O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

UTM Security with Fortinet

Book Description

Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise. 

  • Provides tips, tricks, and proven suggestions and guidelines to set up FortiGate implementations
  • Presents topics that are not covered (or are not covered in detail) by Fortinet’s documentation
  • Discusses hands-on troubleshooting techniques at both the project deployment level and technical implementation area

Table of Contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. Dedications
  6. Acknowledgements
  7. About The Author
  8. Foreword
  9. Preface
    1. Intended Audience
    2. Organization of this book
    3. Section I - General Introduction
  10. Section I: General Introduction
    1. Chapter 1. Introduction to UTM (Unified Threat Management)
      1. Introduction
      2. Unified Threat Management (UTM) Foundations
      3. Solving Problems with UTM
      4. Current UTM Market Landscape
      5. Evolution and Future of UTM
    2. Chapter 2. FortiGate Hardware Overview
      1. FortiGate Hardware Overview
      2. FortiGate Custom Hardware Accelerations Overview
      3. The ‘Black Art’ of FortiGate Sizing
      4. Centralized Management Platform Overview
      5. Fortinet Product Portfolio
      6. References
    3. Chapter 3. FortiOS Introduction
      1. Fortios Architecture
      2. System Options
  11. Section II: UTM Technologies Explained
    1. Chapter 4. Connectivity and Networking Technologies
      1. Operating Modes
      2. Connectivity
      3. Routing
      4. Servicing users
      5. Virtual Domains (VDOM)
      6. High Availability
    2. Chapter 5. Base Network Security
      1. Firewall
    3. Chapter 6. Application Security
      1. FortiGuard
      2. Application Control
      3. Network Antivirus/AntiSpyware
      4. Intrusion Protection (IPS)
      5. Web Filtering
    4. Chapter 7. Extended UTM Functionality
      1. Introduction
      2. WAN Optimization
      3. Web Caching
      4. Endpoint Control
      5. Data Leak Prevention (DLP)
      6. Vulnerability Scan
      7. References
    5. Chapter 8. Analyzing your Security Information with FortiAnalyzer
      1. Configuring the FortiAnalyzer
      2. Configuring Reports
      3. FortiAnalyzer Generated Alerts
      4. Log Aggregation
      5. Log Forwarding
      6. Log Migration
      7. Configuring FortiGates
      8. Additional FortiAnalyzer Features
    6. Chapter 9. Managing Your Security Configurations with FortiManager
      1. System Settings Console
      2. Administrative Domains
      3. Device Manager
      4. Device Level Management & Configuration
      5. Policy & Objects
      6. Managing Site-to-Site Distributed IPSec VPNs
      7. Conclusion
  12. Section III: Implementing a Security (UTM) Project
    1. Chapter 10. Designing a Security Solution
      1. Introduction
      2. Security as a Project
      3. Establishing a Network Security Architecture
      4. Gathering Information for Sizing and Configuring a UTM Solution
      5. Considerations for Planning a UTM Deployment
    2. Chapter 11. Security with Distributed Enterprise and Retail
      1. Security Needs and Challenges
      2. Example Distributed Enterprise and Retail Environment Topologies
    3. Chapter 12. Security on Financial Services
      1. Electronic Trading
      2. Market Data Networks
      3. The Industry Trends
      4. The Challenge
      5. Market Data Multicast Distribution
      6. Protocol-Independent Multicast-Source-Specific Multicast (PIM-SSM)
      7. References
  13. Appendix A. Troubleshooting the Project
    1. Introduction
    2. Dealing with Cost Issues
    3. Dealing with Timing
    4. Engaging Fortinet Professional Services
    5. Engaging Fortinet Technical Support
  14. Appendix B. Troubleshooting Technically
    1. Introduction
    2. Resources
    3. Basic Troubleshooting Overview
    4. Basic Troubleshooting Tools
    5. Advanced Troubleshooting Tools
  15. Appendix C. Country Codes
  16. Glossary
    1. References
  17. Subject Index