UTM security with Fortinet : Mastering FortiOS

Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified...

Full description

Saved in:
Bibliographic Details
Other Authors: Tam, Kenneth.
Format: eBook
Language: English
Published: [Place of publication not identified] : Syngress, 2013.
Subjects:
ISBN: 9781597499774
1597499773
9781597497473
1597497479
Physical Description: 1 online resource : illustrations

Cover

Table of contents

LEADER 05625cam a2200421 a 4500
001 kn-ocn819506986
003 OCoLC
005 20240717213016.0
006 m o d
007 cr cn|||||||||
008 121128s2013 xx a ob 001 0 eng d
040 |a OPELS  |b eng  |e pn  |c OPELS  |d E7B  |d B24X7  |d COO  |d UMI  |d N$T  |d DEBSZ  |d UIU  |d OCLCO  |d OCLCF  |d KNOVL  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d LIV  |d OCLCQ  |d U3W  |d D6H  |d CEF  |d WYU  |d UAB  |d LEAUB  |d RDF  |d OCLCQ  |d OCLCO  |d TUHNV  |d S2H  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL  |d SXB  |d OCLCQ 
020 |a 9781597499774  |q (electronic bk.) 
020 |a 1597499773  |q (electronic bk.) 
020 |z 9781597497473 
020 |z 1597497479 
035 |a (OCoLC)819506986  |z (OCoLC)842426555  |z (OCoLC)1243591618 
245 0 0 |a UTM security with Fortinet :  |b Mastering FortiOS /  |c Kenneth Tam [and others]. 
260 |a [Place of publication not identified] :  |b Syngress,  |c 2013. 
300 |a 1 online resource :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
506 |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty 
520 |a Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise. Provides tips, tricks, and proven suggestions and guidelines to set up FortiGate implementationsPresents topics that are not covered (or are not covered in detail) by Fortinet's documentation Discusses hands-on troubleshooting techniques at both the project deployment level and technical implementation area. 
504 |a Includes bibliographical references and index. 
505 0 |a Title page; Copyrigh; Dedications; Contents; Acknowledgements; About The Author; Foreword; Preface; Section I:General Introduction; 1 Introduction to UTM (Unified Threat Management); Introduction; Internet and Security; Basic Network Security Concepts; Computer and Network Security Concepts and Principles; Computer and Network Security Technology Concepts; Network Security Technology Concepts; Commonly used Computer and Network Security Terms; Unified Threat Management (UTM) Foundations; The World before UTM; The History of the Unified Threat Management (UTM) Concept 
505 8 |a UTM vs Other Security ArchitecturesUTM vs Best-of-Breed; UTM vs Next-Generation Firewalls; UTM vs XTM; Solving Problems with UTM; Better Security; Consistent Security Policy; Protecting against Blended Threats; Implementing Clean Pipes; More Efficient Security; Higher Performance; Enhancing Operational Response Times (Meeting and Enhancing SLAs); Getting a better Support Experience; Increasing Network Availability; Cost Effectiveness; Easier Investment Justification; Licensing Simplicity; Lowering Operational Costs; Current UTM Market Landscape; UTM a-lá Fortinet; Reliable Performance 
505 8 |a Selective FunctionalityHomegrown Technology; In-house Security Intelligence Unit: FortiGuard Labs; Single Licensing Cost; Included Virtualization; Other Vendors; Evolution and Future of UTM; 2 FortiGate Hardware Overview; FortiGate Hardware Overview; The Fortinet Way; Evolution of FortiGate; Current FortiGate Solutions; Virtualized Appliances; FortiGate Custom Hardware Accelerations Overview; Features of the Last Four Generations of Content Processor (CP) ASIC Functionalities; Features of the Network Processor (NP) ASIC Functionalities; FortiGate Hardware Accelerations Behaviors 
505 8 |a Firewall Acceleration using NP ASICVPN Acceleration using NP and CP ASIC; UTM Acceleration using CP and SP ASIC; The 'Black Art' of FortiGate Sizing; Sizing Data Gathering; Assessing the Recommended FortiGate Solution; Feature Capabilities; Feature Capacity; Performance Capabilities; Centralized Management Platform Overview; Fortinet Product Portfolio; FortiGuard; FortiCarrier; FortiBridge; FortiAP; FortiToken; FortiAuthenticator; FortiMail; FortiWeb; FortiScan; FortiDB; FortiBalancer; FortiClient; References; 3 FortiOS Introduction; Fortios Architecture; Multiple Image Support 
505 8 |a Firmware Image VersionsFortiOS Operational Modes; Packet Flow Handling; WebUI Management Interface; CLI Management Interface; System Options; Recommended Configuration Options; Configuring Logging; SNMP Configuration; Controlling Administrative Access; FortiOS Default Behavior to Non-Service Ports; Network Time Protocol (NTP)4; Specifying the Source IP Address for FortiOS Originated Traffic; Dealing with Administrative Operations; Performing Backups; Restoring the Configuration; Upgrading/Restoring Firmware; Password Recovery; Automatic FortiAP Firmware Updates from FortiGate; Enabling VDOMS 
590 |a Knovel  |b Knovel (All titles) 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer networks  |x Access control. 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
655 9 |a electronic books  |2 eczenas 
700 1 |a Tam, Kenneth. 
856 4 0 |u https://proxy.k.utb.cz/login?url=https://app.knovel.com/hotlink/toc/id:kpUTMSFMF4/utm-security-with?kpromoter=marc  |y Full text