Jump to content


  • Content Count

  • Joined

  • Last visited

  • Days Won


mashti last won the day on September 10 2016

mashti had the most liked content!

Community Reputation

1,588 Excellent

1 Follower

About mashti

  • Rank
    Microsoft TE

Profile Information

  • Gender
    Not Telling
  • Location
    Active Directory Inside

Recent Profile Visitors

1,372 profile views
  1. @jkenny, No, i have not PDF File. Regards
  2. Mybe help my Brothers 210-250-Go-And-Pass-Mashti [Hidden Content]
  3. Hi Bros, Here is new 640-916 VCE File (181Q) + VCE Player. [Hidden Content]
  4. Please share your info after exam about this Dump. Thanks
  5. Here is new CCSA VCE file with more Explanation for VCE Player 1.1.6. [hide][Hidden Content]]
  6. @gsmtech, This is my new CCSA dump and work with VCE Player 1.1.6. I tested and worked. [hide][Hidden Content]]
  7. VCE file with Explanation for VCE Player 1.1.6 coming soon
  8. What happens if the identity of a user is known? A. If the user credentials do not match an Access Role, the traffic is automatically dropped. B. If the user credentials do not match an Access Role, the system displays a sandbox. C. If the user credentials do not match an Access Role, the gateway moves onto the next rule. D. If the user credentials do not match an Access Role, the system displays the Captive Portal. Answer: C Explanation: Using Identity Awareness in the Firewall Rule Base The Security Gateway examines packets and applies rules in a sequential manner. When a Security Gateway receives a packet from a connection, it examines the packet against the first rule in the Rule Base. If there is no match, it then goes on to the second rule and continues until it matches a rule. In rules with access roles, you can add a property in the Action field to redirect traffic to the Captive Portal. If this property is added, when the source identity is unknown and traffic is HTTP, the user is redirected to the Captive Portal. If the source identity is known, the Action in the rule (Allow or Block) is enforced immediately and the user is not sent to the Captive Portal. After the system gets the credentials from the Captive Portal, it can examine the rule for the next connection. Important - When you set the option to redirect http traffic from unidentified IP addresses to the Captive Portal, make sure to place the rule in the correct position in the Rule Base to avoid unwanted behavior. In rules with access role objects, criteria matching works like this: When identity data for an IP is known: If it matches an access role, the rule is enforced and traffic is allowed or blacked based on the action. If it does not match an access role, it goes on to examine the next rule. When identity data for an IP is unknown and: All rule fields match besides the source field with an access role. The connection is http. The action is set to redirect to the Captive Portal. If all the conditions apply, the traffic is redirected to the Captive Portal to get credentials and see if there is a match. If not all conditions apply, there is no match and the next rule is examined. Note - You can only redirect http traffic to the Captive Portal.
  9. Which of the following firewall modes DOES NOT allow for Identity Awareness to be deployed? A. Bridge B. Load Sharing C. High Availability D. Fail Open Answer: D Explanation: Getting Started With Identity Awareness - Deployment Identity Awareness is commonly enabled on a perimeter Security Gateway. It is frequently used in conjunction with Application Control. To protect internal data centers, Identity Awareness can be enabled on an internal Security Gateway in front of internal servers, such as data centers. This can be in addition to on the perimeter Security Gateway but does not require a perimeter Security Gateway. Identity Awareness can be deployed in Bridge mode or Route mode. In Bridge mode it can use an existing subnet with no change to the hosts' IP addresses. In Route mode the Security Gateway acts as a router with different subnets connected to its network interfaces. For redundancy, you can deploy a Security Cluster in Active-Standby (HA) or Active-Active (LS) modes. Identity awareness supports ClusterXL HA and LS modes. If you deploy Identity Awareness on more than one Security Gateway, you can configure the Security Gateways to share identity information. Common scenarios include: Deploy on your perimeter Security Gateway and data center Security Gateway. Deploy on several data center Security Gateways. Deploy on branch office Security Gateways and central Security Gateways. You can have one or more Security Gateways acquire identities and share them with the other Security Gateways. You can also share identities between Security Gateways managed in different Multi-Domain Servers.
  10. When using LDAP as an authentication method for Identity Awareness, the query: A. Requires client and server side software. B. Prompts the user to enter credentials. C. Requires administrators to specifically allow LDAP traffic to and from the LDAP Server and the Security Gateway. D. Is transparent, requiring no client or server side software, or client intervention. Answer: D Explanation: Getting Started With Identity Awareness AD Query AD Query is an easy to deploy, clientless identity acquisition method. It is based on Active Directory integration and it is completely transparent to the user. The AD Query option operates when: An identified asset (user or computer) tries to access an Intranet resource that creates an authentication request. For example, when a user logs in, unlocks a screen, shares a network drive, reads emails through Exchange, or accesses an Intranet portal. AD Query is selected as a way to acquire identities. The technology is based on querying the Active Directory Security Event Logs and extracting the user and computer mapping to the network address from them. It is based on Windows Management Instrumentation (WMI), a standard Microsoft protocol. The Security Gateway communicates directly with the Active Directory domain controllers and does not require a separate server. No installation is necessary on the clients or on the Active Directory server.
