Fortinet FortiGate I Multi Threat Security Systems Training

Print Friendly, PDF & Email
Introduction

Fortinet FortiGate I Multi Threat Security Systems Training with hands-on labs

In this 2-day Fortinet FortiGate I Multi Threat Security Systems Training class, you will learn how to use basic FortiGate UTM. In interactive labs, you will explore firewall policies, basic VPNs, virus detection, web filtering, application control, user authentication, and more.

These administrative fundamentals will provide you with a solid understanding of how to integrate basic network security.

Duration: 2 days

Fortinet FortiGate I Multi Threat Security Systems Training Related Courses

 
Customize It

• If you are familiar with some aspects of this Fortinet FortiGate I Multi Threat Security Systems Training course, we can omit or shorten their discussion.
• We can adjust the emphasis placed on the various topics or build the Fortinet FortiGate I Multi Threat Security Systems Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
• If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Fortinet FortiGate I Multi Threat Security Systems Training course in manner understandable to lay audiences.

Audience / Target Group

• Anyone who is responsible for day-to-day management of a FortiGate appliance.
• Students must master this Fortinet FortiGate I Multi Threat Security Systems Training course before attending FortiGate II.

Prerequisites

None except TCP/IP network experience and a basic understanding of firewall concepts.

Fortinet FortiGate I Multi Threat Security Systems Training - Objectives:

After completing this Fortinet FortiGate I Multi Threat Security Systems Training course, attendees will be able to:

• Describe capabilities of FortiGate UTM
• Neutralize threats / misuse: viruses, torrents, and inappropriate web sites
• Control network access based on device type
• Authenticate users via firewall policies
• Offer an SSL VPN for secure access to your private network
• Establish an IPsec VPN tunnel between two FortiGate appliances
• Compare policy- vs. tunnel-based IPsec VPN
• Apply port forwarding, source NAT, and destination NAT
• Interpret log entries
• Generate reports
• Use the web UI and CLI for administration
• Deploy the right operation mode
• Deploy an explicit proxy with firewall policies, authentication, and caching
• Simplify protocol handling with application control

Fortinet FortiGate I Multi Threat Security Systems Training - Course Content:

1. Introduction to Fortinet Unified Threat Management

Key FortiGate features
FortiGuard services
Administrators and permissions
Operating mode differences
Basic network settings
Console ports
How to show and hide features in the GUI
Configuration backup and restoration
Upgrade and downgrade
Built-in DHCP and DNS servers
Lab – Initial Setup and Configuration
Lab – Administrative Access

2. Logging and Monitoring

Log severity levels
Storage locations
Log types and subtypes
Log structure and behavior
Log settings
Log resources
Viewing log messages
Monitoring, reading, and interpreting log messages
Lab – Status Monitor and Event Log
Lab – Remote Monitoring

3. Firewall Policies

How packets match a firewall policy
How FortiGate defines matching traffic
Interfaces vs. zones
Domain name / IP address object
Device list & endpoint control
Network services
Packet handling
NAT & session helpers
How to interpret the session table
Quality of service (QoS) & traffic shaping
Proxy- vs. flow-based UTM scans
Debugging packet handling
Monitor in GUI
CLI
Lab – Firewall Policy

4. Firewall Authentication

Authentication
Three methods of authentication
Authentication protocols
Two-factor authentication (OTP and tokens)
Authentication types (active and passive)
Authentication Policies
Captive portals and disclaimers
Authentication timeout
Users(user groups
LDAP, RADIUS
FortiGate
Monitoring firewall users
Lab – User Authentication

5. SSL VPN

VPN
SSL VPN vs. IPSec VPN
Web-only mode, tunnel mode (including split-tunneling), and port forwarding
Methods of connecting to SSL VPN tunnels
Portals, bookmarks, and realms
Securing SSL VPN access
Monitoring SSL VPN users
Configuring SSL VPN
Lab – SSL VPN

6. Basic IPSec VPN

Benefits of VPN
How IPSec VPN works
Ports numbers & NAT traversal
Encapsulation: tunnel vs. transport
Internet Key Exchange & Diffie-Hellman
Phase 1
Phase 2
How quick mode refreshes and selects IPSec SAs
Policy-based vs. route-based VPN
How to configure a static point-to-point VPN
Monitoring VPN tunnels
Lab – IPSec VPN

7. Antivirus

What are the types of malware
Heuristics, grayware and general purpose antivirus scans
Sandboxing
Blocking botnet C&C connections
Proxy vs. flow-based scans
3 antivirus databases
Scanning large / compressed files
Order of scans
Zero-day viruses
How to scan encrypted traffic
What is conserve mode ?
How to diagnose the primary cause of high RAM usage
Lab – Antivirus Scanning

8. Explicit Proxy

What is an explicit web proxy ?
PAC file vs. web proxy auto-discovery protocol (WPAD)
How to decrease WAN bandwidth usage with cache
IP-based vs. session-based authentication
Explicit web proxy configuration
URL pattern objects
Monitoring explicit web proxy users
Lab – Explicit Web Proxy

9. Web Filtering

Web filtering overview
Types of web filtering
Static URL filtering
FortiGuard category filter
Web site rating submissions
FortiGuard and static filtering actions
Web site rating overrides
Custom categories
FortiGuard Quotas
Fortinet Bar
Forcing safe search
HTTP inspection order
Web profile overrides
Basic HTTPS scanning
Lab – Web Filtering

10. Application Control

How does application control work ?
When is application control necessary ?
5 point application risk rating
Submitting new/revised definitions
Configuring an application control profile
Actions, including traffic shaping
Order of operations for scans
Reading application control logs
Lab – Application Identification

Request More Information

Time Frame: 0-3 Months4-12 Months

No Comments Yet.

Leave a comment

0