Firewall Policies and NAT (Policy vs Central NAT, SNAT, DNAT... ) on FortiGate | GNS3 Lab

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
[Music] [Music] [Music] [Music] he [Music] [Music] hey what's up guys this is G here welcome to this new live this Sunday and I'm glad that you're joining me thank you so much so today we're going to do some lab on policies or five World policies on the 40 gate we are also going to do some not or network address translation thank you for those of for those of you that are on YouTube right now live let me know where you watching me from thanks AJ thank uh thanks s always there appreciate it thank you for those of you on Facebook as well please help me share this video please help me um grow the the the family here because we're here to share this knowledge and I'm very happy when I bring it to you every Sunday like this we are supposed to start at 4:00 p.m. New York time but it's right now 5:00 p.m. I was late because I had some technical issues with Facebook and all the other stuff but right now I think everything is good I am streaming in full HD not in 4k as I intended before but uh I think the the goal is is being met right now you have good footage you have good audio that's all I need so let me know let me know if you can hear me in the chat just just say something say a quick thing and we we'll keep going so this is the topology that we're going to work on today it's a simple one I'm going to explain it in a moment and uh we will we'll get to configure this and uh I hope you it's going to be very helpful hello this is Phil hi Phil from Montreal yes thank you so much thank you for joining the chat and uh we'll get started really soon so yeah I've been working on this setup here right now I do have this primary camera that is looking at me I also have this slider also looking at me K is from adaba Wow Kad nice thank you so much Kad from ad B from ethopia I like ethopia I've been there a couple times I mean on my flight stopped but yeah thank you so I have this other camera here that is going back and forth so I really really work to give you this high production um lab so you can you know learn with me and and get to to work in this industry and and also make money right we're here to make money as well um so I I really put a lot into it so make sure you like the video and you share it online hi LC J Jenkins from Houston Texas nice thank you so much so beside that I also have this other camera behind me this is showing you like a broad view of my setup here I have my lab in front of me as you can see Jour 3 up there and I have those other cameras and everything so yeah I'm really put a lot I really put a lot into this and thank you so much for joining thank you for encouraging like the video share it and if you are on YouTube or Facebook also share the videos thank thank you Leandro Leandro where are you watching us from all right Nigeria certified Cisco Engineers genius genius is a genius here and he's from Nigeria thank you so much genius thank you for joining all right guys so this is the topology I am going to explain what we are going to accomplish today but the main two things that we're going to talk about are first of all FP as in firewall policy just to explain what that is what it does and everything mostly in our topology and then we're going to talk about not not or network address translation most of you should be familiar with this two here if you've been in industry for a while but to me every time I learn or every time I am giving you things like this I assume that you may not know or if you if you know you're going to hear me saying it in my own terms or my own words so it may sound also different so firewall policy and network address translation I'm going to show you how to configure bi policies and how to configure nut and the different types of knots that you can find here we are going to do snot or Source knot my pen cannot write so Source knot we are also going to do dnot or destination knot and we are go there are these are different types of knuts that we can configure but we also have two ways to do this in a fate we can do what is called firewall policy knot or just policy nut a policy knot is the network address translation that you do in every firewall policy that you create so you create a policy you incorporate n in that policy or we can also do what is called Central not Central not the not part of the policy of the traffic is brought out of the policy and it's now configured separately I'm going to show you both of that for the 48 and of course I go from zero to engineer so if you are missing any of what I'm saying if you don't understand what I'm saying pretty much feel free uh to ask your question in the chat hi Olivier from Cameron and uh I'll be glad to respond thank you so much okay uh but before going forward if you don't get what I'm saying that means you need to learn things you need to know what's going on in the industry you need to have the basis of networking security cloud and so on that's where I pitch in my CCNA lesson I have a training on K trains.com it's for the CCNA 2301 it brings you from zero to engineer and will teach you everything you need to know to go and pass the CCNA exam the CCNA is not just the certification it's actually the knowledge that you acquire in the process of uh learning or preparing for the exam so I do it really well on my on my lessons I have about 140 lessons that are available right now so if you are interested go ahead and check out KB training.com go for the CCNA trainings you go into find it and it's going to be very helpful how long it's going to how long it's going to take that's one of the many questions that I receive how long is it going to take me to get the CCNA depends on you depends on what you do depends on how many hours you put in the study every day so it may take two three months 6 months one year it's really up to you but just take your time take whatever whatever is necessary for you to to master everything before going for the exam all right so let's go back to our topology here