nTRaaS
nTRaaS
  • 63
  • 67 275
VMware VSAN + Network Engineering
Just a look at and a self conversation about VMware, VSAN, and the future of networking in the enterprise.
Переглядів: 294

Відео

Short - ISE - Device Types and Locations
Переглядів 228Рік тому
Instead of authentication policy mapping many individual devices we can add devices to device groups based on type and location!
Linux login - RADIUS and ISE and AD
Переглядів 1,4 тис.Рік тому
Ubuntu server, Cisco ISE 2.7, Active Directory. In this video we talk about installing freeradius on Ubuntu, configuring ISE as a radius authentication and authorization source, authenticating local ISE users/Active Directory users based on group membership, and how to remove the need to enter a password when using the SUDO command.
1 - Firepower 1010 unbox and Discuss
Переглядів 833Рік тому
In this video I unbox a Firepower 1010 Appliance, discuss initial setup and configuration. Talk a little bit about Ubiquiti, Firepower HA (High Availability), and the differences between 6.6.1 and 7.3.0.
Travel Router - Firewalla Purple
Переглядів 1,7 тис.2 роки тому
Just a quick look at resetting an existing Firewalla configuration, configuring the travel router from scratch. We will create a wireless LAN and a Wireless WAN, WLAN and WISP, connection allowing us to have both wired and wireless access to your internal devices as well as multiple internet connections.
Travel Router - TP-Link
Переглядів 4,8 тис.2 роки тому
With all the talk about the Firewalla and it's abilities, here's an alternative that I've used for years to make sure my devices are network protected when visited anywhere with shared networks. I would like to iterate, Firewalla and it's VPN solution is probably the best option but on the cheap this is a great travel router.
Firewalla and Ubiquiti Remote Access VPN - VPN Server
Переглядів 1,9 тис.2 роки тому
Let's talk about Remote Access VPNs (RAVPN) and see how easy it is create using an iPhone. OpenVPN, WireGuard, and a little Cisco AnyConnect
Firewalla - How it's going after a few weeks running
Переглядів 16 тис.2 роки тому
This is the last video in the Firewalla Gold series, keep in tune for the purple and the VPN videos!
Talking about Ubiquiti and unboxing!
Переглядів 1662 роки тому
I'll be discussing the Ubiquiti UDM Pro router/gateway, the Switch pro 48 port PoE, the Switch 28 port SFP , a voip phone, and a wireless access point. In a future video we'll look at the setup/implementation of voice, wireless, and networking...
A Little talk about storage, RAID types, and other thoughts!
Переглядів 492 роки тому
We all need to know about RAID types and what we need storage for. This video is an initial basis for my next video showing the QNAP NAS appliance and created RAID groups on that device. I hope you enjoy!
Firewalls and dynamic routing…
Переглядів 712 роки тому
I realize that BGP, and others depending, may be good to have for WAN/MAN access. Such as advertising to a service provider (ISP); otherwise, I’ve never configured dynamic routing on a firewall before….
This video is not technical, it's talking about where I want to go. Please watch and share!
Переглядів 472 роки тому
@ntraas1584 has an ambitious route in front of them, we would like to see about creating a platform that can be used by everyone Pre-K-12 and GED, the thought process is to create a more inclusive and interactive environment where kids and parents can participate in education to achieve that Dream!
Firewalla - 2 - Creating a new connection, using your phone!
Переглядів 1,7 тис.2 роки тому
Firewalla - 2 - Creating a new connection, using your phone!
Firewalla - 3 - Getting Firewalla up and running using Juniper Core Switch
Переглядів 9972 роки тому
Firewalla - 3 - Getting Firewalla up and running using Juniper Core Switch
Firewalla - 1 - An Introduction to Firewalla and devices
Переглядів 4,4 тис.2 роки тому
Firewalla - 1 - An Introduction to Firewalla and devices
BGP - PBR, Weight, Local Preference
Переглядів 1462 роки тому
BGP - PBR, Weight, Local Preference
Introduction to BGP - A Series
Переглядів 1092 роки тому
Introduction to BGP - A Series
Talking about Ubiquiti - The good the bad and my network.
Переглядів 1902 роки тому
Talking about Ubiquiti - The good the bad and my network.
CCNA Series - 3 - Routers
Переглядів 502 роки тому
CCNA Series - 3 - Routers
CCNA Series - 2 - Fundamentals
Переглядів 272 роки тому
CCNA Series - 2 - Fundamentals
CCNA Series - 1 - Introduction
Переглядів 452 роки тому
CCNA Series - 1 - Introduction
ASA ASDM Versioning
Переглядів 432 роки тому
ASA ASDM Versioning
VRF Upgrade-cli
Переглядів 1472 роки тому
VRF Upgrade-cli
Cisco - Basic VRF Communication
Переглядів 632 роки тому
Cisco - Basic VRF Communication
Home Lab - vCenter Server Install
Переглядів 2542 роки тому
Home Lab - vCenter Server Install
Home Lab - Looking at Microsoft Windows Server 2022 & Installing Active Directory
Переглядів 3892 роки тому
Home Lab - Looking at Microsoft Windows Server 2022 & Installing Active Directory
Home Lab - Looking at ESXi & VM creation
Переглядів 702 роки тому
Home Lab - Looking at ESXi & VM creation
Home Lab - Installing ESXi
Переглядів 1382 роки тому
Home Lab - Installing ESXi
Home Lab - Network/Cisco - 3560cx
Переглядів 1,5 тис.2 роки тому
Home Lab - Network/Cisco - 3560cx
Home Lab - network, servers, VMs, vCenter
Переглядів 1162 роки тому
Home Lab - network, servers, VMs, vCenter

