UTM Security with Fortinet: Mastering FortiOS
Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet’s FortiGate in the enterprise.
- Provides tips, tricks, and proven suggestions and guidelines to set up FortiGate implementations
- Presents topics that are not covered (or are not covered in detail) by Fortinet’s documentation
- Discusses hands-on troubleshooting techniques at both the project deployment level and technical implementation area
Table of Contents
Part I: General Introduction
Chapter 1. Introduction to Unified Threat Management (UTM)
Chapter 2. FortiGate Hardware Platform Overview
Chapter 3. FortiOS Introduction
Part II: UTM Technologies Explained
Chapter 4. Connectivity and Networking Technologies
Chapter 5. Base Network Security
Chapter 6. Application Security
Chapter 7. Extended UTM Functionality
Chapter 8. Analyzing Your Security Information with FortiAnalyzer
Chapter 9. Managing Your Security Configurations with FortiManager
Part III: Implementing a Security (UTM) Project
Chapter 10. Designing a Security Solution
Chapter 11. Security on Distributed Enterprises/Retail (UTM Goes Shopping)
Chapter 12. Security on Financial Institutions (UTM Goes to the Bank)
Appendix A. Troubleshooting the Project
Appendix B. Troubleshooting Technically
Book Details
- Paperback: 452 pages
- Publisher: Syngress (December 2012)
- Language: English
- ISBN-10: 1597497479
- ISBN-13: 978-1597497473