Fortinet Fortigate Security
COURSE OUTLINE
Introduction to FortiGate
Logging and Monitoring
Firewall
Network Address Translation (NAT)
Firewall Authentication
SSL VPN
Basic IPsec VPN
Antivirus
Explicit Proxy
Web Filtering
Application Control
COURSE OBJECTIVES
After completing the training you will master the following topics.
FortiGate UTM capabilities
Disable threats and misuse: Viruses, torrents, and inappropriate websites
Control network access by device type
Verify user IDs with firewall policies
Port Forwarding, Source NAT, and Destination NAT Defining
Using SSL VPN for secure access to your internal network
How to create an IPsec VPN tunnel between two FortiGate devices
Policy-based and tunnel-based IPsec VPN comparison
Interpretation of log records
Report generation
GUI and CLI usage for management
Commissioning using the correct operating mode
Proxy server deployment using firewall policies, authentication, and caching
Beyond checking the port number by checking application
WHO SHOULD ATTEND
Everyone who is or will be responsible for the management of the FortiGate device should be involved in daily operations.
PREREQUIREMENTS
Training recipients must have the knowledge and experience of TCP / IP network. It is also recommended to have basic knowledge about network wall concepts.