Introduction to Fortinet Unified Threat Management.

Slides:



Advertisements
Presentaciones similares
Seguridad Integral en Tiempo Real
Advertisements

PLEASE READ (hidden slide) This template uses Microsofts corporate font, Segoe Segoe is not a standard font included with Windows, so if you have not.
Control en cascada.
Editing Slides With Polaris Office, you can create new .ppt and .pptx presentations or edit your presentation with ease.
Internet Red Modelo con productos Ansel A S B Ansel Smart Box A S B Ansel Smart Box.
NETGEAR: Business Solutions For Any Size Customer Switching Storage Wireless Security HOY : Howto VPN redundante.
Telling Time.
DETECCIONES DE INTRUSIONES CON PROSECURE Netgear Solutions.
CPU 8088 vs. Pentium TEEL 4011 Prof. Jaime José Laracuente-Díaz.
Notes #18 Numbers 31 and higher Standard 1.2
Sistemas de Información Agosto-Diciembre 2007 Sesión # 3.
Colocar la puerta de enlace en la barra de Direcciones del explorador.
La Programación de Sistemas Oscar José Luis Cruz Reyes
DHCP, DNS, WINS. Repaso..
Mi dormitorio My bedroom
WWW. WIRELESS WIFI Wireless-Fidelity Es un mecanismo de conexión de dispositivos electrónicos de forma inalámbrica.
¿Qué haces en la escuela? Question words, objects, yo-go’s.
Introducción Nivel 4. Modelo OSI Propiedades Nivel 4 Entrega de mensajes garantizada. Entrega de mensajes en el mismo orden en el que fueron enviados.
CONJUGATION.
Ing. Michael Puma Huanca
Foreign Language Teaching Tips Rich Bradshaw. ¡Classroom Vocabulary Scavenger Hunt! Purpose Introduce new vocabulary words in TL Identify items using.
AQA Unit 2 Speaking Los medios La televisión La publicidad Las tecnologías de la comunicación La cultura de todos los días El cine La música La moda La.
3 Ways to Record PowerPoint From within PowerPoint From within Camtasia Studio.
1 Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature,
IVESDA User Guide.  Downloadable application that can be installed on Android and iOS handheld devices to monitor and maintain VESDA-E systems with unprecedented.
Tienes un nuevo mensaje…. Ella era una chica timida, llamada Lina, no tenia amigosy solo convivia con su familia especialmente con su madre y su padre…
2 Ways to Record PowerPoint From within PowerPoint From within Camtasia Studio.
EQUILIBRIUM OF A PARTICLE IN 2-D Today’s Objectives: Students will be able to : a) Draw a free body diagram (FBD), and, b) Apply equations of equilibrium.
Cómo asignar IP Address estáticos en un host
3 Ways to Record PowerPoint From within PowerPoint From within Camtasia Studio.
Lo esencial de Internet
Double Object Pronouns
Día número 3 Español 1—Acelerado
Voice Activity 1.04: Directions, Grammar, and Examples
Introduction & Agenda Introduction to Microchip Device Blocksets Introduction to MATLAB Plug-In in MPLAB®IDE Creating a SIMULINK model with Microchip.
Primera Actividad Escribe en español: 1. The backpack is under the desk. 2. The books are on top of the table. 3. The pens are.
Youden Analysis. Introduction to W. J. Youden Components of the Youden Graph Calculations Getting the “Circle” What to do with the results.
PROFESSIONALPOWERPOINT.COM FREE PPT TEMPLATES DOWNLOAD MORE POWERPOINT TEMPLATES FROM PROFESSIONALPOWERPOINT.COM.
THE VERB IR ©2016 Sra. Cruz.
2 Ways to Record PowerPoint From within PowerPoint From within Camtasia Studio.
2018/9/21. La abstracción de la Red Un Campus de usuarios Víctor Jiménez Ramos Chief Engineer.
Page 1 CITS Active Directory Implementation UMass Dartmouth.
© 2017 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: EIGRP Tuning and Troubleshooting Scaling Networks.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
IBM Cloud Flexible Choice of Infrastructure VMware | Openstack | Hardware | IaaS Kubernetes-based Platform Developer Productivity | Operational Efficiency.
Recetas 3 Objetivo: Hacer preguntas Hablar sobre la comida
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Internal Principios de Operación, Estructura de Hardware y Software CAPÍTULO I.
Hardware e implementación en Sistemas Operativos
The Verb Jugar P. 208 Realidades 1.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Switched Networks Routing and Switching.
A PowerPoint Template Your Presentation Name. This text is a placeholder Main Content Page Layout 2 Copyright 2009.
JKSimMet Software (windows & buttons) Split Engineering Chile Ltda. General Salvo #331 oficina 201 Casilla Sucursal Panorámico Providencia – Santiago,
Introduction to CAN. What is CAN and what are some of its features? Serial communication Multi-Master Protocol Compact –Twisted Pair Bus line 1 Megabit.
The Windows File System and Windows Explorer To move around the file system and examine your files or get to one you want (say, to modify, delete or copy.
Virtual LAN Design Switches also have enabled the creation of Virtual LANs (VLANs). VLANs provide greater opportunities to manage the flow of traffic on.
Fundamentals of Web Development - 2 nd Ed.Randy Connolly and Ricardo Hoar Fundamentals of Web DevelopmentRandy Connolly and Ricardo Hoar © 2017 Pearson.
PST RESOURCE OVERVIEW NAME of the resource / tool
Gustar, Interesar, Aburrir
Development of the concert programme
Connectivity MODELS OF NETWORK COMPUTING Centralized computing Distributed computing Collaborative or cooperative computing.
Juliana Carmona Esteban Cano
Día 2 –Español 4 NS (HL) y NM (SL)
1 © 2017 Citrix | Summit 2017 | Confidential – Content in this presentation is under NDA LABS604 - Essentials for quickly deploying and configuring NetScaler.
2 Ways to Record PowerPoint From within PowerPoint From within Camtasia Studio.
Welcome to PowerPoint gdskcgdskfcbskjc. Designer helps you get your point across PowerPoint Designer suggests professional designs for your presentation,
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: DHCP Routing and Switching Essentials v6.0.
WELCOME FREE POWERPOINT TEMPLATE DESIGNED BY POWERPOINT SCHOOL about history timelineteamsservicesfollow.
OPC? OPC: OLE COM for Process Control COM: Component Object Model, Microsoft/Win32 API CORBA w/ actual application support All COM Objects have Interface.
Que hora es? What time is it?.
Transcripción de la presentación:

