FortiGate Security & Infraestructure
In this three-day course, candidates will learn how to use basic FortiGate features, including security profiles.
In interactive labs, candidates will explore firewall policies, user authentication, SSL VPN, dial-up IPsec VPN, and how to protect their network using security profiles such as IPS, antivirus, web filtering, application control, and more. These administration fundamentals will provide candidates with a solid understanding of how to implement basic network security.
After completing these courses, candidates will be able to:
- Deploy the appropriate operation mode for your network
- Use the GUI and CLI for administration
- Identify the characteristics of the Fortinet security fabric
- Control network access to configured networks using firewall policies
- Apply port forwarding, source NAT, and destination NAT
- Authenticate users using firewall policies
- Understand encryption functions and certificates
- Inspect SSL/TLS-secured traffic to prevent encryption used to bypass security policies
- Configure security profiles to neutralize threats and misuse, including viruses, torrents, and inappropriate websites
- Apply application control techniques to monitor and control network applications that might use standard or non-standard protocols and ports
- Fight hacking and denial of service (DoS)
- Defend against data leaks by identifying files with sensitive data, and block them from leaving your private network
- Offer an SSL VPN for secure access to your private network
- Implement a dialup IPsec VPN tunnel between FortiGate and FortiClient
- Collect and interpret log entries
In this two-day course, candidates will learn how to use advanced FortiGate networking and security features.
Topics include features commonly applied in complex or larger enterprise or MSSP networks, such as advanced routing, transparent mode, redundant infrastructure, site-to-site IPsec VPN, SSO, web proxy, and diagnostics.
After completing these modules, candidates will be able to:
- Analyze a FortiGate's route table.
- Route packets using policy-based and static routes for multi-path and load balanced deployments.
- Configure SD-WAN to load balance traffic between multiple WAN links effectively.
- Inspect traffic transparently, forwarding as a Layer 2 device.
- Divide FortiGate into two or more virtual devices, each operating as an independent FortiGate, by configuring virtual domains (VDOMs).
- Establish an IPsec VPN tunnel between two FortiGate appliances.
- Compare policy-based to route-based IPsec VPN.
- Implement a meshed or partially redundant VPN.
- Diagnose failed IKE exchanges.
- Offer Fortinet Single Sign On (FSSO) access to network services, integrated with Microsoft Active Directory.
- Deploy FortiGate devices as an HA cluster for fault tolerance and high performance.
- Deploy implicit and explicit proxy with firewall policies, authentication, and caching.
- Diagnose and correct common problems.