I've inheritated a Fortigate Firewall at work - certainly not my first choice of a firewall!
Anyway I've been reading up on what it can and can't do, but quick question.
Can it host a non-authoritive DNS server and can it act as a NTP server?
I think the answer is yes to the first question, but not to the next.
Basically looking at killing off lots of bad firewall rules. DCs, going to the internet for NTP, DNS and so forth. I don't like that. Would rather the firewall did it and get a linux server up and running for NTP. Minimise LAN/wintel exposure etc.
Shame they've only got one firewall too, I asked what they were using for the 2nd layer and got a blank look of why would we want to do that
I suppose could look at Pfdefence is it?
ESX servers multi homed too
LAN and DMZ - nice bridge over the firewall in my view. I've told them ESXi and move DMZ VMs onto it (oh but we have to pay for that - err no not a standalone ESXi server!)
Anyway I've been reading up on what it can and can't do, but quick question.
Can it host a non-authoritive DNS server and can it act as a NTP server?
I think the answer is yes to the first question, but not to the next.
Basically looking at killing off lots of bad firewall rules. DCs, going to the internet for NTP, DNS and so forth. I don't like that. Would rather the firewall did it and get a linux server up and running for NTP. Minimise LAN/wintel exposure etc.
Shame they've only got one firewall too, I asked what they were using for the 2nd layer and got a blank look of why would we want to do that

I suppose could look at Pfdefence is it?
ESX servers multi homed too

Last edited: