UTM security with Fortinet : Mastering FortiOS /
Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified...
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
[Place of publication not identified] :
Syngress,
2013.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Title page; Copyrigh; Dedications; Contents; Acknowledgements; About The Author; Foreword; Preface; Section I:General Introduction; 1 Introduction to UTM (Unified Threat Management); Introduction; Internet and Security; Basic Network Security Concepts; Computer and Network Security Concepts and Principles; Computer and Network Security Technology Concepts; Network Security Technology Concepts; Commonly used Computer and Network Security Terms; Unified Threat Management (UTM) Foundations; The World before UTM; The History of the Unified Threat Management (UTM) Concept
- UTM vs Other Security ArchitecturesUTM vs Best-of-Breed; UTM vs Next-Generation Firewalls; UTM vs XTM; Solving Problems with UTM; Better Security; Consistent Security Policy; Protecting against Blended Threats; Implementing Clean Pipes; More Efficient Security; Higher Performance; Enhancing Operational Response Times (Meeting and Enhancing SLAs); Getting a better Support Experience; Increasing Network Availability; Cost Effectiveness; Easier Investment Justification; Licensing Simplicity; Lowering Operational Costs; Current UTM Market Landscape; UTM a-lá Fortinet; Reliable Performance
- Selective FunctionalityHomegrown Technology; In-house Security Intelligence Unit: FortiGuard Labs; Single Licensing Cost; Included Virtualization; Other Vendors; Evolution and Future of UTM; 2 FortiGate Hardware Overview; FortiGate Hardware Overview; The Fortinet Way; Evolution of FortiGate; Current FortiGate Solutions; Virtualized Appliances; FortiGate Custom Hardware Accelerations Overview; Features of the Last Four Generations of Content Processor (CP) ASIC Functionalities; Features of the Network Processor (NP) ASIC Functionalities; FortiGate Hardware Accelerations Behaviors
- Firewall Acceleration using NP ASICVPN Acceleration using NP and CP ASIC; UTM Acceleration using CP and SP ASIC; The 'Black Art' of FortiGate Sizing; Sizing Data Gathering; Assessing the Recommended FortiGate Solution; Feature Capabilities; Feature Capacity; Performance Capabilities; Centralized Management Platform Overview; Fortinet Product Portfolio; FortiGuard; FortiCarrier; FortiBridge; FortiAP; FortiToken; FortiAuthenticator; FortiMail; FortiWeb; FortiScan; FortiDB; FortiBalancer; FortiClient; References; 3 FortiOS Introduction; Fortios Architecture; Multiple Image Support
- Firmware Image VersionsFortiOS Operational Modes; Packet Flow Handling; WebUI Management Interface; CLI Management Interface; System Options; Recommended Configuration Options; Configuring Logging; SNMP Configuration; Controlling Administrative Access; FortiOS Default Behavior to Non-Service Ports; Network Time Protocol (NTP)4; Specifying the Source IP Address for FortiOS Originated Traffic; Dealing with Administrative Operations; Performing Backups; Restoring the Configuration; Upgrading/Restoring Firmware; Password Recovery; Automatic FortiAP Firmware Updates from FortiGate; Enabling VDOMS