Getting started with FortiGate simplify and protect your network using the FortiGate network security applicance /: simplify and protect your network using the FortiGate network security applicance. (2013)
- Record Type:
- Book
- Title:
- Getting started with FortiGate simplify and protect your network using the FortiGate network security applicance /: simplify and protect your network using the FortiGate network security applicance. (2013)
- Main Title:
- Getting started with FortiGate simplify and protect your network using the FortiGate network security applicance
- Further Information:
- Note: Rosato Fabbri, Fabrizio Volpe.
- Other Names:
- Fabbri, Rosato
Volpe, Fabrizio - Contents:
- Cover; Copyright; Credits; Foreword; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: First Steps; Administering a FortiGate; Unboxing the FortiGate and license options; First access to a FortiGate; Changing the admin password, name of the host, time, and time zone; Selecting the operation mode and configuring the internal and external interfaces; Registering your FortiGate; Updating the system firmware; Restoring a device; Updating definitions and services; VLANs and logical interfaces; Static routing; Policy routing; Dynamic routing. Introducing OSPFConfiguring OSPF on a Fortigate; OSPF router ID; OSPF area; Network; Interfaces; Monitoring OSPF routes; Summary; Chapter 2: Filters, Policies, and Endpoint Security; Processing a data packet inside a FortiGate; Firewall features; Interfaces and zones; Firewall objects; Addresses; Services; Schedules; UTM profiles; Antivirus; Intrusion protection; Web filter; Client reputation; Traffic Shaping; Security policies; FortiClient; FortiClient management; Bring Your Own Device (BYOD); Summary; Chapter 3: VPNs and Tunneling; SSL VPN; Introduction to SSL VPN portal with web-only mode. Introduction to SSL VPN portal with tunnel modeConfiguring the SSL VPN portal; Configuring the SSL VPN settings; Configuring the SSL VPN portal; Configuring users and groups for the SSL VPN portal; Configuring a policy for the SSL VPN portal; FortiGate IPsec VPN; Configuring an IPsec VPN; Designing aCover; Copyright; Credits; Foreword; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: First Steps; Administering a FortiGate; Unboxing the FortiGate and license options; First access to a FortiGate; Changing the admin password, name of the host, time, and time zone; Selecting the operation mode and configuring the internal and external interfaces; Registering your FortiGate; Updating the system firmware; Restoring a device; Updating definitions and services; VLANs and logical interfaces; Static routing; Policy routing; Dynamic routing. Introducing OSPFConfiguring OSPF on a Fortigate; OSPF router ID; OSPF area; Network; Interfaces; Monitoring OSPF routes; Summary; Chapter 2: Filters, Policies, and Endpoint Security; Processing a data packet inside a FortiGate; Firewall features; Interfaces and zones; Firewall objects; Addresses; Services; Schedules; UTM profiles; Antivirus; Intrusion protection; Web filter; Client reputation; Traffic Shaping; Security policies; FortiClient; FortiClient management; Bring Your Own Device (BYOD); Summary; Chapter 3: VPNs and Tunneling; SSL VPN; Introduction to SSL VPN portal with web-only mode. Introduction to SSL VPN portal with tunnel modeConfiguring the SSL VPN portal; Configuring the SSL VPN settings; Configuring the SSL VPN portal; Configuring users and groups for the SSL VPN portal; Configuring a policy for the SSL VPN portal; FortiGate IPsec VPN; Configuring an IPsec VPN; Designing a Gateway-to-Gateway VPN; Hub-and-Spoke VPN; Dialup VPN; FortiClient dialup client; L2TP VPN; Summary; Chapter 4: High Availability; Link aggregation; Virtual MAC addresses; FortiGate Cluster Protocol; Active-Passive and Active-Active Clusters; FortiGate Session Life Support Protocol. Virtual Router Redundancy ProtocolFull mesh high availability; Introducing virtual domains; VDOMs and virtual clustering; Summary; Chapter 5: Troubleshooting; Base system diagnostics; Troubleshooting routing; Layer 2 and layer 3 TCP/IP diagnostics; Troubleshooting security policies and profiles; FortiOS packet sniffer; Firewall session lists information; Debugging URL and anti-spam filters; Troubleshooting virtual domains; Troubleshooting VPN; Troubleshooting High Availability (HA); Troubleshooting HA clusters; Troubleshooting virtual clustering; Summary; Index. … (more)
- Publisher Details:
- Birmingham : Packt Publishing
- Publication Date:
- 2013
- Extent:
- 1 online resource
- Subjects:
- 005.8
COMPUTERS -- Security -- Networking
Computer security
COMPUTERS / Security / General
COMPUTERS / Security / Networking
Computer security
Computer security
Computer security
COMPUTERS -- Enterprise Applications -- General
Electronic books - Languages:
- English
- ISBNs:
- 1306157676
9781306157674
9781782178217 - Related ISBNs:
- 178217821X
1782178201
9781782178200 - Notes:
- Note: Print version record.
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.87303
- Ingest File:
- 01_041.xml