Home Page Icon
Home Page
Table of Contents for
Cover image
Close
Cover image
by Josh More, Bruce Matsugu, Rick Basile, Ken McAlpine, Martín H. Hoz Salvador, Ken
UTM Security with Fortinet
Cover image
Title page
Table of Contents
Copyright
Dedications
Acknowledgements
About The Author
Foreword
Preface
Intended Audience
Organization of this book
Section I - General Introduction
Section I: General Introduction
Chapter 1. Introduction to UTM (Unified Threat Management)
Introduction
Unified Threat Management (UTM) Foundations
Solving Problems with UTM
Current UTM Market Landscape
Evolution and Future of UTM
Chapter 2. FortiGate Hardware Overview
FortiGate Hardware Overview
FortiGate Custom Hardware Accelerations Overview
The ‘Black Art’ of FortiGate Sizing
Centralized Management Platform Overview
Fortinet Product Portfolio
References
Chapter 3. FortiOS Introduction
Fortios Architecture
System Options
Section II: UTM Technologies Explained
Chapter 4. Connectivity and Networking Technologies
Operating Modes
Connectivity
Routing
Servicing users
Virtual Domains (VDOM)
High Availability
Chapter 5. Base Network Security
Firewall
Chapter 6. Application Security
FortiGuard
Application Control
Network Antivirus/AntiSpyware
Intrusion Protection (IPS)
Web Filtering
Chapter 7. Extended UTM Functionality
Introduction
WAN Optimization
Web Caching
Endpoint Control
Data Leak Prevention (DLP)
Vulnerability Scan
References
Chapter 8. Analyzing your Security Information with FortiAnalyzer
Configuring the FortiAnalyzer
Configuring Reports
FortiAnalyzer Generated Alerts
Log Aggregation
Log Forwarding
Log Migration
Configuring FortiGates
Additional FortiAnalyzer Features
Chapter 9. Managing Your Security Configurations with FortiManager
System Settings Console
Administrative Domains
Device Manager
Device Level Management & Configuration
Policy & Objects
Managing Site-to-Site Distributed IPSec VPNs
Conclusion
Section III: Implementing a Security (UTM) Project
Chapter 10. Designing a Security Solution
Introduction
Security as a Project
Establishing a Network Security Architecture
Gathering Information for Sizing and Configuring a UTM Solution
Considerations for Planning a UTM Deployment
Chapter 11. Security with Distributed Enterprise and Retail
Security Needs and Challenges
Example Distributed Enterprise and Retail Environment Topologies
Chapter 12. Security on Financial Services
Electronic Trading
Market Data Networks
The Industry Trends
The Challenge
Market Data Multicast Distribution
Protocol-Independent Multicast-Source-Specific Multicast (PIM-SSM)
References
Appendix A. Troubleshooting the Project
Introduction
Dealing with Cost Issues
Dealing with Timing
Engaging Fortinet Professional Services
Engaging Fortinet Technical Support
Appendix B. Troubleshooting Technically
Introduction
Resources
Basic Troubleshooting Overview
Basic Troubleshooting Tools
Advanced Troubleshooting Tools
Appendix C. Country Codes
Glossary
References
Subject Index
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
Title page
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset