Who should attend
Anyone who is responsible for day-to-day management of a FortiGate appliance.
You must master this course before attending FortiGate II.
Prerequisites
TCP/IP network experience and a basic understanding of firewall concepts.
Course Objectives
After completing these courses, you will be able to:
- Describe capabilities of FortiGate UTM
- Neutralize threats and misuse: viruses, torrents, and inappropriate web sites
- Control network access based on device type
- Authenticate users via firewall policies
- Apply port forwarding, source NAT, and destination NAT
- Offer an SSL VPN for secure access to your private network
- Establish an IPsec VPN tunnel between two FortiGate appliances
- Compare policy-based to tunnel-based IPsec VPN
- Interpret log entries
- Generate reports
- Use the GUI and CLI for administration
- Deploy the right operation mode
- Deploy an explicit proxy with firewall policies, authentication, and caching
- Evolve beyond port numbers with application control
Course Content
- Introduction to FortiGate
- Logging and Monitoring
- Firewall Policies
- Network Address Translation (NAT)
- Firewall Authentication
- SSL VPN
- Basic IPsec VPN
- Antivirus
- Explicit Proxy
- Web Filtering
- Application Control