Getting Started with FortiGate
Book Details:
Pages: | 126 |
Published: | Nov 25 2013 |
Posted: | Nov 19 2014 |
Language: | English |
Book format: | PDF |
Book size: | 3.3 MB |
Book Description:
Simplify and protect your network using the FortiGate network security appliance Overview Learn about FortiGate and FortiOS 5 starting from the ground up, with no previous knowledge of Fortinet products Understand and deliver Routing, VLANs, NAT, and high availability solutions using FortiGate units Design and deploy security policies, content filters, and endpoint security using UTM features inside a FortiGate unit In Detail FortiGate from Fortinet is a highly successful family of appliances enabled to manage routing and security on different layers, supporting dynamic protocols, IPSEC and VPN with SSL, application and user control, web contents and mail scanning, endpoint checks, and more, all in a single platform. The heart of the appliance is the FortiOS (FortiOS 5 is the latest release) which is able to unify a friendly web interface with a powerful command line to deliver high performance. FortiGate is able to give users the results they usually achieve at a fraction of the cost of what they would have to invest with other vendors. This practical, hands-on guide addresses all the tasks required to configure and manage a FortiGate unit in a logical order. The book starts with topics related to VLAN and routing (static and advanced) and then discusses in full the UTM features integrated in the appliance. The text explains SSL VPN and IPSEC VPN with all the required steps you need to deploy the aforementioned solutions. High availability and troubleshooting techniques are also explained in the last two chapters of the book. This concise, example-oriented book explores all the concepts you need to administer a FortiGate unit. You will begin by covering the basic tools required to administer a FortiGate unit, including NAT, routing, and VLANs. You will then be guided through the concepts of firewalling, UTM inside the appliance, tunnelling using SSL, and IPSEC and dial-up configurations. Next, you will get acquainted with important topics like high availability and Vdoms. Finally, you will end the book with an overview of troubleshooting tools and techniques. What you will learn from this book Configure static and dynamic routing in a FortiGate unit Filter spam, viruses, and illegitimate Internet activities using the UTM features of FortiGate Enforce compliance and block threats using IPS and endpoint controls Design tunnels with SSL and IPSEC to extend your network in a secure manner Use high availability solutions including link aggregation, clustering, and virtual domains Identify the main features and uses of the Forticlient software Troubleshoot issues related to the aforementioned features Approach This book is a step-by-step tutorial that will teach you everything you need to know about the deployment and management of FortiGate, including high availability, complex routing, various kinds of VPN working, user authentication, security rules and controls on applications, and mail and Internet access.
Identify Objects in the Physical World with Arduino
If you want to experiment with radio frequency identification (RFID), this book is the perfect place to start. All you need is some experience with Arduino and Processing, the ability to connect basic circuits on a breadboard with jumper wire-and you're good to go. You'll be guided through three hands-on projects that let you experience RFID in action. RFID is used in various applications, such as identifying store items or accessing a toll road with an EZPass system. After you build each of the book's projects in succession, you'll have the knowledge to pursue RFID applications of your own. Use Processing to get a sense of how RFID readers behave Connect Arduino to an RFID reader and discover how to use RFID tags as keys Automate your office or home...
Linux-Powered Electronic Projects With Python and JavaScript
Many people think of Linux as a computer operating system, running on users' desktops and powering servers. But Linux can also be found inside many consumer electronics devices. Whether they're the brains of a cell phone, cable box, or exercise bike, embedded Linux systems blur the distinction between computer and device. Many makers love microcontroller platforms such as Arduino, but as the complexity increases in their projects, they need more power for applications, such as computer vision. The BeagleBone is an embedded Linux board for makers. It's got built-in networking, many inputs and outputs, and a fast processor to handle demanding tasks. This book introduces you to both the original BeagleBone and the new BeagleBone Black and gets you start...
Getting Started with RACF
Leverage Your Security Expertise in IBM System z Mainframe Environments For over 40 years, the IBM mainframe has been the backbone of the world's largest enterprises. If you're coming to the IBM System z mainframe platform from UNIX , Linux , or Windows , you need practical guidance on leveraging its unique security capabilities. Now, IBM experts have written the first authoritative book on mainframe security specifically designed to build on your experience in other environments. Even if you've never logged onto a mainframe before, this book will teach you how to run today's z/OS operating system command line and ISPF toolset and use them to efficiently perform every significant security administration task. Don't have a mainframe availabl...
2007 - 2021 © eBooks-IT.org