КОМЕНТАРІ

  • @michaelbrannelly2316
    @michaelbrannelly2316 2 місяці тому

    You left pout important prep steps like how to give it an IP to do the transfer. Anyhow if found it simpler to just copy the SPA file to USB and plug into the device.

  • @chinchang
    @chinchang 3 місяці тому

    Hello, thanks your training. But my lab after 3:01, my FTD is lose https(I think it is normal), show manager on FTD, always pending status. And FMC has not any log. My FMC version is 7.2.8, and FTD is 6.6.1

  • @kg5nub
    @kg5nub 4 місяці тому

    I got one of these and i would like to use the usb for a server to access it from away from the network like on the road or on a different network still no luck

  • @alphabeta-b6n
    @alphabeta-b6n 4 місяці тому

    why you have added a static route since you have a default one using the same gateway, in my case i do not have same GW and it does not work

    • @timhenderson895
      @timhenderson895 4 місяці тому

      The static route was to that network using a different gateway. As an example: route engineering to make one network go through a firewall (like policy based routing), you can also do this for failover that's interface specific using metrics.

  • @Gottigotti_yaheard
    @Gottigotti_yaheard 4 місяці тому

    My interfaces are down and I can’t get them back up

  • @Gottigotti_yaheard
    @Gottigotti_yaheard 4 місяці тому

    Best guide I've used. Straight to the point, concise but useful explanations. Great job.

  • @RussDyer
    @RussDyer 5 місяців тому

    Thanks . Working perfectly.

  • @videosuperhighway7655
    @videosuperhighway7655 8 місяців тому

    The way they operate is initial boot is Wind River Linux ------- > Then it loads the FXOS "Hypervisor/os" which then loads LINA (ASA code) which then loads the FTD (small linux distro and snort engine) Which is in parallel to ASA. All layer 4 traffic gets punted to the FTD(Snort engine) then back down to LINA and either it was dropped or it gets forwarded to the next interface. You finally have another product running in the same box called (FDM - Firepower Device manager) which replaces ASDM. There are tons of moving parts internally and lots of potential for trouble. You can order it with just ASA installed or convert from FDM/LINA to ASA.

