menu
{ "item_title" : "Introduction to FortiGate Part-1 Infrastructure", "item_author" : [" Daniel Howard "], "item_description" : "Network Security Expert 4 Study Guide Part-IFortinet Network Security IntroductionAre you looking to step into the Network Security field with the Fortigate firewall? Or are you currently required to manage a FortiGate NGFW for your organization? Then this is the right book for youThe FortiGate is an amazing device with many cybersecurity features to protect your network. If you are new to FortiGate's, then this is the perfect book for youThis book covers a general overview of working with Fortinet. Also, you gain a solid understanding of day to day administrative tasks. Next, you understand how FortiGate interacts with the various layer-2 protocols. You will also get a chance to filter network traffic and apply security policies, which is very exciting. Lastly, you learn about the session table and how Fortigate handles traffic. Below is a full list of what this book covers: Chapter One Introduction to FortiGateIdentify platform features of FortiGateDescribe Security Processor Unit SPUIdentify factory defaultsUnderstand the different operational modesUnderstand FortiGate and FortiGuard RelationshipManage administrator profiles-Manage administrative profilesManage network interfacesManage basic servicesbackup and restore config fileupgrade and downgrade firmwareUnderstand CLI structureUnderstand GUI navigationInitial ConfigurationChapter Two Layer two technologiesConfiguration of layer-2 VLANsDescribe VLANs and VLAN tagging processDescribe FortiOS Transparent ModeConfigure FortiOS Transparent Mode settingsDescribe Transparent Mode Bridge TableDescribe MAC forwarding-Describe how to find MAC address on FortiOSDescribe Forwarding Domains-Describe and configure Virtual SwitchesDescribe Spanning Tree ProtocolDescribe and Configure various NAT Mode layer-2 protocolsDescribe and configure Layer-3 VLAN interfaceDescribe Virtual Wire PairingDescribe and Configure VXLANChapter Three Layer Three TechnologiesConfiguration of Static Routesimplementation of Policy-Based RoutesControl traffic for well-known Internet ServicesInterpret the FortiOS Routing TableUnderstand FortiOS anti-spoofing mechanismImplement route failover and floating routeUnderstand ECMPRecognize active route vs. standby route vs. inactive routesUse built-in sniffer and diagnose flow debug tools, -Understand Session Table Entry.Chapter Four Firewall Policy and NATIdentify components in Firewall PolicyDescribe how traffic matches Firewall Policy EntriesConfigure Firewall Policy Logging-Describe Policy GUI list viewsDescribe Policy ID's vs. Policy Sequence numbersDescribed where objects are referencedExplain Name restrictions on Firewall PoliciesPerform Firewall Policy re-ordering-Describe NAT and PATExplain different configuration modes for NATConfigure and Describe SNAT and DNAT VIPsTroubleshoot NAT issues", "item_img_path" : "https://covers1.booksamillion.com/covers/bam/9/79/865/678/9798656785860_b.jpg", "price_data" : { "retail_price" : "29.99", "online_price" : "29.99", "our_price" : "29.99", "club_price" : "29.99", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Introduction to FortiGate Part-1 Infrastructure|Daniel Howard

Introduction to FortiGate Part-1 Infrastructure : Fortinet Network Security Introduction (Black and White Edition)

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

Network Security Expert 4 Study Guide Part-I
Fortinet Network Security Introduction

Are you looking to step into the Network Security field with the Fortigate firewall? Or are you currently required to manage a FortiGate NGFW for your organization? Then this is the right book for you The FortiGate is an amazing device with many cybersecurity features to protect your network. If you are new to FortiGate's, then this is the perfect book for you This book covers a general overview of working with Fortinet. Also, you gain a solid understanding of day to day administrative tasks. Next, you understand how FortiGate interacts with the various layer-2 protocols. You will also get a chance to filter network traffic and apply security policies, which is very exciting. Lastly, you learn about the session table and how Fortigate handles traffic. Below is a full list of what this book covers:

Chapter One Introduction to FortiGate

Identify platform features of FortiGate
Describe Security Processor Unit SPU
Identify factory defaults
Understand the different operational modes
Understand FortiGate and FortiGuard Relationship
Manage administrator profiles-Manage administrative profiles
Manage network interfaces
Manage basic services
backup and restore config file
upgrade and downgrade firmware
Understand CLI structure
Understand GUI navigation
Initial Configuration

Chapter Two Layer two technologies

Configuration of layer-2 VLANs
Describe VLANs and VLAN tagging process
Describe FortiOS Transparent Mode
Configure FortiOS Transparent Mode settings
Describe Transparent Mode Bridge Table
Describe MAC forwarding-Describe how to find MAC address on FortiOS
Describe Forwarding Domains-Describe and configure Virtual Switches
Describe Spanning Tree Protocol
Describe and Configure various NAT Mode layer-2 protocols
Describe and configure Layer-3 VLAN interface
Describe Virtual Wire Pairing
Describe and Configure VXLAN

Chapter Three Layer Three Technologies

Configuration of Static Routes
implementation of Policy-Based Routes
Control traffic for well-known Internet Services
Interpret the FortiOS Routing Table
Understand FortiOS anti-spoofing mechanism
Implement route failover and floating route
Understand ECMP
Recognize active route vs. standby route vs. inactive routes
Use built-in sniffer and diagnose flow debug tools, -Understand Session Table Entry.

Chapter Four Firewall Policy and NAT

Identify components in Firewall Policy
Describe how traffic matches Firewall Policy Entries
Configure Firewall Policy Logging-Describe Policy GUI list views
Describe Policy ID's vs. Policy Sequence numbers
Described where objects are referenced
Explain Name restrictions on Firewall Policies
Perform Firewall Policy re-ordering-Describe NAT and PAT
Explain different configuration modes for NAT
Configure and Describe SNAT and DNAT VIPs
Troubleshoot NAT issues

This item is Non-Returnable

Details

  • ISBN-13: 9798656785860
  • ISBN-10: 9798656785860
  • Publisher: Independently Published
  • Publish Date: June 2020
  • Dimensions: 11 x 8.5 x 0.71 inches
  • Shipping Weight: 1.74 pounds
  • Page Count: 340

Related Categories

You May Also Like...

    1

BAM Customer Reviews