Nxfo

Nxfo

Views:
4,423
Subscribers:
751
Videos:
84
Duration:
10:20:01
India
India

Nxfo is an Indian content creator on YouTube with 751 subscribers, publishing 84 videos which altogether total approximately 4.42 thousand views.

Created on ● Channel Link: https://www.youtube.com/channel/UCKTvMr7TCbScpRdXk9XQ9lA





Top 100 Most Viewed Videos by Nxfo


Video TitleViewsCategoryGame
1.BGP Configuration part 1 | Fortigate Firewall678
2.SNMP trap configuration on Fortigate637
3.Monitor Fortigate with PRTG Sensors586
4.OSPF Configuration | In Fortinet Firewall571
5.BGP Configuration Part 2 | Fortigate Firewall547
6.FortiManager in GNS3 | Fortimanager484
7.Active Active HA configuration in Fortigate302
8.ADOMs in Fortigate226
9.Forward logs to FortiAnalyzer | Fortinet95Vlog
10.RIP Routing Concept Fortigate Firewall47
11.FortiAnalyser in GNS334
12.Active Passive HA configuration in Fortigate26
13.FortiGate in GNS3 | Fortinet22
14.Installing CA Certificate | Palo Alto20
15.BGP Routing Concept | Fortinet Firewall18
16.PRTG installation | Fortinet13
17.Export Config Factory Reset Import Config | Palo Alto12
18.Global Protect Portal and SSL Client VPN Access | Palo Alto11
19.Wildfire Analysis | Palo Alto11
20.Concept of Higher Availability HA in Fortigate10
21.RIP Routing Concept Fortigate Firewall7
22.Evil Twin Method – Clone Wireless Access Points to Steal Data5
23.Install Metasploitable4
24.OSPF Routing Concept | OSPF in Fortinet Firewall4
25.Crack WPA2-PSK Passwords Using Aircrack-ng Tool | Ethical Hacking Tutorial4
26.Zone Protection and DoS | Palo Alto4
27.PAN OS Software Update | Palo Alto4Vlog
28.DoS Protection | Palo Alto3
29.IPsec Site to Site VPN | Palo Alto3
30.Introduction | Palo Alto2
31.Authentication Captive Portal | Palo Alto2
32.Cloud Pentesting Basics | CEH2
33.Panorama | Palo Alto2
34.High Availability HA | Palo Alto2
35.Nmap Tutorial 2025 | The King of Network Scanners Explained2
36.IPSEC Introduction | Fortigate_Infrastructure | Fortigate2
37.Global Protect and Portal Settings | Palo Alto2
38.Security Control Types Explained | Administrative, Technical & Physical Controls2Security Control
39.Incident Response Phases Preparation to Lessons Learned2The Incident
40.DHCP Relay Configuration | Palo Alto1
41.SOC Roles and Playbooks1
42.Static Routes Concept in Fortiget Firewall1
43.DHCP Server Configuration | Palo Alto1
44.Role Base Administration | Palo Alto1
45.Dynamic NAT PAT | Palo Alto1
46.Layer 2 Switching | Fortigate_Infrastructure1
47.Kali Linux Basics Terminal and CLI Part 2 | Ethical Hacking Bootcamp1
48.Home Lab | Palo Alto1
49.Static Routes Configuration in Fortiget Firewall1
50.What is Cybersecurity? | Cybersecurity Explained for Beginners1
51.Basic Settings and License | Palo Alto1
52.File Blocking | Palo Alto1
53.Overview of Palo Alto Certifications | Palo Alto Firewall1
54.How to Search for Anyone Online | Best People Search Tool Tutorial 20251
55.Static Source NAT | Palo Alto0
56.Application Control App ID and Filters | Palo Alto0
57.Creating a Sub Interface | Palo Alto0
58.Anti Spyware | Palo Alto0
59.Destination NAT | Palo Alto0
60.Mobile Legends: Bang Bang0Mobile Legends: Bang Bang
61.Interface Management Profile | Palo Alto0
62.Lab Topology | Palo Alto0Vlog
63.Virtual Domains | Fortigate_Infrastructure | Fortigate0
64.Software Defined WAN | Fortigate_Infrastructure | Fortigate0
65.Installation Preparation | Palo Alto0
66.Antivirus | Palo Alto0
67.Mobail legend (PLAYING KARMA )0PLAYERUNKNOWN'S Battlegrounds Mobile
68.XMX_PUBG LIVE0PLAYERUNKNOWN'S Battlegrounds
69.SSL Decryption Https Inspection | Palo Alto0
70.Introduction to Security Policies | Palo Alto0
71.Interface Settings | Palo Alto0
72.Enable User ID | Palo Alto0
73.VPN Zone and Tunnel Interface | Palo Alto0
74.Creating a Security Zone | Palo Alto0
75.Vulnerability Protection | Palo Alto0
76.Static Route | Palo Alto0
77.LDAP and Authentication Profiles | Palo Alto0
78.Virtual Firewall Installation | Palo Alto0
79.Data Filters | Palo Alto0
80.Kali Linux Basics Terminal and CLI Part 1 | Ethical Hacking Bootcamp0
81.URL Filtering | Palo Alto0
82.Introduction | Fortigate_Infrastructure0
83.VM Metasploitable Basics to Advanced0
84.Use of Tags | Palo Alto0