Nxfo

Nxfo

Views:
4,423
Subscribers:
751
Videos:
84
Duration:
10:20:01
India
India

Nxfo is an Indian content creator on YouTube with 751 subscribers, publishing 84 videos which altogether total approximately 4.42 thousand views.

Created on ● Channel Link: https://www.youtube.com/channel/UCKTvMr7TCbScpRdXk9XQ9lA





Top 100 Videos With The Most Comments by Nxfo


Video TitleCommentsCategoryGame
1.BGP Configuration part 1 | Fortigate Firewall0
2.BGP Configuration Part 2 | Fortigate Firewall0
3.Dynamic NAT PAT | Palo Alto0
4.SSL Decryption Https Inspection | Palo Alto0
5.VPN Zone and Tunnel Interface | Palo Alto0
6.Active Passive HA configuration in Fortigate0
7.Vulnerability Protection | Palo Alto0
8.RIP Routing Concept Fortigate Firewall0
9.SNMP trap configuration on Fortigate0
10.RIP Routing Concept Fortigate Firewall0
11.Static Routes Configuration in Fortiget Firewall0
12.Home Lab | Palo Alto0
13.Virtual Firewall Installation | Palo Alto0
14.High Availability HA | Palo Alto0
15.PRTG installation | Fortinet0
16.Mobile Legends: Bang Bang0Mobile Legends: Bang Bang
17.Software Defined WAN | Fortigate_Infrastructure | Fortigate0
18.DHCP Server Configuration | Palo Alto0
19.Anti Spyware | Palo Alto0
20.Virtual Domains | Fortigate_Infrastructure | Fortigate0
21.Destination NAT | Palo Alto0
22.Active Active HA configuration in Fortigate0
23.XMX_PUBG LIVE0PLAYERUNKNOWN'S Battlegrounds
24.Overview of Palo Alto Certifications | Palo Alto Firewall0
25.BGP Routing Concept | Fortinet Firewall0
26.Antivirus | Palo Alto0
27.Panorama | Palo Alto0
28.Monitor Fortigate with PRTG Sensors0
29.Concept of Higher Availability HA in Fortigate0
30.Enable User ID | Palo Alto0
31.Introduction to Security Policies | Palo Alto0
32.DoS Protection | Palo Alto0
33.Global Protect and Portal Settings | Palo Alto0
34.OSPF Configuration | In Fortinet Firewall0
35.LDAP and Authentication Profiles | Palo Alto0
36.Introduction | Palo Alto0
37.Data Filters | Palo Alto0
38.PAN OS Software Update | Palo Alto0Vlog
39.Basic Settings and License | Palo Alto0
40.DHCP Relay Configuration | Palo Alto0
41.OSPF Routing Concept | OSPF in Fortinet Firewall0
42.Introduction | Fortigate_Infrastructure0
43.Forward logs to FortiAnalyzer | Fortinet0Vlog
44.Lab Topology | Palo Alto0Vlog
45.Application Control App ID and Filters | Palo Alto0
46.Static Routes Concept in Fortiget Firewall0
47.Zone Protection and DoS | Palo Alto0
48.FortiGate in GNS3 | Fortinet0
49.Install Metasploitable0
50.Kali Linux Basics Terminal and CLI Part 2 | Ethical Hacking Bootcamp0
51.Installation Preparation | Palo Alto0
52.Role Base Administration | Palo Alto0
53.Global Protect Portal and SSL Client VPN Access | Palo Alto0
54.Interface Management Profile | Palo Alto0
55.Authentication Captive Portal | Palo Alto0
56.Layer 2 Switching | Fortigate_Infrastructure0
57.Export Config Factory Reset Import Config | Palo Alto0
58.Interface Settings | Palo Alto0
59.Static Route | Palo Alto0
60.Mobail legend (PLAYING KARMA )0PLAYERUNKNOWN'S Battlegrounds Mobile
61.FortiAnalyser in GNS30
62.Creating a Security Zone | Palo Alto0
63.URL Filtering | Palo Alto0
64.ADOMs in Fortigate0
65.Use of Tags | Palo Alto0
66.Creating a Sub Interface | Palo Alto0
67.File Blocking | Palo Alto0
68.IPsec Site to Site VPN | Palo Alto0
69.FortiManager in GNS3 | Fortimanager0
70.Installing CA Certificate | Palo Alto0
71.Static Source NAT | Palo Alto0
72.Kali Linux Basics Terminal and CLI Part 1 | Ethical Hacking Bootcamp0
73.Wildfire Analysis | Palo Alto0
74.VM Metasploitable Basics to Advanced0
75.IPSEC Introduction | Fortigate_Infrastructure | Fortigate0
76.Evil Twin Method – Clone Wireless Access Points to Steal Data0
77.Cloud Pentesting Basics | CEH0
78.SOC Roles and Playbooks0
79.What is Cybersecurity? | Cybersecurity Explained for Beginners0
80.How to Search for Anyone Online | Best People Search Tool Tutorial 20250
81.Security Control Types Explained | Administrative, Technical & Physical Controls0Security Control
82.Crack WPA2-PSK Passwords Using Aircrack-ng Tool | Ethical Hacking Tutorial0
83.Incident Response Phases Preparation to Lessons Learned0The Incident
84.Nmap Tutorial 2025 | The King of Network Scanners Explained0