Note: Network Security Expert 4 Study Guide | Part-I Fortinet Network Security Introduction
Are you looking to step into the Network Security field with the Fortigate firewall? Or are you currently required to manage a FortiGate NGFW for your organization? Then this is the right book for you! The FortiGate is an amazing device with many cybersecurity features to protect your network. If you are new to FortiGate’s, then this is the perfect book for you! This book covers a general overview of working with Fortinet. Also, you gain a solid understanding of day to day administrative tasks. Next, you understand how FortiGate interacts with the various layer-2 protocols. You will also get a chance to filter network traffic and apply security policies, which is very exciting. Lastly, you learn about the session table and how Fortigate handles traffic. Below is a full list of what this book covers:
Chapter One | Introduction to FortiGate
Identify platform features of FortiGate Describe Security Processor Unit SPU Identify factory defaults Understand the different operational modes Understand FortiGate and FortiGuard Relationship Manage administrator profiles•Manage administrative profiles Manage network interfaces Manage basic services backup and restore config file upgrade and downgrade firmware Understand CLI structure Understand GUI navigation Initial Configuration
Chapter Two | Layer two technologies
Configuration of layer-2 VLANs Describe VLANs and VLAN tagging process Describe FortiOS Transparent Mode Configure FortiOS Transparent Mode settings Describe Transparent Mode Bridge Table Describe MAC forwarding•Describe how to find MAC address on FortiOS Describe Forwarding Domains•Describe and configure Virtual Switches Describe Spanning Tree Protocol Describe and Configure various NAT Mode layer-2 protocols Describe and configure Layer-3 VLAN interface Describe Virtual Wire Pairing Describe and Configure VXLAN
Chapter Three | Layer Three Technologies
Configuration of Static Routes implementation of Policy-Based Routes Control traffic for well-known Internet Services Interpret the FortiOS Routing Table Understand FortiOS anti-spoofing mechanism Implement route failover and floating route Understand ECMP Recognize active route vs. standby route vs. inactive routes Use built-in sniffer and diagnose flow debug tools,•Understand Session Table Entry.
Chapter Four | Firewall Policy and NAT
Identify components in Firewall Policy Describe how traffic matches Firewall Policy Entries Configure Firewall Policy Logging•Describe Policy GUI list views Describe Policy ID’s vs. Policy Sequence numbers Described where objects are referenced Explain Name restrictions on Firewall Policies Perform Firewall Policy re-ordering•Describe NAT and PAT Explain different configuration modes for NAT Configure and Describe SNAT and DNAT VIPs Troubleshoot NAT issues |