this is what we want to accomplish as you can see I have this that I called office this is like a regular office with a firewall going out to the internet this is the ISP and we on this side we have what I call Google this is another company at the scale of Google and look at here they have a web server this is a web server we also have some web clients we have a web client inside the Google Network we also have a web client here in our office so I am going to make sure that by the end of this lab we are able to go from any PC or any computer inside this office go out to the internet and also go all the way to the web server that is located inside Google so we are going to do some firewall policy at this level in this 40 gate to make sure that the traffic is is able to go out so we'll have some Pall policy here we'll have some Pall policy over here as well we are going to have not over here we're going to have nut over there as well so on this side it's going to be snut or Source nut why Source because we are going to translate the source IP that is coming from pc01 we're going to transfer I mean to translate that IP to a public IP before going out on this side we're going to do D not why D not because we are going to change the destination IP going to this web server so the IP that we'll be trying to reach from the client is the public IP of this network which is 30. z0.02 think too many zero 0.0.2 yes 30.0 0.2 that's a public IP that is the IP we're going to use in a web browser in this client and when we get a traffic on that IP the 4 gate should be able to forward the IP to the web server that's the goal of this lab here so we're going to do all of that we will probably fit that in an hour or 45 minutes or something like that but um yeah and we will learn along the way so I like to bring you things like this and uh just answer your questions thank you thank you smile I think that's how you pronounce it yeah music mozek wow please keep it train can I have your email of course my email is contact kings.com I'm going to write it quickly here in uh in the chat you can reach out for anything i' be I usually respond within 24 48 hours all right guys that's the topology we have today that's the work we're trying to accomplish and along the way I'll be explaining what I'm doing for for those of you that have questions do not hesitate to send your question in the lab Leandro from Netherlands wow thank you so much for joining us us on Facebook so I hope everybody's good on Facebook and Instagram I Instagram on YouTube make sure you like the video you share it as well so let's get started I'll go slowly so the first thing is uh I can just verify or show you exactly what I have now these two PCS here the pc1 and the PC2 on this side they are going to or pc1 and client office they're going to get the IPS from the 4ate that is here and this 4ate I have management IP for the 40 Gates and I should have access to it here this is the 10.35 0.33 this is going to bring me inside the 40 gate let's log in okay this is it says here office 40 gate so we are inside the 40 gate let's see what we have so under network interfaces I already have these interfaces configured this is len or the the port number two this is the one that is going inside our network over here and I have the port number one or the Management Port this one is connected to my home network that's how I'm able to get access to the 4ate with my local network here inside the house and I also have the one port this is going outside to this router that is considered our ISP for this topology and uh that's the same thing we have on the other side so I don't have any fold policy or anything similar right now beside the IP addresses that we have so that's why if I'm on here on this pc1 let me go inside pc1 if I do show IP you can see that I do have an IP 10. 0.0.3 if I'm trying to Ping 10. 0.0.1 this is my default gway I am able to Ping it without any problem because it's directly connected to me it's inside my network so what I just did is that I was here on the PC number one and I just pinged this interface here the port number two my default gway and I'm able to Ping it without any problem so now if I want to go outside of my network let's say I want to I want to Ping this port here the port on the ISP and this is 20. 0.0.1 the way I'm configured now I will not able to do it I will not I will not be able to do it because there is no firewall policy inside the 40 gate allowing me to go outside that's what we place as an admin to make sure that your forgate behaves the way you want it to do because right now the forgate can do the routing it can do the security and everything but everything should be coming from you as the admin so we're going to tell it spefic specifically if you see traffic coming from this port are we having trouble um just a moment cuz I felt like Facebook restarted oh no it's uh huh something happened here give me a second this shouldn't be showing nothing should be showing this one okay all right sorry guys I I think something happened here so um you need to specify what you want to happen inside your firewall so that's why we need to create firewall policies the policies will Define the behavior of the traffic or the behavior of the the firewall itself what traffic is the firewall allowed to bring in what traffic will the firewall block if we want to so like in this case we need to create a new firewall policy to say if you see a traffic traffic coming from this network going outside or coming from this network on this port going outside you can ELO that traffic and one thing that I like to do in a lab like this is usually a packet capture let me go over here and capture some packets with uh wire shark we're going to see what is happening there so this is the packet capture as you can see my routers like the router the 40 gate and the Cisco router they're trying to talk to each other and initiate some sessions but there it doesn't go anywhere so I can either filter these out let me just do this apply as filter not selected so those are out and um yeah these can stay we are fine so right now if I'm on the PC number one and I'm trying to Ping 20.0.0 do1 I will not receive any answer because I am not able to go out as if if we look at the packet capture that we are doing at this level we don't see any packet going out because there is no firewall policy for it hi NZ um is it the NZ that I know from California probably thank you for joining us live so um you can see that we don't have packets going out what we have to do now is at least create a firewall policy for us to go out from here so let's go back in the 40 gate and we're going to create that so I I will go under um what is it under policy and object and select firewall policy and here we're going to add a new policy so by default in all the 40 gate you have this implicit deny policy that is at the end of all the policies this is the last policy you should have because this is going to block everything that didn't match any policy in front of it or before it so you need to keep this inside the firewall but we need to add one policy above it so let's go ahead and create new and every time there's a packet the firewall will go through the policy one by one from top to bottom so this one that we're trying to create I'm going to call it l to when and it's going to be coming from an interface what interface is it there is something that I want do before this let let's go back let's go back to addresses because everything that you manipulate in the policy are object so we have ports or interfaces we also have subnets or addresses you can create different object depending on what you want just like we're going to do VP or virtual interface uh virtual IP it's an object that we can manipulate in our policies so right now I just want to create an object that is going to designate the whole subnet that we are considering as a land here here so under addresses let me create a new address I'm going to call it land address this is a policy address so I'll call it Lan address and it's a subnet what is the subnet the subnet is 10.0.0.0 um space 255 255 25.0 this is sl24 what interface is this object attached to this is for the L number two that is our address object and you're going to see how we use it in the firewall policy for configuration so I go under the firewall policy add new policy and I'm going to of course name it Len to when incoming interface it's going to be the land port outgoing interface it's going to be the one port this is where the traffic is going to exit Source this is where we are are going to point to our IP object or our uh subnet the land address this is the source the traffic should be coming from a device inside the subnet if there's another device connected to that Port it's not it's not going to work because it will be different and uh the destination is going to be all or everything on the internet and um the services I am going to enable everything pretty much everything from inside going outside hey yes that's nickz from California thank you so much brother thank you for watching from California I hope everything is good and we have Udo genius can you use zones instead of address like you did yes correct that's also a good way of doing it I will explain that in a moment so for this one here I don't want to I don't want to use nut let's use enable disable nut and we we're going to see what will be the consequence so right now I put the source I put a destination I put the schedule the schedule is if you want to if you don't want your policy to be enabled all day 24 hours or every time you can set a schedule to say this will be enable from 6:00 a.m. to 12 um a.m. for for example so if you have like contractors that are working between 8:00 a.m. and 5:00 p.m. you can set the the schedule just to allow that traffic during that specific time that you going to set in this case we just we just say always and that's also great for the services I'm going to put everything and we'll go with okay just to answer quickly what uh genius is talking about here we can use zones instead of interfaces and what are zones zones are group of interfaces if we have like three or four interfaces that are going into lens if we have like many lens or many many virutal lens inside our Network we can group all those those lens inside what is called The Zone and to create a Zone you go under interface come here and say um interface and create new let's Okay under network interface and then we can do create new Zone and I can I can call this Zone all l so uh block inra Zone traffic you can block traffic between the different members of the zone or you can uh you can let it uh flow between without any problem that's also fine okay let me just block so what are the members let's say I include the port um number you know what I cannot include the port number two because it's part of firewall policy already so let's say let me just create another Zone with Port three four and five and then I just hit okay so that zone is going to be available right here it says all Zone and I can even reference this Zone inside a firewall policy if if I go back to um firewall policy let's say let's try to modify this one I can double click on it under incoming interface I can select the Zone the zone is right here so it's a it's a way of managing your network it makes very it makes it very easy for you to have a lot of interfaces grouped together so we are going to skip that so I configured my file wall policy to allow me to go outside so right now the way it stand I should be able to Ping from here I should be able to Ping this interface but the thing is I didn't enable n here and I'm going to to show you what is happening now so if I go inside my PC number one and I do the same thing I still don't receive any response and why because look at the packet capture it's not going out is it why do I see [Music] uh office accept L IP is it because of the okay oh you know what I need to clear this filter okay yes I had to clear the filter I had there so look at this when I do the pings the IP that is used to go out is the 10. 