Fortinet Certified Network Security Administrator



Similar documents
FortiGate Multi-Threat Security Systems I Administration, Content Inspection and SSL VPN Course #201

Fortinet Network Security NSE4 test questions and answers:

FortiGate Multi-Threat Security Systems I

Connecting an Android to a FortiGate with SSL VPN

How To Authenticate An Ssl Vpn With Libap On A Safeprocess On A Libp Server On A Fortigate On A Pc Or Ipad On A Ipad Or Ipa On A Macbook Or Ipod On A Network

FortiMail Filtering Course 221-v2.2 Course Overview

Firewall. FortiOS Handbook v3 for FortiOS 4.0 MR3

FortiMail Filtering Course 221-v2.0. Course Overview. Course Objectives

Check Point Security Administrator R70

FortiMail Filtering. Course 221 (for FortiMail v4.2) Course Overview

Troubleshooting. FortiOS Handbook v3 for FortiOS 4.0 MR3

FortiMail Filtering. Course 221 (for FortiMail v5.0) Course Overview

FortiMail Filtering. Course for FortiMail v4.0. Course Overview

Fortigate Features & Demo

QUESTION: 1 Which of the following are valid authentication user group types on a FortiGate unit? (Select all that apply.)

NETASQ MIGRATING FROM V8 TO V9

ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access. Integration Handbook

Feature Brief. FortiGate TM Multi-Threat Security System v3.00 MR5 Rev. 1.1 July 20, 2007

Configuring IPsec VPN with a FortiGate and a Cisco ASA

The Secure Web Access Solution Includes:

Global Reputation Monitoring The FortiGuard Security Intelligence Database WHITE PAPER

Configuration Example

Simple security is better security Or: How complexity became the biggest security threat

Managing a FortiSwitch unit with a FortiGate Administration Guide

Chapter 9 Monitoring System Performance

Implementing Core Cisco ASA Security (SASAC)

inlife Managed Security Service (MSS)

"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary

Configuring an IPsec VPN to provide ios devices with secure, remote access to the network

Implementing Cisco IOS Network Security

Securing Networks with PIX and ASA

High Availability. FortiOS Handbook v3 for FortiOS 4.0 MR3

Creating a VPN with overlapping subnets

Managing Enterprise Security with Cisco Security Manager

Authentication. Authentication in FortiOS. Single Sign-On (SSO)

Using IPsec VPN to provide communication between offices

1Fortinet. 2How Logtrust. Firewall technologies from Fortinet offer integrated, As your business grows and volumes of data increase,

Fireware Essentials Exam Study Guide

How To Configure Syslog over VPN

Configuring a Check Point FireWall-1 to SOHO IPSec Tunnel

Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET

Move over, TMG! Replacing TMG with Sophos UTM

21.4 Network Address Translation (NAT) NAT concept

ReadyNAS Remote White Paper. NETGEAR May 2010

Sophos Certified Architect Course overview

Network Security. Network Security. Protective and Dependable. > UTM Content Security Gateway. > VPN Security Gateway. > Multi-Homing Security Gateway

Preventing credit card numbers from escaping your network

MANAGED FIREWALL SERVICE. Service definition

FortiManager Centralized Device Management

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Fortinet Firewall. Overview

FortiOS Handbook What s New for FortiOS 5.0

Application Notes. How to Configure UTM with Apple OSX and ios Devices for IPsec VPN

SSECMGT: CManaging Enterprise Security with Cisco Security Manager v4.x

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses

Chapter 8 Router and Network Management

FortiOS Handbook - PCI DSS Compliance VERSION 5.4.0

F IREWALL/VPN REFERENCE GUIDE

Please report errors or omissions in this or any Fortinet technical document to

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Sonicwall Firewall.

Fortinet Advanced Threat Protection- Part 3

Network protection and UTM Buyers Guide

FortiOS Handbook WAN Optimization, Web Cache, Explicit Proxy, and WCCP for FortiOS 5.0

CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Configuring Trend Micro Content Security

Stonesoft 5.5. Firewall/VPN Reference Guide. Firewall Virtual Private Networks

Hosting more than one FortiOS instance on. VLANs. 1. Network topology

FortiOS Handbook - WAN Optimization, Web Cache, Explicit Proxy, and WCCP VERSION 5.2.4

Cisco AnyConnect Secure Mobility Solution Guide

Steps for Basic Configuration

Cisco ASA 5500 Series Adaptive Security Appliance 8.2 Software Release

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

External authentication with Fortinet Fortigate UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

Microsoft TMG Replacement. How FORTINET integrated secuity platforms Help Protect the Perimeter in a Microsoft Infrastructure Environment

FortiWeb 5.0, Web Application Firewall Course #251

Configuring IPsec VPN between a FortiGate and Microsoft Azure

User Authentication. FortiOS Handbook v3 for FortiOS 4.0 MR3

Cyberoam Perspective BFSI Security Guidelines. Overview

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client

FortiGate 200A. Administration Guide. FortiGate-200A Administration Guide Version 2.80 MR8 4 February

SolarWinds Log & Event Manager

Creating a Gateway to Client VPN between Sidewinder G2 and a Mac OS X Client

SonicWALL Security Quick Start Guide. Version 4.6

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

Securing Networks with Cisco Routers and Switches 1.0 (SECURE)

HA OVERVIEW. FortiGate FortiOS v3.0 MR5.