    • @ntraas1584
      @ntraas1584 7 місяців тому

      True, the issue was: On the ASA you had two separate systems: ASA base and an FTD. Thinking back to how Cisco used to do IPS they just went the same way. The ASA license comes with the NFGW order.

  • @videosuperhighway7655
    @videosuperhighway7655 8 місяців тому

    Life tip. Order this part #FPR1010-ASA-K9 This is the model with ASA Running natively which makes it a drop in replacement to the 5506-x. You get your 2 Anyconnect premium peer licenses (which is no longer included if you get the NGFW part) Firepower Threat Defense is a major mess and its ASA and Snort with Tomcat and other stuff crunched together and its a mess.

    • @ntraas1584
      @ntraas1584 7 місяців тому

      True, but the ASA software/license comes with NGFW order. It's a few more steps but it's a good learning.

  • @samircamillo
    @samircamillo 8 місяців тому

    Very informative, thank you!

  • @ffmedic1638
    @ffmedic1638 10 місяців тому

    I would like to setup my TP-LINK AC-750 (TL-WR902AC) before my next cruise. I would like to change the names of the 2.4 and 5GHz network SSIDs, so that the name broadcast is unique to MY router.

    • @ffmedic1638
      @ffmedic1638 10 місяців тому

      Ahh...I got it! I had to go through the setup for the Hotspot and after I picked my home network, I was able to rename (and reset the password) for the 2.4 and 5GHz bands.

  • @jackslack01
    @jackslack01 10 місяців тому

    Hey thanks for your video. I have an ipad with LTE. I want to connect a nest camera in a remote location where i do not have an internet connection. Is it possible to use this router to connect the camera to the ipad that is connected to the internet via mobile data using hotspot mode? Ive tried and when i get to quick setup it cannot see my mobile hotspot. i assume this is because the wifi on the ipad is connected to the router. Is what i am trying to do even possible? Tech support cannot seem to figure it out.

  • @konman181
    @konman181 10 місяців тому

    My isp speeds are 1350 down and 250 up. If I use this will I get close to actual speeds? My Asus barely does half. Thinking about using it as an AP instead.

  • @DUNCEATRON5000
    @DUNCEATRON5000 11 місяців тому

    I installed mine today and I love it

  • @FinnyG47
    @FinnyG47 11 місяців тому

    You can do active/active. I have a LTE 1101 router that is actively peered to a ASR cluster at SiteA and SiteB at the same time. On the spoke I define two separate tunnels. Crypto ikev2 client is the HSRP address at each site of the carrier facing interface, client connect specifies which tunnel to use.

  • @traolin5877
    @traolin5877 Рік тому

    I’ve been looking for this exact type of format video, especially for Cisco setup in a home environment with detail. Pretty much nonexistent. Thanks for this!

  • @muruganm848
    @muruganm848 Рік тому

    I agree man I hate these hackers my neighbor is hacking my network but my firewalla red in dhcp mode can’t stop it the year I bought it was 2021 it became EOL 2022.

    • @dogten4006
      @dogten4006 9 місяців тому

      A neighbor hacking you is an act of war, someone might be inclined to disrupt their signal with a HERF cannon or similar deterrent.

  • @ramyan4606
    @ramyan4606 Рік тому

    👍

  • @amirianoshirvan609
    @amirianoshirvan609 Рік тому

    We can't use gigabit wire while traveling, so what should we do in the hotel?

  • @eibensl
    @eibensl Рік тому

    You could have kept your original router and put Firewalla into bridge mode between it and your internal switch. If you are running multiple subnets on your internal network, then create additional bridges on the Firewalla. My home network is set up this way and my Firewalla sees all traffic on my internal subnets. Bridge mode acts as a man-in-the-middle so doesn't NAT traffic.

    • @Placesandspaces35
      @Placesandspaces35 Рік тому

      I have above gig speed on my network so would putting the Firewalla Blue Plus in bridge mode between the router and hardwired devices would that slow my speed down or only if it is used as the gateway?

  • @HeathenHacks
    @HeathenHacks Рік тому

    Thank you!

  • @leolynch5320
    @leolynch5320 Рік тому

    Promo-SM ✅

  • @shadow8637
    @shadow8637 Рік тому

    if i have three routers at home and connect firewalla with WAN then connect those routers to it, will it be able to see all traffic from those routers? will it matter if they are set to router mode/AP mode?

  • @gxtoast2221
    @gxtoast2221 Рік тому

    Yeah, the Firewalla must be the security gateway, core, aggregation and access level all-in-one and be configured in a router-on-a-stick topology for any vlans configured on connected layer 2 access switches. This means that all inter-vlan routing must occur on the Firewalla for it to be able to apply rules to control traffic within the local network and to the internet. If you have a need to run layer 3 routing to the access layer in a multi-layer network the Firewalla won't be a good choice. The whole router-on-a-stick design required by the Firewalla means that it cannot function on high performance 10G networks. If a home runs some 10G interconnects between a couple of switches and something like a NAS the Firewalla is going to be a point of congestion.

  • @mikescott4008
    @mikescott4008 Рік тому

    I'm looking at one of these for a family member for the keep it simple aspect, they're not tech savy etc. Me I'm in the trade, so will continue to run Cisco CBS switches at home with whatever firewall I'm exploring. Been running Sophos XG for a while, but spending time with pfsense and opnsense at present.

    • @ntraas1584
      @ntraas1584 Рік тому

      Honestly…unless you want the ability to troubleshoot their issues locally, you can’t manage if no internet, then might not be necessary. If there is an internet issue, the Bluetooth troubleshooting is painful. I’ve always been a fan of buy to check out, implement and learn, so hey if you/them want to have some cool features and dashboards I’d say go for it. How do you like the Sophos XG? Im in a 50% Cisco 50% Palo shop so I pretty much stick with those at home. Anyone in IT I’d never recommend any firewall that they don’t use at work, but if they use those then cool. JMO; if you want to be seen as the expert at work, use that at home…

  • @aliancemd
    @aliancemd Рік тому

    23:14 There is also Mikrotik, which gives more control and doesn't need subscriptions and DLCs. RB5009 can be found for ~$170 and outperforms any of these devices - I think more affordable for a homelab than Cisco + cost of their DLCs.

  • @ABH-fh6tn
    @ABH-fh6tn Рік тому

    Hi, have you tried to configure one of the interfaces (inside) as a switch port trunk and associate it with multiple VLANs? I am having an issue wherein, it will work when newly configured but will stop working after reboot. I made sure that all changes are deployed. I needed to change the interface to routed and then change it back to switchport trunk to make it work but again will stop working after reboot.

  • @alldecentnamestaken
    @alldecentnamestaken Рік тому

    "This one is, of course, China". LMAO

  • @ninjarider443
    @ninjarider443 Рік тому

    google "firewalla vulnerabilities" Yikes! Not interested in something like this as my edge router/firewall

    • @ntraas1584
      @ntraas1584 Рік тому

      Take a look at Cisco vulnerabilities sometimes….

  • @ninjarider443
    @ninjarider443 Рік тому

    Is Ubiquity manufactured in china (flashed firmware, etc..)?

    • @ntraas1584
      @ntraas1584 Рік тому

      China, Vietnam, Taiwan….Pretty much everything is made in china at some point these days. You may find some one offs, like Samsung, but iPhone, Google pixel, Dell servers, computers, Cisco servers … etc. It’s an interesting thing though isn’t it, we use china to keep manufacturing costs low but now we’re all worried about “what are they doing.”

