Du er ikke logget ind
Der er desværre ikke nogen prishistorik tilgængelig for dette produkt.
Beskrivelse
Network Security Expert 4 Study Guide | Part-IIFortinet Network Security IntroductionIntroduction to FortiGate Part-II Infrastructure picks up where Part-I left off. The book begins by going on FortiOS VDOM technology and Session Helpers. You will gain a solid understanding on how VDOM's work and why they are needed. You will also learn why Session Helpers exist. Also, you will have an opportunity to gain insight into how FortiGate High Availability technology works as well. You will feel confident in your HA deployment after reading this book I promise you! Next, we dig into FortiOS logging technology which is essential for any SOC. Next, we review some popular VPN technologies like IPsec and SSL. This book shows you how to configure and use both technologies on FortiGate. After VPNs, we step into FortiOS SDWAN technology which is hot right now! you will learn what SDWAN is and how to deploy it! lastly we finish up Part-II Infrastructure with a full chapter on troubleshooting all the technology covered in Part-I and Part-II.
VDOMs and Session Helpers | Chapter 5
- Configure, Define and Describe Session Helpers
- Understand and Configure ALG
- Define and describe VDOMs
- Understand Management VDOM
- Understand VDOM Administrators
- Configure multiple VDOMs
- understand and configure Inter-vdom link
- limit resource allocated to VDOMs
- Inter-VDOM Link Hardware Acceleration
- VDOM Diagnostics
High Availability | Chapter 6
- Identify Different Operation HA Modes
- Config HA
- Understand HA Election Process
- Identify primary secondary units
- Debug HA sync
- Configure Session sync
- HA failover types
- Identify how HA modes pass traffic
- Configure and understand Virtual Clustering
- Verify HA operations
- Upgrade HA firmware
- FortiGate Clustering Protocol
- HA Clustering Requirements
- HA Diagnostics
Logging and Monitoring | Chapter 7
- Log basics
- Describe performance and logging
- Identify local log storage
- configure logging
- Understand disk allocation
- Identify External log storage
- Configure log backups
- configure alert email and threat weight
- configure remote logging
- understand log transmission
- configure reliable logging and OFTPS
- understand miglogd
- Understand FortiView
IPsec VPN | Chapter 8
- Understand IPsec and IKE fundamentals
- Understand VPN topology
- Understand route-based VPN
- Configure Site-to-site VPN
- Understand ASIC offload with VPN
- Configure redundant VPNs
- VPN best practices
- Verify IPsec VPN
- Understand Dial-up VPN
SSL VPN | Chapter 9
- Understand SSL VPN concepts
- Describe the differences between SSL an IPsec
- Configure SSL VPN Modes
- Configure SSL Realms
- Configure SSL Authentcation
- Monitor SSL VPN users and logs
- Troubleshoot SSLVPN
SDWAN | Chapter 10
- Understand SDWAN concepts
- Understand SDWAN design
- Understand SDWAN requirements
- Configure SDWAN virtual link and load balance
- Configure SDWAN routing and policies
- Configure SDWAN health check
- understand SLA link quality measurements
- Understand SDWAN rules
- configure dynamic link selection
- Monitor SDWAN
- Verify SDWAN traffic
Diagnostics and Troubleshooting | Chapter 11
- Troubleshoot Layer-2
- Troubleshoot Routing
- Troubleshoot Firewall Policy
- Troubleshoot High Availability
- Troubleshoot Logging
- Troubleshoot IPsec
- Troubleshoot SSL VPN
- Troubleshoot SDWAN