Du er ikke logget ind
Der er desværre ikke nogen prishistorik tilgængelig for dette produkt.
Beskrivelse
Network Security Expert 4 Study Guide | Part-I
Fortinet Network Security Introduction
Are you looking to step into the Network Security field with the Fortigate firewall? Or are you currently required to manage a FortiGate NGFW for your organization? Then this is the right book for you! The FortiGate is an amazing device with many cybersecurity features to protect your network. If you are new to FortiGate's, then this is the perfect book for you! This book covers a general overview of working with Fortinet. Also, you gain a solid understanding of day to day administrative tasks. Next, you understand how FortiGate interacts with the various layer-2 protocols. You will also get a chance to filter network traffic and apply security policies, which is very exciting. Lastly, you learn about the session table and how Fortigate handles traffic. Below is a full list of what this book covers:
Chapter One | Introduction to FortiGate
Identify platform features of FortiGate
Describe Security Processor Unit SPU
Identify factory defaults
Understand the different operational modes
Understand FortiGate and FortiGuard Relationship
Manage administrator profiles•Manage administrative profiles
Manage network interfaces
Manage basic services
backup and restore config file
upgrade and downgrade firmware
Understand CLI structure
Understand GUI navigation
Initial Configuration
Chapter Two | Layer two technologies
Configuration of layer-2 VLANs
Describe VLANs and VLAN tagging process
Describe FortiOS Transparent Mode
Configure FortiOS Transparent Mode settings
Describe Transparent Mode Bridge Table
Describe MAC forwarding•Describe how to find MAC address on FortiOS
Describe Forwarding Domains•Describe and configure Virtual Switches
Describe Spanning Tree Protocol
Describe and Configure various NAT Mode layer-2 protocols
Describe and configure Layer-3 VLAN interface
Describe Virtual Wire Pairing
Describe and Configure VXLAN
Chapter Three | Layer Three Technologies
Configuration of Static Routes
implementation of Policy-Based Routes
Control traffic for well-known Internet Services
Interpret the FortiOS Routing Table
Understand FortiOS anti-spoofing mechanism
Implement route failover and floating route
Understand ECMP
Recognize active route vs. standby route vs. inactive routes
Use built-in sniffer and diagnose flow debug tools,•Understand Session Table Entry.
Chapter Four | Firewall Policy and NAT
Identify components in Firewall Policy
Describe how traffic matches Firewall Policy Entries
Configure Firewall Policy Logging•Describe Policy GUI list views
Describe Policy ID's vs. Policy Sequence numbers
Described where objects are referenced
Explain Name restrictions on Firewall Policies
Perform Firewall Policy re-ordering•Describe NAT and PAT
Explain different configuration modes for NAT
Configure and Describe SNAT and DNAT VIPs
Troubleshoot NAT issues