  • @ninjarider443
    @ninjarider443 Рік тому

    Great video - outstanding work compared to others I watched. What I don't like about Firewalla is their devices are manufactured in China. I believe the firmware is also flashed in China (asked their support to find out). Supply chain attacks are a big problem. I do not think they reflash them or offer coreboot in the USA to save money. For me, I always buy hardware with coreboot bios and toss on ipfire or pfsense. I also run pi-hole on a raspberry pi and configured to block 3 million bad urls that updates these know bad lists weekly. I just don't want to install a FIREWALL to protect my network from being hacked from the same folks who bought it. China hacks the heck out of the USA. Hi Mr. Burglar, I know you keep trying to break into my network, but hey, you are cheaper costs so can you build my home security system so i can use it to protect against burglars including you guys? Just doesn't make sense at all to me. But Cisco/Juniper/etc.. all has their stuff manuafactured in china then everyone scratches their head and tries to figure out how china got into their networks. If they were fully manufactured in the USA though, I would buy it! Seems like a great solution, but way to many backdoors hitting the news lately and just to risky. Yes, everything is made in china (iphone chips, etc..), but, for a edge router, I want that one single device NOT flashed by the chinese.

  • @raixbox360
    @raixbox360 Рік тому

    How to factory reset the firepower 1010? My system connects to the internet and after a few minutes, it drops connection and none of the services work.

    • @ntraas1584
      @ntraas1584 Рік тому

      If you can get to cli: configure manager delete. You still having issues?

  • @ABH-fh6tn
    @ABH-fh6tn Рік тому

    Thank you for the video, it is very informative. just wanted to ask, what will happen to the license like AnyConnet or security plus license if it is activated in ASA and then we switch to Firepower. will it still be active?

  • @vijgai3
    @vijgai3 Рік тому

    I took down my OPNSense firewall/router device & got this. I have had no issues to date and the simplicity & visibility is just great. My home network has UniFi APs, a UniFi switch & quite a few devices including IOT.

  • @mimranon
    @mimranon Рік тому

    Question, what happens if 90 days evaluation ends?. can we still use as nat devices

    • @ntraas1584
      @ntraas1584 Рік тому

      I haven’t tested this personally, typically Cisco allows for use after expiration, they’ve talked about creating a “if it’s not licensed, stop the service” but who knows if they’ll actually do it…

  • @pbrigham
    @pbrigham Рік тому

    Could be the best firewall in the world, I will never buy a firewall with subscription services, but thanks for the video at least now I know that. Staying with Pfsense on my own hardware.

    • @ntraas1584
      @ntraas1584 7 місяців тому

      I agree 100% Cisco/Juniper/Palo are typically used by organization/government because that's how they work. Keep in mind, if you want to be a network engineer/security engineer in a job then using this in your infrastructure is a great idea.

    • @pbrigham
      @pbrigham 7 місяців тому

      @@ntraas1584 Thats why they keep getting hacked, if you really want a secure system you have to go Open source.

  • @sousha6361
    @sousha6361 Рік тому

    hi, which interface that i should connect to download the image?

  • @seanwoods1526
    @seanwoods1526 Рік тому

    Great video.

  • @Chomper750
    @Chomper750 Рік тому

    I don't hate hackers. I'd be out of a job if they didn't exist.

  • @dvivcc
    @dvivcc Рік тому

    Hi nTRaaS - very informative video - thank you. Question: Do you know if a license is needed in order to have "VLAN Trunk Ports" enabled on a FPR 1010?

    • @ntraas1584
      @ntraas1584 Рік тому

      You don’t need any specific license to run subinterfaces (trunk ports), BUT you need to have a base license to use the firewall longer than the trial period…

    • @dvivcc
      @dvivcc Рік тому

      @@ntraas1584 Got it - thank you for the follow-up.

  • @cqwickedwake7651
    @cqwickedwake7651 2 роки тому

    Why use Firewalla when you can run your network through Cloudflare? I mean I get it because of latency but still for me in EU it doesnt add any latency at all and it all runs smooth so yeah..... Nothing against firewalla but id rather use Fortigate then 😉 Cheers

    • @ntraas1584
      @ntraas1584 2 роки тому

      Hey thanks for the message! I hadn’t heard of cloudflare, it looks to be an interesting option to look more deeply into. Firewalla is a good option for home use, honestly a techie probably would go with something else but for the average consumer it’s a move in the right direction.

    • @DustinWyatt
      @DustinWyatt 2 роки тому

      Firewalla adds lots of things that Cloudflare does not. For example, I need gigabit-level smart queue QoS.

  • @michaeljackiewicz5637
    @michaeljackiewicz5637 2 роки тому

    Any VPN were turned off too right?

  • @jamesmarchello5553
    @jamesmarchello5553 2 роки тому

    Dude, you are jumping all over the place which makes it hard to follow.

  • @ms.pimentel628
    @ms.pimentel628 2 роки тому

    I need this: thank you.

  • @AAtta-3286
    @AAtta-3286 2 роки тому

    Great video! No in-depth videos on firewalla like yours. I am upgrading from the Firewalla Blue plus that I connected in simple mode, to the Purple that I want to connect in router mode. I have a TP-Link Ax21 router that I'll switch to an access point. My question is when I connect the Firewalla Purple LAN side to the now TP Link access point do I connect it to the LAN or WAN of the TP Link. Much appreciate your videos! Stay well! Tony

    • @ntraas1584
      @ntraas1584 2 роки тому

      I’m guessing your TP is a non enterprise? Meaning no vlans? Simply enough you’re going to just create a network for the lan interface, not a vlan port, and just connect the TP to the purple. As I don’t know the software for your TP I’m guessing here: plug the Firewalla lan port into a lan port on the TP and done. If the TP only has a routed wan port it may not accomplish what you want but will still connect to the internet. If the TP has a routed internet port only, or otherwise, there may be a setting in the TP to turn it to access point mode and this your wan link will become a lan link.

    • @ntraas1584
      @ntraas1584 2 роки тому

      Otherwise just browse through the TP configuration and try different settings to see what works.

    • @AAtta-3286
      @AAtta-3286 2 роки тому

      @@ntraas1584 Correct no vlans. Wasn't aware once TP link router turned into access point then the Wan port just becomes another LAN port. Good to know . Thanks again for your in-depth videos on Firewalla

  • @Joel-xf9tl
    @Joel-xf9tl 2 роки тому

    This really is a replacement for the likes of pfsense opnaense etc. it’s strength is being a firewall and QOS. Use it as the gateway. That’s what it has been designed for.

  • @thisisreallyme3130
    @thisisreallyme3130 2 роки тому

    This is good, thank you. Some feedback: spent too much time exploring "Blocked Connections" and where they're coming from (ie around 7:26) So much of this traffic happens it is really not interesting unless you trigger the scenario where you WANTED traffic to get in but it was blocked (and you had to resolve that issue) Meant to be encouraging. :-) There are not a lot of very technical reviews on Firewalla so please keep going. Cheers

    • @ntraas1584
      @ntraas1584 2 роки тому

      I do tend to go on tangents…thanks for the message!

  • @grenwolde
    @grenwolde 2 роки тому

    Thanks for the video -- just installed my Firewalla gold -- super easy and good GUI.

  • @johntrussell7228
    @johntrussell7228 2 роки тому

    Thank you for this. It is incredibly hard to find good Firewalla reviews and deep dives like this on UA-cam. Please keep covering these devices, you gained a Sub from me!

  • @silnce01
    @silnce01 2 роки тому

    Ty for the video and appreciate the feedback. IT and Cyber inclined - I want simplicity. Not only that but ease of use not only for me but my better half. I do this for a living and I enjoy it but time at home doing other things is more of a priority now. Things change in life. Just like you, I will take down my pfsense box and give this a shot. I can't knock it much until I give it a shot.