices and then make virtualization in this cluster with VDOMS and then making virtual cluster]]></description><link>http://direct.ecency.com/fortigate/@hashem-s/fortigate-ha-and-virtual-cluster-configuration</link><guid isPermaLink="true">http://direct.ecency.com/fortigate/@hashem-s/fortigate-ha-and-virtual-cluster-configuration</guid><category><![CDATA[fortigate]]></category><dc:creator><![CDATA[hashem-s]]></dc:creator><pubDate>Sun, 16 Jul 2017 13:19:39 GMT</pubDate><enclosure url="https://images.ecency.com/p/FxX5caie56yqUbvo2DTJv1i6qm8z4ixTabBTrjod81TaYLgkcsoE5Fmiw7dsEpq9krv6LFZSnjEtp83xBWQgBuJLAmHt7GfLGjDfgQskfwWW?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[STATIC NAT WITH ROUTE-MAP]]></title><description><![CDATA[You are familiar with NAT technology. NAT help you to change IP address field in layer 3 header. In almost documents you have read that static NAT makes one to one mapping between inside local IP address]]></description><link>http://direct.ecency.com/network/@hashem-s/static-nat-with-route-map</link><guid isPermaLink="true">http://direct.ecency.com/network/@hashem-s/static-nat-with-route-map</guid><category><![CDATA[network]]></category><dc:creator><![CDATA[hashem-s]]></dc:creator><pubDate>Tue, 11 Jul 2017 04:38:42 GMT</pubDate><enclosure url="https://images.ecency.com/p/2923mN3pnd7PrxqAS8My84z8QnDpEsSBnKFsBYXvnbP6DqVP3sy42BGXVwrg2R8yS4ZRMwSoKuPAYG8VJALRLKtuwiEoJJHQBqvSG9YAuEGYox?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Zone Based Firewalling (ZBF)]]></title><description><![CDATA[Zone-Based Policy Firewall changes the firewall configuration from the older interface-based model to a more flexible, more easily understood zone-based model. Interfaces are assigned to zones, and inspection]]></description><link>http://direct.ecency.com/security/@hashem-s/zone-based-firewalling-zbf</link><guid isPermaLink="true">http://direct.ecency.com/security/@hashem-s/zone-based-firewalling-zbf</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[hashem-s]]></dc:creator><pubDate>Thu, 29 Jun 2017 13:30:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/8SzwQc8j2KJb4ARrxQxCjX4jizub4U5CAK3WwB89uq73xtZ5AcokEuRuuF1EVmtnwpMWnvEvSAyxSvemyL1sQFHDXHC5JdT24KLdUyyGZbp5HfVNiJ2?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Networking Security Concepts]]></title><link>http://direct.ecency.com/security/@hashem-s/networking-security-concepts</link><guid isPermaLink="true">http://direct.ecency.com/security/@hashem-s/networking-security-concepts</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[hashem-s]]></dc:creator><pubDate>Thu, 29 Jun 2017 10:01:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/2923mN3pnd7PrxqAS8My84z8QnDpEsSBnKFsBYXvo8oU5E9X47c4MApTXPJ9bvGttVrQfyK6k11JPXbCAFTXJQQXZuShq5zVta5N9q1AA9QbRx?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Social Engineering Tactics AND Defenses]]></title><description><![CDATA[Social Engineering Tactics: Phishing: Phishing elicits secure information through an e-mail message that appears to come from a legitimate source such as a service provider or financial institution. The]]></description><link>http://direct.ecency.com/security/@hashem-s/social-engineering-tactics-and-defenses</link><guid isPermaLink="true">http://direct.ecency.com/security/@hashem-s/social-engineering-tactics-and-defenses</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[hashem-s]]></dc:creator><pubDate>Thu, 29 Jun 2017 09:54:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/8SzwQc8j2KJb4ARrxQxCjX4jizub4U5CAK3WwB89uq73xtZ5AcokEuRuuF1EVmtnwpMWnvEvSAyxSvemyL1sQFHDXHC5JdT24KLdUyyGZbp5HfVNiJ2?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How you can monitor live sessions in Fortigates firewalls via CLI]]></title><description><![CDATA[In previous post I have explained how to monitor traffic logs. Now i want to guide you how to monitor live sessions in Fortigate firewalls. live sessions or in other word states are made when 3-way hand]]></description><link>http://direct.ecency.com/fortigate/@hashem-s/how-you-can-monitor-live-sessions-in-fortigates-firewalls-via-cli</link><guid isPermaLink="true">http://direct.ecency.com/fortigate/@hashem-s/how-you-can-monitor-live-sessions-in-fortigates-firewalls-via-cli</guid><category><![CDATA[fortigate]]></category><dc:creator><![CDATA[hashem-s]]></dc:creator><pubDate>Thu, 29 Jun 2017 09:23:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/8SzwQc8j2KJb4ARrxQxCjX4jizub4U5CAK3WwB89uq73xtZ5AcokEuRuuF1EVmtnwpMWnvEvSAyxSvemyL1sQFHDXHC5JdT24KLdUyyGZbp5HfVNiJ2?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How you can monitor traffics logs in fortigate CLI]]></title><description><![CDATA[if you want to monitor traffic logs in a Fortigate firewall via CLI you can use following commands: FG # execute log display when you execute this command your firewall display you firs 10 ( by default]]></description><link>http://direct.ecency.com/fortigate/@hashem-s/how-you-can-monitor-traffics-logs-in-fortigate-cli</link><guid isPermaLink="true">http://direct.ecency.com/fortigate/@hashem-s/how-you-can-monitor-traffics-logs-in-fortigate-cli</guid><category><![CDATA[fortigate]]></category><dc:creator><![CDATA[hashem-s]]></dc:creator><pubDate>Thu, 29 Jun 2017 08:43:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/8SzwQc8j2KJb4ARrxQxCjX4jizub4U5CAK3WwB89uq73xtZ5AcokEuRuuF1EVmtnwpMWnvEvSAyxSvemyL1sQFHDXHC5JdT24KLdUyyGZbp5HfVNiJ2?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Take Suggestion about Network Articles]]></title><description><![CDATA[Dears. I have started to share my experiences about Networking and Security in this site. Please inform me and about your hobbies in these fields and ask me your questions. I would try to post your answers]]></description><link>http://direct.ecency.com/network/@hashem-s/take-suggestion-about-network-articles</link><guid isPermaLink="true">http://direct.ecency.com/network/@hashem-s/take-suggestion-about-network-articles</guid><category><![CDATA[network]]></category><dc:creator><![CDATA[hashem-s]]></dc:creator><pubDate>Thu, 29 Jun 2017 08:20:21 GMT</pubDate></item></channel></rss>