  11. Here is VCE File, work with VCE Player ver. 1.1.6 [hide][Hidden Content]]
  12. Hi, Please read this links: [Hidden Content] [Hidden Content] Here is video link: [Hidden Content] regards
  13. FortiGate Multi-Threat Security Systems. Secured Network Deployment and IPSec VPN. Student Guide (Course 301-v4.0) By Fortinet Training Services 2009 | 610 Pages | ISBN: n/a | PDF | 65 MB The Secured Network Deployment and IPSec VPN course provides a comprehensive understanding of the advanced networking and security features of FortiGate Unified Threat Management security appliances. Hands-on labs allow students to perform the tasks associated with the configuration and troubleshooting of virtual domains, routing, WAN optimization, high availability, IPS, authentication and IPSec VPNs. This course demonstrates features that can be easily adapted when planning a secure network deployment using FortiGate Unified Threat Management appliances. Upon completion of this course, students will be able to: Construct virtual domains and configure inter-VDOM routing. Use the built-in FortiOS diagnostic tools for troubleshooting and performance monitoring. Enable logging to a FortiAnalyzer device. Configure static and policy routing. Implement FortiGate traffic optimization techniques. Configure IPS protection to protect network resources from attack. Control access to network resources by enabling LDAP or Directory Services authentication. Debug IKE exchanges to troubleshoot connection negotiations. Create IPSec VPNs to permit client access to a FortiGate VPN gateway. Set up a high availability cluster configuration. [Hidden Content]
  14. Vincent Bumgarner, "Implementing Splunk: Big Data Reporting and Development for Operational Intelligence" English | ISBN: 1849693285 | 2013 | 448 pages | PDF, EPUB | 7 + 18 MB Learn to transform your machine data into valuable IT and business insights with this comprehensive and practical tutorial Learn to search, dashboard, configure, and deploy Splunk on one machine or thousands Start working with Splunk fast, with a tested set of practical examples and useful advice Step-by-step instructions and examples with a comprehensive coverage for Splunk veterans and newbies alike In Detail Splunk is a data collection, indexing, and visualization engine for operational intelligence. It's a powerful and versatile search and analysis engine that lets you investigate, troubleshoot, monitor, alert, and report on everything that's happening in your entire IT infrastructure from one location in real time. Splunk collects, indexes, and harnesses all the fast moving machine data generated by our applications, servers, and devices - physical, virtual, and in the cloud. Given a mountain of machine data, this book shows you exactly how to learn to use Splunk to make something useful from it. Depending on your needs, you can learn to search, transform, and display data, or learn to administer your Splunk installation, large or small. "Implementing Splunk: Big Data Reporting and Development for Operational Intelligence" will help you get your job done faster, whether you read from the beginning or jump to what you need to know today. New and experienced users alike will find nuggets of wisdom throughout. This book provides you with valuable examples and step-by-step instructions, showing you how to take advantage of everything Splunk has to offer you, to make the most out of your machine data. "Implementing Splunk: Big Data Reporting and Development for Operational Intelligence" takes you on a journey right from inception to a fully functioning implementation of Splunk. Using a real-world data walkthrough, you’ll be shown how to search effectively, create fields, build dashboards, reports, and package apps, manage your indexes, integrate into the enterprise, and extend Splunk. This practical implementation guide equips you with high-level knowledge for configuring, deploying, extending, and integrating Splunk. Depending on the goal and skills of the reader, enough topics are covered to get you on your way to dashboard guru, app developer, or enterprise administrator. This book uses examples curates reference, and sage advice to help you make the most of this incredibly powerful tool. What you will learn from this book How to write searches that are fast and lean How to create fields from your unstructured data How to enrich your data with lookups and commands How to transform your data into useful and beautiful reports How to build professional looking and informative dashboards How to make apps to organize and share your searches and dashboards How to manage configurations for one to thousands of instances How to integrate with enterprise systems How to extend Splunk with scripts and advanced configuration [Hidden Content]
  • Create New...