€ 35,00

 

Introduction to FortiGate Part-1 Infrastructure Fortinet Network Security Introduction (Black and White Edition)
di Daniel Howard,  2020,  Indipendently Published
INFORMATICA
ISBN: 9798656785860
condizioni: NUOVO

Note:
Network Security Expert 4 Study Guide | Part-I
Fortinet Network Security Introduction

Are you looking to step into the Network Security field with the Fortigate firewall? Or are you currently required to manage a FortiGate NGFW for your organization? Then this is the right book for you! The FortiGate is an amazing device with many cybersecurity features to protect your network. If you are new to FortiGate’s, then this is the perfect book for you! This book covers a general overview of working with Fortinet. Also, you gain a solid understanding of day to day administrative tasks. Next, you understand how FortiGate interacts with the various layer-2 protocols. You will also get a chance to filter network traffic and apply security policies, which is very exciting. Lastly, you learn about the session table and how Fortigate handles traffic. Below is a full list of what this book covers:

Chapter One | Introduction to FortiGate

Identify platform features of FortiGate
Describe Security Processor Unit SPU
Identify factory defaults
Understand the different operational modes
Understand FortiGate and FortiGuard Relationship
Manage administrator profiles•Manage administrative profiles
Manage network interfaces
Manage basic services
backup and restore config file
upgrade and downgrade firmware
Understand CLI structure
Understand GUI navigation
Initial Configuration

Chapter Two | Layer two technologies

Configuration of layer-2 VLANs
Describe VLANs and VLAN tagging process
Describe FortiOS Transparent Mode
Configure FortiOS Transparent Mode settings
Describe Transparent Mode Bridge Table
Describe MAC forwarding•Describe how to find MAC address on FortiOS
Describe Forwarding Domains•Describe and configure Virtual Switches
Describe Spanning Tree Protocol
Describe and Configure various NAT Mode layer-2 protocols
Describe and configure Layer-3 VLAN interface
Describe Virtual Wire Pairing
Describe and Configure VXLAN

Chapter Three | Layer Three Technologies

Configuration of Static Routes
implementation of Policy-Based Routes
Control traffic for well-known Internet Services
Interpret the FortiOS Routing Table
Understand FortiOS anti-spoofing mechanism
Implement route failover and floating route
Understand ECMP
Recognize active route vs. standby route vs. inactive routes
Use built-in sniffer and diagnose flow debug tools,•Understand Session Table Entry.

Chapter Four | Firewall Policy and NAT

Identify components in Firewall Policy
Describe how traffic matches Firewall Policy Entries
Configure Firewall Policy Logging•Describe Policy GUI list views
Describe Policy ID’s vs. Policy Sequence numbers
Described where objects are referenced
Explain Name restrictions on Firewall Policies
Perform Firewall Policy re-ordering•Describe NAT and PAT
Explain different configuration modes for NAT
Configure and Describe SNAT and DNAT VIPs
Troubleshoot NAT issues

Scrivi una recensione

Nome:

La tua recensione:

Note: HTML non è tradotto!

Voto: Pessimo Buono

Inserisci il codice mostrato in figura: