Table of Contents

Cover image

Title page

Copyright

Dedications

Acknowledgements

About The Author

Foreword

Preface

Intended Audience

Organization of this book

Section I - General Introduction

Section I: General Introduction

Chapter 1. Introduction to UTM (Unified Threat Management)

Introduction

Unified Threat Management (UTM) Foundations

Solving Problems with UTM

Current UTM Market Landscape

Evolution and Future of UTM

Chapter 2. FortiGate Hardware Overview

FortiGate Hardware Overview

FortiGate Custom Hardware Accelerations Overview

The ‘Black Art’ of FortiGate Sizing

Centralized Management Platform Overview

Fortinet Product Portfolio

References

Chapter 3. FortiOS Introduction

Fortios Architecture

System Options

Section II: UTM Technologies Explained

Chapter 4. Connectivity and Networking Technologies

Operating Modes

Connectivity

Routing

Servicing users

Virtual Domains (VDOM)

High Availability

Chapter 5. Base Network Security

Firewall

Chapter 6. Application Security

FortiGuard

Application Control

Network Antivirus/AntiSpyware

Intrusion Protection (IPS)

Web Filtering

Chapter 7. Extended UTM Functionality

Introduction

WAN Optimization

Web Caching

Endpoint Control

Data Leak Prevention (DLP)

Vulnerability Scan

References

Chapter 8. Analyzing your Security Information with FortiAnalyzer

Configuring the FortiAnalyzer

Configuring Reports

FortiAnalyzer Generated Alerts

Log Aggregation

Log Forwarding

Log Migration

Configuring FortiGates

Additional FortiAnalyzer Features

Chapter 9. Managing Your Security Configurations with FortiManager

System Settings Console

Administrative Domains

Device Manager

Device Level Management & Configuration

Policy & Objects

Managing Site-to-Site Distributed IPSec VPNs

Conclusion

Section III: Implementing a Security (UTM) Project

Chapter 10. Designing a Security Solution

Introduction

Security as a Project

Establishing a Network Security Architecture

Gathering Information for Sizing and Configuring a UTM Solution

Considerations for Planning a UTM Deployment

Chapter 11. Security with Distributed Enterprise and Retail

Security Needs and Challenges

Example Distributed Enterprise and Retail Environment Topologies

Chapter 12. Security on Financial Services

Electronic Trading

Market Data Networks

The Industry Trends

The Challenge

Market Data Multicast Distribution

Protocol-Independent Multicast-Source-Specific Multicast (PIM-SSM)

References

Appendix A. Troubleshooting the Project

Introduction

Dealing with Cost Issues

Dealing with Timing

Engaging Fortinet Professional Services

Engaging Fortinet Technical Support

Appendix B. Troubleshooting Technically

Introduction

Resources

Basic Troubleshooting Overview

Basic Troubleshooting Tools

Advanced Troubleshooting Tools

Appendix C. Country Codes

Glossary. Glossary

References

Subject Index

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.129.39.252