Fortinet Fortigate Security
Introduction to FortiGate
Logging and Monitoring
Network Address Translation (NAT)
Basic IPsec VPN
After completing the training you will master the following topics.
FortiGate UTM capabilities
Disable threats and misuse: Viruses, torrents, and inappropriate websites
Control network access by device type
Verify user IDs with firewall policies
Port Forwarding, Source NAT, and Destination NAT Defining
Using SSL VPN for secure access to your internal network
How to create an IPsec VPN tunnel between two FortiGate devices
Policy-based and tunnel-based IPsec VPN comparison
Interpretation of log records
GUI and CLI usage for management
Commissioning using the correct operating mode
Proxy server deployment using firewall policies, authentication, and caching
Beyond checking the port number by checking application
WHO SHOULD ATTEND
Everyone who is or will be responsible for the management of the FortiGate device should be involved in daily operations.
Training recipients must have the knowledge and experience of TCP / IP network. It is also recommended to have basic knowledge about network wall concepts.