0.0.3 so my IP my internal IP was not translated it was not um using not to get to a public IP so now I'm going out with the private IP and this device here on the other end doesn't know how to respond that is the thing that is where not is really important because this is a private Network all of this is a private Network we cannot advertise the subnet on the internet so that's why we need to translate all our traffic to use the public IP over here as a source so our source need to be 20. 0.0.2 that's where not is going to help us and by implementing not here we should be able to receive a response from The Cisco router possible for an interface to be in different zones I do not think so but we can verify that um in the lab if we have time for it but I don't think you can put one interface in many zones and the thing is you just saw in a moment here that by you know what let's just try it let let me go back to to the zone and I'm trying to create another Zone here and see if we can add those same interfaces I don't think it's possible so let's go ahead and go under interface and create zone I'll call it all land to and see yes that's not possible just like I was saying you can see that three four and five are not available because they are in one zone and they cannot be added to it to another Zone that makes sense so yeah that's uh that's just how we verify thing and thank you for the questions guys I'm here for that El from B thank you so much greeting from Kingston Jamaica wow luk fun thank you thank you so much for interacting with the chat as well so where was I um so we need to implement not over here and the thing is there are two ways for you to do that with a 40 gate you can do you can do what is called policy nut or you can do what is called Central nut policy nut is when you enable nut inside your firewall policy that will mean that for every policy you're going to create nut is going to be enabled so you will have as many nut as policies that you have inside your firewall so it can be a problem it can be cumbersome if you have thousand of policies you can manage every nut inside the policy that's when Central nut comes in with Central knot you will be able to this dis disassociate not from the firewall policies so your firewall policies will be set under a central location and you will apply those um Nots to whatever policy you want to let me show it to you here so if you go inside the 40 gate uh let's see if we go in the 40 gate look at this under policy object we don't see Central not here because it's disabled by default and inside this policy that we just created we have an OP option just like I showed you earlier to enable nut over here but we decided not to do it but let me enable nut but under Central knot not under policy knot to enable Central knot we need to go under system and select settings you need to scroll all the way down here let me zoom in a little so this is Central knot this is the option to enable Central knot I'm going to enable it from here here this is Central nut and I can also just hit apply and just by doing that it's giving me the option to enable Central nut here if we go under policy and firewall look at this this is actually Central knot that has been added to our settings so we can configure Central not over here let me go inside it and from here I can create new Central n by going create new what interface will be the incoming interface that is Port two or Lan outgoing interface it's our when interface Source address it's going to be land address or if we have U let's say if we have a zone of all the lands we can also add it here let's say I can add a Zone as well possible let's go down is it here I don't think I think it is let's go back if I delete this can I add the Zone did I delete the Zone but anyway forget about it so I can add Source I'm going to add my L address destination anything on the internet and I'm going to do not using the outgoing interface and that's it by doing this and hitting okay Nat is now enabled for our traffic going from Lan to one look at this so now if I go to the PC number one and ping I should be able to Ping successfully yes now I'm able to Ping why because we have not enabled and if we look at the packet capture the packet that we are sending out do not have private IPS this packet use 20. 0.0.2 to go out and that's why this device can recognize where to send the answer and that's why we have uh that that's how we have those answers from the pings so that was not inside the 40 gate but I usually I mean for this lab I don't want to I don't want to make it complicated with Central nut I'll just going to I'm going to go back to the policy nut so I'll come here and just delete this uh Central nut policy and we'll just go under firewall policy and double click to enable not from here it's it's much easier where is it oh you know what because cut was enabled now I cannot even en enable nut here I need to go and disable Central nut go let's go back under settings and disable Central nut okay so now I can configure policy nut Central nut is disabled we can go back to policy and firewall policy and open this policy here and here I can enable not and hit apply or okay so with this I should be able to Ping from the PC number one just like always just like I I pinged last time all right possible for interface to be in different zone of answer that great thanks okay cool all right so we are done we know that our PC over here is able to go out to the internet at least we can reach this interface we can even reach this other interface the 30. 0.0.2 let's try it it should be able to work without any problem because we are set for it so if we go and ping 30. 0.0.2 it's also responding without any problem so this IP the 30. 