Introduction to Fortinet Unified Threat Management

Module Objectives By the end of this module participants will be able to: Identify the major features of the FortiGate Unified Threat Management appliance Access and use the FortiGate administration interfaces Create administrators Configure the FortiGate unit for the lab environment used to complete the hands-on exercises

Traditional Network Security Solutions Firewall Antivirus Antispam WAN Optimization Web Filtering Application Control Intrusion Prevention VPN

Traditional Network Security Solutions Firewall Antivirus Antispam WAN Optimization Web Filtering Application Control Intrusion Prevention VPN Many single purpose systems needed to cope with a variety of threats

Fortinet Solution Firewall Antivirus Antispam WAN Optimization Web Filtering Application Control Intrusion Prevention VPN and more…

Fortinet Solution Firewall Antivirus Antispam WAN Optimization Web Filtering Application Control Intrusion Prevention VPN and more… One device provides a comprehensive security and networking solution

Fortinet Solution Hardware Purpose-driven hardware

Fortinet Solution Hardware FortiOS Specialized operating system

Fortinet Solution Hardware FortiOS FirewallAV Web Filter IPS … Security and network-level services

Fortinet Solution Hardware FortiOS FortiGuard Subscription Services FirewallAV Web Filter IPS … Automated update service Click here to read more about the Fortinet solution

Fortinet Solution Headquarters Branch office Home office

Fortinet Solution Headquarters Branch office Click here to read more about the Fortinet solution

Home office Fortinet Solution Headquarters Branch office FortiGate platform Management, reporting and analysis appliances FortiGuard Subscription Services Click here to read more about the Fortinet solution

