When migrating from a non-DPI environment to DPI, what is some of the considerations that need to be addressed prior to cutover? I understand that there will always be one-off gotchas that will need to be fixed on the fly.
Here are a few things that I thought of....Any other ideas ?
Having proper network segmentation for IOT, phones, guest users, etc.
Use a small sample of test users before full production cutover
Research the effect of DPI on cloud apps that have potential DPI issues - anyone know of a good source for this ?
Thanks, Don
As you rightly mentioned, it is always better to have proper segmentation of the network and have few test users from each of these networks for testing the DPI. Have all the possible test cases
(URL's/Services to be accessed and bypassed) ready for testing. Make sure you install the Fortigate CA on all your Client machines so that you don't receive certificate warning while accessing services after enabling DPI. Have them tested against each of the Secuirty Profiles one by one instead of applying them all at one go. This way you build your test policy which can later moved to production by adding remaining users subnet by subnet.
Certain cloud applications ( ex: o365) and patch update URL's should be bypassed from SSL interception as some of the features maynot work as expected.
Regards
In no particular order:
As far as the app exceptions go, the default "deep inspection" profile already comes with a nice list of exempted destinations, you can start with that.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1738 | |
1108 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.