0.0.2 is going to be the IP for our website let's go back on the website side and make sure everything is conf figure over there so I'm going to open the web client the WordPress it's already up let me just verify the IP on it so this is Linux here with all the WordPress if I do EF config this is the IP that we have the public IP I mean the private IP 192 168 05 and right next to it we have a web client so if I go inside the web client it opened over here so if I go inside the web client I can ping 192 16805 without any problem also I can go to the web page let me go inside the web browser and access 1921 68.0 five this is the web the WordPress website that is inside our web server and at this point there's nothing impressive because the two devices are inside the same network so they are connected to the same switch they are in the same Vin this is actually a dam switch there's no configuration over here hi Eric bin um where are you watching us from thank you for joining us on Facebook and do not forget to share the video and also like it on YouTube and Facebook all right so this is the switch it's a dum switch so these are in the same network so they can reach each other without any problem the the thing we have to configure is to be able to access the website from the client office here going through this network that's uh that's the part we're going to configure so we able to access the website without any problem so let's go to this firewall here because we have some configurations to do on this firewall the first configuration is to make sure that when a traffic is coming to this port the 30. 0.0.2 on the port number 80 or the port number 445 these are the port for HTTP and https so all the web traffic coming to this interface should be forwarded to the web server to 192168 0.5 that's what we're going to accomplish now beside that we go I mean when I do that we're going to receive the request but we should also be able to answer to all the requests that we are receiving and what we do here with what I just told you it's called D not my pen is just dead I think I need to change my interface I mean my graphic card because it's kind of heavy right now it doesn't take the pen and the screen cuz I have like three screens right now just like I showed you in my fancy camera over here so I have uh I have some I have three screens connected to the same graphic card it's kind of overloaded that's why when I'm riding on the screen it's it's acting up and doesn't do it very well and also I just forgot that I have my other angle here that I need to pull up as well guys please make sure you like the video you subscribe to the channel and you also share it on Facebook or Instagram El Miku is watching out from Kinshasa wow thank you so much Ellie thank you for your time and thank you for joining the channel and do not forget to like and share the video on Facebook all right guys uh let's go back to this so what I did here was D dnot is destination not because I'm going to change the IP from 30. 0.0.2 to 192 that 168 0.5 that is called D not I also need to configure snot because when I get pen is dead so when I get the request or when the web server gets the request it need to respond to the client and we need to make sure that the IP that we send outside to the internet is not the private IP but it's a public IP let's go ahead and configure that so I know the IP of this fate I have it pulled up over here over there so let's log into it okay I'm inside the 40 gate just like I said all the ports are configured fine we can verify that under network interfaces but we don't we don't have time for that um it's also yeah it's there you can see it so what I need to do is go under policy and object and make sure under firewall policy that I have a policy or snot that is going to allow my traffic from Lan to when and what would be the incoming interface that's going to be the land interface outgoing interface is going to be W interface Source here if I had an object created I can just take that object but because it's a lab envir the lab environment I'm just going to grab all but it's going to be all IPS that are attached to l two so nothing else will go through destination will be all schedule always Services all I'm going to enable not and that's it so that means that I'm able to at least go outside from my devices I can even test it by going inside my web client here and let me try to Ping 20.0.0 two I'm able to Ping it so I'm able to go outside all the way to the other end not 443 for HTTP what do you mean uh look yes 443 is for https I don't know what I said before but yeah HTT HTTP is 80 and 443 is https all right so I'm able to go outside so now what I need to configure is let's actually close this client here because sometime I get confused confused when I get the two client together let me open the client on the office side the client office it's right here so from the client office I am pretty sure that we can ping 30. 0.0.2 because that is the interface outside but if we use that same address under the web browser 30.0 z.2 we will not get anything back because we are hitting the firewall but we don't go beyond the firewall because the firewall doesn't allow any traffic to come in and hit the web server so what we have to do is make sure sure that from here we have uh D not configured so that our traffic goes all the way to the web server to do that we go under the F the 4ate and we need to create what is called the virtual IP so we need to go under virtual IP create new we're going to call it web traffic okay and what interface will this be coming from so it's coming from our on our one interface like from the internet and it's going to be statically knoted so I'm going to give the IP of 30.0 z.2 this is the IP where the traffic is coming to like from the client it's coming on the when so basically I'm taking all the information from here from the port that is facing the internet and all of that is to make sure that when the traffic comes to 30 we change it and we send it to 68 05 let's go back in there and it's going to be sent to 192 168.5 hi Stanislas B hi Charles from Germany thank you for joining us please like and share the video and also subscribe to the channel I only have like five likes right now oh the 19 likes thank you so much all right so it's going to be sent to this address and I'm going to hit okay so I just created a virtual IP so now I'm going to show you how we can use this virtual IP