FortiGate Capabilities Firewall

FortiGate Capabilities Antivirus

FortiGate Capabilities filtering

FortiGate Capabilities Web filtering

FortiGate Capabilities Intrusion prevention

FortiGate Capabilities Application control

FortiGate Capabilities Data leak prevention

FortiGate Capabilities WAN optimization

FortiGate Capabilities Secure VPN

FortiGate Capabilities Wireless

FortiGate Capabilities Dynamic routing

FortiGate Capabilities Endpoint compliance

FortiGate Capabilities Virtual domains

FortiGate Capabilities Traffic shaping

FortiGate Capabilities High availability

FortiGate Capabilities Logging and reporting

FortiGate Capabilities Click here to read more about the capabilities of the FortiGate device Authentication

FortiGate Unit Components Intel CPU

FortiGate Unit Components FortiASIC content processor

FortiGate Unit Components FortiOS 4.0

FortiGate Unit Components DRAM and flash memory

FortiGate Unit Components Hard disk

FortiGate Unit Components Interfaces

FortiGate Unit Components Console port

FortiGate Unit Components USB port

FortiGate Unit Components WirelessModule slot bays PC card slot

Fortinet Appliances FortiAnalyzer FortiMail FortiManager FortiScan FortiBridge FortiCarrier FortiDB FortiWifi FortiWeb FortiSwitch FortiVoice FortiAP FortiGate-ONE FortiClient

FortiGuard Subscription Services

Device Administration Web Config CLI Click here to read more about using the CLI

Administrators Customized access Full access Read-only access Scope: VDOM or Global

Global Scope Super Admin Profiles

Admin Profiles System Configuration Network Configuration Firewall Configuration UTM Configuration VPN Configuration etc Read Read-Write Admin Profile

Administrators Full access within a single virtual domain Full access super-admin profile Custom access custom profile prof-admin profile

Administrator Authentication Username and Password (one factor) FortiToken (two factor) +

Device Configuration Setting *.conf

Device Configuration *.conf Device configuration settings can be saved to an external file Optional encryption The file can be restored to rollback device to a previous configuration SCP supported for configuration restore FortiGate unit acts as SCP server set admin-scp enable Example - Restore from Linux :fgt-restore-config

Per VDOM Configuration File

Configuration Restore using SCP Protocol Must rename to sys_config during upload scp Full configuration file Includes all VDOMs

DHCP Server – IP Reservation

IP address reserved and always assigned to the same DHCP host Select an IP address or choose an existing DHCP lease to add to the reserved list Identify the IP address reservation as either DHCP over Ethernet or DHCP over IPSec MAC address of the DHCP host is used to look up the IP address in the IP reservation table DHCP Server – IP Reservation

FortiGate DNS Server Resolve DNS lookups from an internal network Methods to set up DNS for each interface: Relay DNS requests to the DNS servers configured for the unit Resolve DNS requests using a FortiGate DNS database Unresolved DNS requests are dropped Split DNS configuration DNS requests can be resolved using a FortiGate DNS database and any unresolved DNS requests can be relayed to DNS servers configured for the unit One DNS database can be shared by all the FortiGate interfaces If VDOMs are enabled, a DNS database needs be created in each VDOM

DNS Server Configuration DNS zones need to be added when configuring the DNS database Each zone has its own domain name DNS entries are added to each zone An entry includes a hostname and the IP address it resolves to Each entry also specifies the type of DNS entry IPv4 address (A) or an IPv6 address (AAAA) name server (NS) canonical name (CNAME) mail exchange (MX) name IPv4 (PTR) or IPv6 (PTR)

DNS Service Add a new DNS Service to an interface and select a mode: Recursive Non-recursive Forward to System DNS (forward-only) CLI equivalent: config system dns-server edit wan1 set mode recursive

DNS Zones Create a new zone (Master)

DNS Zones Create a new zone (Slave)

DNS Records Add DNS entries

Classroom Lab Topology

Labs Lab – Virtual Lab Environment Basics Logging in to the Virtual Lab Environment Click here for instructions on accessing the virtual lab environment Lab - Initial Setup Exploring the CLI Accessing Web Config Configuring Network Interfaces Configuring the FortiGate DNS Server Enabling DNS Recursive Configuring Global System Settings Configuring Administrative Users Click here for step-by-step instructions on completing this lab

Student Resources Click here Click here to view the list of resources used in this module