Getting started with FortiGate
This book will take you from complete novice to expert user in simple, progressive steps. It covers all the concepts you need to administer a FortiGate unit with lots of examples and clear explanations. Learn about FortiGate and FortiOS 5 starting from the ground up, with no previous knowledge of Fo...
Autor principal: | |
---|---|
Otros Autores: | |
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Birmingham :
Packt Publishing
2013.
|
Edición: | 1st edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627924006719 |
Tabla de Contenidos:
- Intro
- Getting Started with FortiGate
- Table of Contents
- Getting Started with FortiGate
- Credits
- Foreword
- About the Authors
- About the Reviewers
- www.PacktPub.com
- Support files, eBooks, discount offers and more
- Why Subscribe?
- Free Access for Packt account holders
- Instant Updates on New Packt Books
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Errata
- Piracy
- Questions
- 1. First Steps
- Administering a FortiGate
- Unboxing the FortiGate and license options
- First access to a FortiGate
- Changing the admin password, name of the host, time, and time zone
- Selecting the operation mode and configuring the internal and external interfaces
- Registering your FortiGate
- Updating the system firmware
- Restoring a device
- Updating definitions and services
- VLANs and logical interfaces
- Static routing
- Policy routing
- Dynamic routing
- Introducing OSPF
- Configuring OSPF on a FortiGate
- OSPF router ID
- OSPF area
- Network
- Interfaces
- Monitoring OSPF routes
- Summary
- 2. Filters, Policies, and Endpoint Security
- Processing a data packet inside a FortiGate
- Firewall features
- Interfaces and zones
- Firewall objects
- Addresses
- Services
- Schedules
- UTM profiles
- Antivirus
- Intrusion protection
- Web filter
- Client reputation
- Traffic shaping
- Security policies
- FortiClient
- FortiClient management
- Bring Your Own Device (BYOD)
- Summary
- 3. VPNs and Tunneling
- SSL VPN
- Introduction to SSL VPN portal with web-only mode
- Introduction to SSL VPN portal with tunnel mode
- Configuring the SSL VPN portal
- Configuring the SSL VPN settings
- Configuring the SSL VPN portal
- Configuring users and groups for the SSL VPN portal.
- Configuring a policy for the SSL VPN portal
- FortiGate IPsec VPN
- Configuring an IPsec VPN
- Designing a Gateway-to-Gateway VPN
- Hub-and-Spoke VPN
- Dialup VPN
- FortiClient dialup client
- L2TP VPN
- Summary
- 4. High Availability
- Link aggregation
- Virtual MAC addresses
- FortiGate Cluster Protocol
- Active-Passive and Active-Active Clusters
- FortiGate Session Life Support Protocol
- Virtual Router Redundancy Protocol
- Full mesh high availability
- Introducing virtual domains
- VDOMs and virtual clustering
- Summary
- 5. Troubleshooting
- Base system diagnostics
- Troubleshooting routing
- Layer 2 and layer 3 TCP/IP diagnostics
- Troubleshooting security policies and profiles
- FortiOS packet sniffer
- Firewall session lists information
- Debugging URL and anti-spam filters
- Troubleshooting virtual domains
- Troubleshooting VPN
- Troubleshooting High Availability (HA)
- Troubleshooting HA clusters
- Troubleshooting virtual clustering
- Summary
- Index.