Cargando…

UTM security with Fortinet : Mastering FortiOS /

Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Tam, Kenneth
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Place of publication not identified] : Syngress, 2013.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 SCIDIR_ocn819506986
003 OCoLC
005 20231117044759.0
006 m o d
007 cr cnu---unuuu
008 121128s2013 xx a ob 001 0 eng d
040 |a OPELS  |b eng  |e pn  |c OPELS  |d E7B  |d B24X7  |d COO  |d UMI  |d N$T  |d DEBSZ  |d UIU  |d OCLCO  |d OCLCF  |d KNOVL  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d LIV  |d OCLCQ  |d U3W  |d D6H  |d CEF  |d WYU  |d UAB  |d LEAUB  |d RDF  |d OCLCQ  |d OCLCO  |d TUHNV  |d S2H  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 842426555  |a 1243591618 
020 |a 9781597499774  |q (electronic bk.) 
020 |a 1597499773  |q (electronic bk.) 
020 |z 9781597497473 
020 |z 1597497479 
035 |a (OCoLC)819506986  |z (OCoLC)842426555  |z (OCoLC)1243591618 
050 4 |a TK5105.59  |b .U86 2013 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
245 0 0 |a UTM security with Fortinet :  |b Mastering FortiOS /  |c Kenneth Tam [and others]. 
260 |a [Place of publication not identified] :  |b Syngress,  |c 2013. 
300 |a 1 online resource :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise. Provides tips, tricks, and proven suggestions and guidelines to set up FortiGate implementationsPresents topics that are not covered (or are not covered in detail) by Fortinet's documentation Discusses hands-on troubleshooting techniques at both the project deployment level and technical implementation area. 
588 0 |a Publisher supplied information; title not viewed. 
504 |a Includes bibliographical references and index. 
505 0 |a Title page; Copyrigh; Dedications; Contents; Acknowledgements; About The Author; Foreword; Preface; Section I:General Introduction; 1 Introduction to UTM (Unified Threat Management); Introduction; Internet and Security; Basic Network Security Concepts; Computer and Network Security Concepts and Principles; Computer and Network Security Technology Concepts; Network Security Technology Concepts; Commonly used Computer and Network Security Terms; Unified Threat Management (UTM) Foundations; The World before UTM; The History of the Unified Threat Management (UTM) Concept 
505 8 |a UTM vs Other Security ArchitecturesUTM vs Best-of-Breed; UTM vs Next-Generation Firewalls; UTM vs XTM; Solving Problems with UTM; Better Security; Consistent Security Policy; Protecting against Blended Threats; Implementing Clean Pipes; More Efficient Security; Higher Performance; Enhancing Operational Response Times (Meeting and Enhancing SLAs); Getting a better Support Experience; Increasing Network Availability; Cost Effectiveness; Easier Investment Justification; Licensing Simplicity; Lowering Operational Costs; Current UTM Market Landscape; UTM a-l�a Fortinet; Reliable Performance 
505 8 |a Selective FunctionalityHomegrown Technology; In-house Security Intelligence Unit: FortiGuard Labs; Single Licensing Cost; Included Virtualization; Other Vendors; Evolution and Future of UTM; 2 FortiGate Hardware Overview; FortiGate Hardware Overview; The Fortinet Way; Evolution of FortiGate; Current FortiGate Solutions; Virtualized Appliances; FortiGate Custom Hardware Accelerations Overview; Features of the Last Four Generations of Content Processor (CP) ASIC Functionalities; Features of the Network Processor (NP) ASIC Functionalities; FortiGate Hardware Accelerations Behaviors 
505 8 |a Firewall Acceleration using NP ASICVPN Acceleration using NP and CP ASIC; UTM Acceleration using CP and SP ASIC; The 'Black Art' of FortiGate Sizing; Sizing Data Gathering; Assessing the Recommended FortiGate Solution; Feature Capabilities; Feature Capacity; Performance Capabilities; Centralized Management Platform Overview; Fortinet Product Portfolio; FortiGuard; FortiCarrier; FortiBridge; FortiAP; FortiToken; FortiAuthenticator; FortiMail; FortiWeb; FortiScan; FortiDB; FortiBalancer; FortiClient; References; 3 FortiOS Introduction; Fortios Architecture; Multiple Image Support 
505 8 |a Firmware Image VersionsFortiOS Operational Modes; Packet Flow Handling; WebUI Management Interface; CLI Management Interface; System Options; Recommended Configuration Options; Configuring Logging; SNMP Configuration; Controlling Administrative Access; FortiOS Default Behavior to Non-Service Ports; Network Time Protocol (NTP)4; Specifying the Source IP Address for FortiOS Originated Traffic; Dealing with Administrative Operations; Performing Backups; Restoring the Configuration; Upgrading/Restoring Firmware; Password Recovery; Automatic FortiAP Firmware Updates from FortiGate; Enabling VDOMS 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer networks  |x Access control. 
650 6 |a R�eseaux d'ordinateurs  |x S�ecurit�e  |x Mesures.  |0 (CaQQLa)201-0263812 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Access control  |2 fast  |0 (OCoLC)fst00872298 
650 7 |a Computer networks  |x Security measures  |2 fast  |0 (OCoLC)fst00872341 
700 1 |a Tam, Kenneth. 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9781597497473  |z Texto completo