You are previewing Getting Started with FortiGate.
O'Reilly logo
Getting Started with FortiGate

Book Description

This book will take you from complete novice to expert user in simple, progressive steps. It covers all the concepts you need to administer a FortiGate unit with lots of examples and clear explanations.

  • Learn about FortiGate and FortiOS 5 starting from the ground up, with no previous knowledge of Fortinet products

  • Understand and deliver Routing, VLANs, NAT, and high availability solutions using FortiGate units

  • Design and deploy security policies, content filters, and endpoint security using UTM features inside a FortiGate unit

  • In Detail

    FortiGate from Fortinet is a highly successful family of appliances enabled to manage routing and security on different layers, supporting dynamic protocols, IPSEC and VPN with SSL, application and user control, web contents and mail scanning, endpoint checks, and more, all in a single platform. The heart of the appliance is the FortiOS (FortiOS 5 is the latest release) which is able to unify a friendly web interface with a powerful command line to deliver high performance. FortiGate is able to give users the results they usually achieve at a fraction of the cost of what they would have to invest with other vendors.

    This practical, hands-on guide addresses all the tasks required to configure and manage a FortiGate unit in a logical order. The book starts with topics related to VLAN and routing (static and advanced) and then discusses in full the UTM features integrated in the appliance. The text explains SSL VPN and IPSEC VPN with all the required steps you need to deploy the aforementioned solutions. High availability and troubleshooting techniques are also explained in the last two chapters of the book.

    This concise, example-oriented book explores all the concepts you need to administer a FortiGate unit. You will begin by covering the basic tools required to administer a FortiGate unit, including NAT, routing, and VLANs. You will then be guided through the concepts of firewalling, UTM inside the appliance, tunnelling using SSL, and IPSEC and dial-up configurations. Next, you will get acquainted with important topics like high availability and Vdoms. Finally, you will end the book with an overview of troubleshooting tools and techniques.

    Table of Contents

    1. Getting Started with FortiGate
      1. Table of Contents
      2. Getting Started with FortiGate
      3. Credits
      4. Foreword
      5. About the Authors
      6. About the Reviewers
        1. Support files, eBooks, discount offers and more
          1. Why Subscribe?
          2. Free Access for Packt account holders
          3. Instant Updates on New Packt Books
      8. Preface
        1. What this book covers
        2. What you need for this book
        3. Who this book is for
        4. Conventions
        5. Reader feedback
        6. Customer support
          1. Errata
          2. Piracy
          3. Questions
      9. 1. First Steps
        1. Administering a FortiGate
        2. Unboxing the FortiGate and license options
        3. First access to a FortiGate
          1. Changing the admin password, name of the host, time, and time zone
          2. Selecting the operation mode and configuring the internal and external interfaces
          3. Registering your FortiGate
          4. Updating the system firmware
          5. Restoring a device
          6. Updating definitions and services
          7. VLANs and logical interfaces
        4. Static routing
        5. Policy routing
        6. Dynamic routing
        7. Introducing OSPF
          1. Configuring OSPF on a FortiGate
            1. OSPF router ID
          2. OSPF area
          3. Network
          4. Interfaces
        8. Monitoring OSPF routes
        9. Summary
      10. 2. Filters, Policies, and Endpoint Security
        1. Processing a data packet inside a FortiGate
        2. Firewall features
          1. Interfaces and zones
          2. Firewall objects
          3. Addresses
          4. Services
          5. Schedules
        3. UTM profiles
          1. Antivirus
          2. Intrusion protection
          3. Web filter
          4. Client reputation
        4. Traffic shaping
        5. Security policies
        6. FortiClient
          1. FortiClient management
        7. Bring Your Own Device (BYOD)
        8. Summary
      11. 3. VPNs and Tunneling
        1. SSL VPN
          1. Introduction to SSL VPN portal with web-only mode
          2. Introduction to SSL VPN portal with tunnel mode
        2. Configuring the SSL VPN portal
          1. Configuring the SSL VPN settings
          2. Configuring the SSL VPN portal
          3. Configuring users and groups for the SSL VPN portal
          4. Configuring a policy for the SSL VPN portal
        3. FortiGate IPsec VPN
          1. Configuring an IPsec VPN
          2. Designing a Gateway-to-Gateway VPN
          3. Hub-and-Spoke VPN
          4. Dialup VPN
          5. FortiClient dialup client
          6. L2TP VPN
        4. Summary
      12. 4. High Availability
        1. Link aggregation
        2. Virtual MAC addresses
        3. FortiGate Cluster Protocol
          1. Active-Passive and Active-Active Clusters
        4. FortiGate Session Life Support Protocol
        5. Virtual Router Redundancy Protocol
        6. Full mesh high availability
        7. Introducing virtual domains
        8. VDOMs and virtual clustering
        9. Summary
      13. 5. Troubleshooting
        1. Base system diagnostics
        2. Troubleshooting routing
          1. Layer 2 and layer 3 TCP/IP diagnostics
        3. Troubleshooting security policies and profiles
          1. FortiOS packet sniffer
          2. Firewall session lists information
          3. Debugging URL and anti-spam filters
        4. Troubleshooting virtual domains
        5. Troubleshooting VPN
        6. Troubleshooting High Availability (HA)
          1. Troubleshooting HA clusters
          2. Troubleshooting virtual clustering
        7. Summary
      14. Index