Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise. Provides tips, tricks, and proven suggestions and guidelines to set up FortiGate implementations Presents topics that are not covered (or are not covered in detail) by Fortinetas documentation Discusses hands-on troubleshooting techniques at both the project deployment level and technical implementation areaIn this mode, the interface from which a packet is forwarded is based on the routing table. ... These are often incorrectly referred to as GBICa#39;s, but are not the same as Ciscoa#39;s older socket technology. ... When using dynamically addressed interfaces, it wona#39;t be possible to configure your DNS to allow access to the device byanbsp;...
|Title||:||UTM Security with Fortinet|
|Author||:||Kenneth Tam, Martín H. Hoz Salvador, Ken McAlpine, Rick Basile, Bruce Matsugu, Josh More|
|Publisher||:||Newnes - 2012-12-31|