Virtual Private Network VPN IPSec Testing: Functionality Interoperability and Performance

Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

I. What is VPN? II. Types of VPN connection. There are two types of VPN connection:

FortiOS Handbook SSL VPN for FortiOS 5.0

Cisco Small Business ISA500 Series Integrated Security Appliances

SSL VPN Client Installation Guide Version 9

Create a VPN on your ipad, iphone or ipod Touch and SonicWALL NSA UTM firewall - Part 1: SonicWALL NSA Appliance

SonicWALL Advantages Over WatchGuard

Mobile Configuration Profiles for ios Devices Technical Note

Transcription:

Fortigate 1 Fortinet Certified Network Security Administrator Objectives The Fortinet Certified Network Security Administratordesignation certifies that individuals have the expertise necessary to manage the day-to-day operations of FortiGate devices in support of specific corporate policies. Certification not only enriches an individual s professional development, but it also offers many benefits to an organization by providing a reliable benchmark to evaluate skills and knowledge. Individuals with the FCNSA designation need to have a solid understanding of the day-to-day configuration and monitoring of FortiGate devices as well as a general understanding of the entire Fortinet product family of services and hardware. Through this training, participants learn the basic configuration and administration aspects of the most commonly used features on the FortiGate Unified Threat Management (UTM) Appliance. Through interactive modules, participants explore firewall policies, user authentication, VPNs, virus detection, email filtering, web filtering, application control and more. FortiGate unit administrative fundamentals provide a solid understanding of how to integrate and ensure operational maintenance for optimal performance in the corporate environment Prerequisites Introductory-level network security experience Basic understanding of firewall concepts Who Should Attend This introductory-level course is intended for anyone who is responsible for the day-to-day administration and management of a FortiGate unit. Students must be familiar with the topics presented in this course before attending the FortiGate Multi-Threat Security Systems II Secured Network Deployment and IPSec VPN course.

Fortigate 2 FCNSA Syllabus: Introduction to Fortinet Unified Threat Management Introduction to Unified Threat Management The Fortinet Solution FortiGate Appliance Capabilities and Components Device Administration (Firmware Upgrade, Downgrade) Administrator Users Initial Device Configuration (IPs, Gateway, DHCP, DNS) Logging and Monitoring Logging Severity Levels Log Storage Locations Log Types and Subtypes Structure and Behavior of Logs Traffic Log Generation Viewing Logs (Log Viewer Filtering, Raw Logs) Alert Email SNMP Event Logging Monitoring Customizing Status Widgets (GUI) Firewall Policies Firewall Policies (Types, Subtypes, Actions) Log Storage Locations Device Identification (Bring Your Own Device BYOD) Firewall Address Objects, Interfaces, Service Objects Traffic Logging Network Address Translation (Source NAT)

Fortigate 3 NAT Dynamic IP Pool (Source NAT) Central NAT Traffic Shaping Source NAT IP Address and Port Fixed Port (Source NAT) Virtual IPs (Destination NAT) Threat Management Denial of Service Policies Endpoint Control Firewall Policy Object Management (Object Tagging) Monitoring Policies Local User Authentication Local User Authentication User Authentication via Remote Server User Authentication Groups Identity-Based Policies Disclaimers Password Policies Two-Factor Authentication Policy Configuration User Monitor SSL VPN Virtual Private Networks FortiGate Device VPNs SSL VPN Operating Modes (Web-Only, Tunnel) User Groups Authentication SSL VPN Server Certificate Encryption Key Algorithm Web Portal Interface Full-Access Web Portal Interface

Fortigate 4 Tunnel Mode Split-Tunnelling Client Checking (Integrity Checks, Host Checks) Tunnel Mode Connection Client Port Forward Policy De-Authentication Access Modes (Web Mode, Tunnel Mode, Port Forward Mode) SSL VPN Configuration IPSec VPN IPSec VPN Internet Key Exchange Defining Phase 1 and Phase 2 Parameters IPSec VPN Modes (Interface Mode,Tunnel Mode) Overlapping Subnets IPSec Topologies IPSec VPN Monitor IPSec VPN Configuration Antivirus Conserve Mode Antivirus Fail-Open Antivirus Overview Scanning Order Proxy-based Scanning Flow-based Scanning Virus Databases Unknown and Known Viruses Heuristic Scanning Antivirus Profiles UTM Proxy Options Quarantine Logging

Fortigate 5 Email Filtering Email Filtering Spam Actions Email Filtering Methods Email Filtering Order of Operations(SMTP) Email Filtering Order of Operations FortiGuard IP (Address, URL, Email Address and Email Checksum Check) IP Address Black/White List (BWL) Email Address Black/White List HELO DNS Lookup Return Email DNS Check Banned Word Check MIME Headers Check DNSBL and ORDBL Check Dealing with False Positives FortiGuard Email Filtering Options Email Filter Profile Web Filtering Web Filtering Overview Types of Web Filtering (Proxy-based,Flow-based, DNS-based) Web Filtering Activation HTTP Inspection Order Web Content Filtering Web URL Filtering Forcing Safe Search FortiGuard Category Filter FortiGuard Caching,Usage Quotas,Rating Submissions and Rating Overrides Local Categories Filtering Actions (Warning, Authenticate) Web Filter Profiles

Fortigate 6 Application Contro Application Control Application Control Overview Application Control Lists Application Control Profiles Order of Operations Implicit Rules Creating Filter Rules Application Categories Proper Identification Functional Overview (Under the Hood) Peer-to-Peer Detection