to make sure that D is enabled or destination not is enabled so we need to go under firewall policies if I go on my web client I still don't see anything and if we go where we were capturing the packet you can see that we are initiating sessions these are TCP sessions being sent to the Google firewall but we don't receive any response that's why the web page doesn't load over here so now what we need to do is enable dut let's go ahead and do that in the 4ate I need to go under okay we enabled um the virtual IP now I need to create a rule to be able to allow traffic to come in create new name is going to be when to web and incoming interface is going to be the one interface from the outside outgoing interface is the land interface from the inside source IP is going to be anything on the internet destination IP I am going to use our virtual IP the web traffic virtual IP this is how I Define the actual um n i mean dnat and then I'm going to pick all the services I can go ahead and select just HTTP and htps let let me just do that HTTP and htps okay so I'm very restrictive and not should be enabled so that we do dat not and everything should be fine now I'm going to hit okay so before going and testing the the web traffic please make sure you like the video and subscribe good evening guys from Dakar Sagal hi EV from Sagal thank you so much for joining us and also make sure you liked And subscribe to the channel and um again if if you are studying for the Cisco CCNA I have a course available on ks.com and uh I put a lot of time in my quality and that's why I have fancy cameras look at this one here this is sliding left and right and here I can give you the link to my website this is KB trains.com where you're going to find the course from zero to engineer about 140 lessons are available already so if you go there you going to study at your own pace I've never been in a classroom since like 15 years or 10 years now I've been studying all my own on my own here in my um in my in the privacy of my bedroom or my office or my studio whatever because things are being taught online now and if you want to study for the CCNA go ahead and check out my course it's really well done with uh with with quality in it anyway yeah that's what I want to say thank you guys and let's go back to this so with the D not enabled let's go back to our web client and refresh the page how do I refresh the page let me just do this boom and we have access to the website we did it guys look at this so we came from this web client here inside our office we went out through our firewall we changed our IP to a public IP we went all the way here we changed the public IP to the private IP we went to the web server we put our request in which which is the get request HTTP for those of you that know HTTP oh actually by the way I'm also planning to create some lessons on Linux and Python and also the N4 I'm doing a lot of 40 gate these days because I'm studying for the N4 so I'll be ready for the exam in about two weeks I will take the exam I'll let you know how it it goes and then after that I'm going to create a lesson on the N4 like a training training videos on N4 so if you are interested go on k.com make sure you subscribe to my mailing list and I'll let you know when the course is available all right so when the request came here we received the response from the web server it came all the way down to the client office and that was the main goal for today guys there are many ways for you to verify Nots and uh dnot snot and everything inside the 40 gate so if you have any question you can uh put it in the chat now Olivier tala do you have a course available on N4 not yet I don't have a course on N4 but I'm planning for it within the next two month I'm going to have a course on the nc4 so you'll be able to to see that thank you Evra to thank you for appreciating my demo thank you so much for your time guys I think we are almost hitting the end here if you have any questions you can put it in that I'm also studying for the nse4 thank you so much Leandro good luck to you as well um there was a lot of resources available online for for you to study and uh actually the setup that I have here today is setting us up for the next lab where I'm going to do uh web filtering and all bunch of security stuff so make sure you you are there for that next week make sure you like the video and subscribe because I will do I use this web servers here and show you how you can filter the traffic on the 40 gate and you should have a license you might have you have a you need a license for that I do have a license so I'm going to use it in the lab and uh we will do that together all right guys thank you so much I hope you are all good please do a personal training session the job do you do personal training sessions no I don't do personal training sessions it's just here on YouTube uh that's what I do personal trainings it's kind of uh I don't know time consuming and what do you mean by personal training sessions to learn the job I give all the information necessary I give I usually talk about all the skills that are necessary to land a job um in your field um but I don't I don't do personal that's that's another level all right guys I think that's all for today thank you for watching please take care of yourself and I'll see you next Sunday or in one of the videos that I'm going to release this week on the Channel please make sure you share the world you you share the word about the channel you share it on Facebook and Instagram and you also join us every Sunday for our live sessions thank you and I will see you in the next Lab take care and bye
Info
Channel: KBTrainings
Views: 5,785
Rating: undefined out of 5
Keywords: kbtrainings, kb trainings, kb training, cisco, ccna, ccnp, ccie, networking, security, routing, switching, nas, qnap, vpn, site to site, configuration, fortios, ha, high availability, fgcp, nat, central nat, SNAT, DNAT
Id: s61WTe-9iDo
Channel Id: undefined
Length: 48min 56sec (2936 seconds)
Published: Mon Sep 04 2023
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.