Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
Results Page:  Previous Next

Title UTM security with Fortinet : Mastering FortiOS / Kenneth Tam [and others]. [O'Reilly electronic resource]

Imprint [Place of publication not identified] : Syngress, 2013.
QR Code
Description 1 online resource : illustrations
Summary Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise. Provides tips, tricks, and proven suggestions and guidelines to set up FortiGate implementationsPresents topics that are not covered (or are not covered in detail) by Fortinet's documentation Discusses hands-on troubleshooting techniques at both the project deployment level and technical implementation area.
Bibliography Includes bibliographical references and index.
Contents Title page; Copyrigh; Dedications; Contents; Acknowledgements; About The Author; Foreword; Preface; Section I:General Introduction; 1 Introduction to UTM (Unified Threat Management); Introduction; Internet and Security; Basic Network Security Concepts; Computer and Network Security Concepts and Principles; Computer and Network Security Technology Concepts; Network Security Technology Concepts; Commonly used Computer and Network Security Terms; Unified Threat Management (UTM) Foundations; The World before UTM; The History of the Unified Threat Management (UTM) Concept
UTM vs Other Security ArchitecturesUTM vs Best-of-Breed; UTM vs Next-Generation Firewalls; UTM vs XTM; Solving Problems with UTM; Better Security; Consistent Security Policy; Protecting against Blended Threats; Implementing Clean Pipes; More Efficient Security; Higher Performance; Enhancing Operational Response Times (Meeting and Enhancing SLAs); Getting a better Support Experience; Increasing Network Availability; Cost Effectiveness; Easier Investment Justification; Licensing Simplicity; Lowering Operational Costs; Current UTM Market Landscape; UTM a-lá Fortinet; Reliable Performance
Selective FunctionalityHomegrown Technology; In-house Security Intelligence Unit: FortiGuard Labs; Single Licensing Cost; Included Virtualization; Other Vendors; Evolution and Future of UTM; 2 FortiGate Hardware Overview; FortiGate Hardware Overview; The Fortinet Way; Evolution of FortiGate; Current FortiGate Solutions; Virtualized Appliances; FortiGate Custom Hardware Accelerations Overview; Features of the Last Four Generations of Content Processor (CP) ASIC Functionalities; Features of the Network Processor (NP) ASIC Functionalities; FortiGate Hardware Accelerations Behaviors
Firewall Acceleration using NP ASICVPN Acceleration using NP and CP ASIC; UTM Acceleration using CP and SP ASIC; The 'Black Art' of FortiGate Sizing; Sizing Data Gathering; Assessing the Recommended FortiGate Solution; Feature Capabilities; Feature Capacity; Performance Capabilities; Centralized Management Platform Overview; Fortinet Product Portfolio; FortiGuard; FortiCarrier; FortiBridge; FortiAP; FortiToken; FortiAuthenticator; FortiMail; FortiWeb; FortiScan; FortiDB; FortiBalancer; FortiClient; References; 3 FortiOS Introduction; Fortios Architecture; Multiple Image Support
Firmware Image VersionsFortiOS Operational Modes; Packet Flow Handling; WebUI Management Interface; CLI Management Interface; System Options; Recommended Configuration Options; Configuring Logging; SNMP Configuration; Controlling Administrative Access; FortiOS Default Behavior to Non-Service Ports; Network Time Protocol (NTP)4; Specifying the Source IP Address for FortiOS Originated Traffic; Dealing with Administrative Operations; Performing Backups; Restoring the Configuration; Upgrading/Restoring Firmware; Password Recovery; Automatic FortiAP Firmware Updates from FortiGate; Enabling VDOMS
Subject Computer networks -- Security measures.
Computer networks -- Access control.
Réseaux d'ordinateurs -- Sécurité -- Mesures.
Computer networks -- Access control
Computer networks -- Security measures
Added Author Tam, Kenneth.
ISBN 9781597499774 (electronic bk.)
1597499773 (electronic bk.)
Patron reviews: add a review
Click for more information
EBOOK
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information