Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover image
Title page
Table of Contents
Copyright
Dedications
Acknowledgements
About The Author
Foreword
Preface
Intended Audience
Organization of this book
Section I - General Introduction
Section I: General Introduction
Chapter 1. Introduction to UTM (Unified Threat Management)
Introduction
Unified Threat Management (UTM) Foundations
Solving Problems with UTM
Current UTM Market Landscape
Evolution and Future of UTM
Chapter 2. FortiGate Hardware Overview
FortiGate Hardware Overview
FortiGate Custom Hardware Accelerations Overview
The ‘Black Art’ of FortiGate Sizing
Centralized Management Platform Overview
Fortinet Product Portfolio
References
Chapter 3. FortiOS Introduction
Fortios Architecture
System Options
Section II: UTM Technologies Explained
Chapter 4. Connectivity and Networking Technologies
Operating Modes
Connectivity
Routing
Servicing users
Virtual Domains (VDOM)
High Availability
Chapter 5. Base Network Security
Firewall
Chapter 6. Application Security
FortiGuard
Application Control
Network Antivirus/AntiSpyware
Intrusion Protection (IPS)
Web Filtering
Chapter 7. Extended UTM Functionality
Introduction
WAN Optimization
Web Caching
Endpoint Control
Data Leak Prevention (DLP)
Vulnerability Scan
References
Chapter 8. Analyzing your Security Information with FortiAnalyzer
Configuring the FortiAnalyzer
Configuring Reports
FortiAnalyzer Generated Alerts
Log Aggregation
Log Forwarding
Log Migration
Configuring FortiGates
Additional FortiAnalyzer Features
Chapter 9. Managing Your Security Configurations with FortiManager
System Settings Console
Administrative Domains
Device Manager
Device Level Management & Configuration
Policy & Objects
Managing Site-to-Site Distributed IPSec VPNs
Conclusion
Section III: Implementing a Security (UTM) Project
Chapter 10. Designing a Security Solution
Introduction
Security as a Project
Establishing a Network Security Architecture
Gathering Information for Sizing and Configuring a UTM Solution
Considerations for Planning a UTM Deployment
Chapter 11. Security with Distributed Enterprise and Retail
Security Needs and Challenges
Example Distributed Enterprise and Retail Environment Topologies
Chapter 12. Security on Financial Services
Electronic Trading
Market Data Networks
The Industry Trends
The Challenge
Market Data Multicast Distribution
Protocol-Independent Multicast-Source-Specific Multicast (PIM-SSM)
References
Appendix A. Troubleshooting the Project
Introduction
Dealing with Cost Issues
Dealing with Timing
Engaging Fortinet Professional Services
Engaging Fortinet Technical Support
Appendix B. Troubleshooting Technically
Introduction
Resources
Basic Troubleshooting Overview
Basic Troubleshooting Tools
Advanced Troubleshooting Tools
Appendix C. Country Codes
Glossary
References
Subject Index
← Prev
Back
Next →
← Prev
Back
Next →