Back to Search
ISBN 9798656785860 is currently unpriced. Please contact us for pricing.
Available options are listed below:

Introduction to FortiGate Part-1 Infrastructure: Fortinet Network Security Introduction (Black and White Edition)

AUTHOR Howard, Daniel
PUBLISHER Independently Published (06/24/2020)
PRODUCT TYPE Paperback (Paperback)

Description

Network Security Expert 4 Study Guide Part-I
Fortinet Network Security Introduction

Are you looking to step into the Network Security field with the Fortigate firewall? Or are you currently required to manage a FortiGate NGFW for your organization? Then this is the right book for you The FortiGate is an amazing device with many cybersecurity features to protect your network. If you are new to FortiGate's, then this is the perfect book for you This book covers a general overview of working with Fortinet. Also, you gain a solid understanding of day to day administrative tasks. Next, you understand how FortiGate interacts with the various layer-2 protocols. You will also get a chance to filter network traffic and apply security policies, which is very exciting. Lastly, you learn about the session table and how Fortigate handles traffic. Below is a full list of what this book covers:

Chapter One Introduction to FortiGate

Identify platform features of FortiGate
Describe Security Processor Unit SPU
Identify factory defaults
Understand the different operational modes
Understand FortiGate and FortiGuard Relationship
Manage administrator profiles-Manage administrative profiles
Manage network interfaces
Manage basic services
backup and restore config file
upgrade and downgrade firmware
Understand CLI structure
Understand GUI navigation
Initial Configuration

Chapter Two Layer two technologies

Configuration of layer-2 VLANs
Describe VLANs and VLAN tagging process
Describe FortiOS Transparent Mode
Configure FortiOS Transparent Mode settings
Describe Transparent Mode Bridge Table
Describe MAC forwarding-Describe how to find MAC address on FortiOS
Describe Forwarding Domains-Describe and configure Virtual Switches
Describe Spanning Tree Protocol
Describe and Configure various NAT Mode layer-2 protocols
Describe and configure Layer-3 VLAN interface
Describe Virtual Wire Pairing
Describe and Configure VXLAN

Chapter Three Layer Three Technologies

Configuration of Static Routes
implementation of Policy-Based Routes
Control traffic for well-known Internet Services
Interpret the FortiOS Routing Table
Understand FortiOS anti-spoofing mechanism
Implement route failover and floating route
Understand ECMP
Recognize active route vs. standby route vs. inactive routes
Use built-in sniffer and diagnose flow debug tools, -Understand Session Table Entry.

Chapter Four Firewall Policy and NAT

Identify components in Firewall Policy
Describe how traffic matches Firewall Policy Entries
Configure Firewall Policy Logging-Describe Policy GUI list views
Describe Policy ID's vs. Policy Sequence numbers
Described where objects are referenced
Explain Name restrictions on Firewall Policies
Perform Firewall Policy re-ordering-Describe NAT and PAT
Explain different configuration modes for NAT
Configure and Describe SNAT and DNAT VIPs
Troubleshoot NAT issues

Show More
Product Format
Product Details
ISBN-13: 9798656785860
Binding: Paperback or Softback (Trade Paperback (Us))
Content Language: English
More Product Details
Page Count: 340
Carton Quantity: 11
Product Dimensions: 8.50 x 0.71 x 11.00 inches
Weight: 1.74 pound(s)
Country of Origin: US
Subject Information
BISAC Categories
Education | Computers & Technology
Education | Computer Science
Education | Security - Network Security
Descriptions, Reviews, Etc.
publisher marketing

Network Security Expert 4 Study Guide Part-I
Fortinet Network Security Introduction

Are you looking to step into the Network Security field with the Fortigate firewall? Or are you currently required to manage a FortiGate NGFW for your organization? Then this is the right book for you The FortiGate is an amazing device with many cybersecurity features to protect your network. If you are new to FortiGate's, then this is the perfect book for you This book covers a general overview of working with Fortinet. Also, you gain a solid understanding of day to day administrative tasks. Next, you understand how FortiGate interacts with the various layer-2 protocols. You will also get a chance to filter network traffic and apply security policies, which is very exciting. Lastly, you learn about the session table and how Fortigate handles traffic. Below is a full list of what this book covers:

Chapter One Introduction to FortiGate

Identify platform features of FortiGate
Describe Security Processor Unit SPU
Identify factory defaults
Understand the different operational modes
Understand FortiGate and FortiGuard Relationship
Manage administrator profiles-Manage administrative profiles
Manage network interfaces
Manage basic services
backup and restore config file
upgrade and downgrade firmware
Understand CLI structure
Understand GUI navigation
Initial Configuration

Chapter Two Layer two technologies

Configuration of layer-2 VLANs
Describe VLANs and VLAN tagging process
Describe FortiOS Transparent Mode
Configure FortiOS Transparent Mode settings
Describe Transparent Mode Bridge Table
Describe MAC forwarding-Describe how to find MAC address on FortiOS
Describe Forwarding Domains-Describe and configure Virtual Switches
Describe Spanning Tree Protocol
Describe and Configure various NAT Mode layer-2 protocols
Describe and configure Layer-3 VLAN interface
Describe Virtual Wire Pairing
Describe and Configure VXLAN

Chapter Three Layer Three Technologies

Configuration of Static Routes
implementation of Policy-Based Routes
Control traffic for well-known Internet Services
Interpret the FortiOS Routing Table
Understand FortiOS anti-spoofing mechanism
Implement route failover and floating route
Understand ECMP
Recognize active route vs. standby route vs. inactive routes
Use built-in sniffer and diagnose flow debug tools, -Understand Session Table Entry.

Chapter Four Firewall Policy and NAT

Identify components in Firewall Policy
Describe how traffic matches Firewall Policy Entries
Configure Firewall Policy Logging-Describe Policy GUI list views
Describe Policy ID's vs. Policy Sequence numbers
Described where objects are referenced
Explain Name restrictions on Firewall Policies
Perform Firewall Policy re-ordering-Describe NAT and PAT
Explain different configuration modes for NAT
Configure and Describe SNAT and DNAT VIPs
Troubleshoot NAT issues

Show More

Author: Howard, Daniel
Daniel Howard has worked as a software developer for over 15 years. He has worked at startups, Fortune 500 companies, and several in between. He has seen companies and individual developers struggle to move from one technology to another. He believes everybody can keep one foot firmly planted on one side and plant his other foot in the new technology, and wants to help them learn how to do so.
Show More
Paperback