Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction to Fortinet and FortiGate 600E
- Overview of Fortinet for government
- Features and specifications of the FortiGate 600E
- Understanding the FortiOS operating system
Basic Configuration
- Initial setup procedures for the FortiGate 600E
- Navigating the FortiOS user interface
- Executing basic configuration tasks
Firewall Policies
- Understanding firewall policies in a government context
- Creating and managing access control policies
- Configuring NAT (Network Address Translation) and PAT (Port Address Translation)
User Authentication
- Configuring user authentication for secure access
- Integrating with external authentication servers such as LDAP and RADIUS
SSL VPN Configuration
- Setting up SSL (Secure Sockets Layer) Virtual Private Networks (VPNs)
- Customizing portal layouts and access for various user groups
Threat Management
- Implementing antivirus, intrusion prevention systems (IPS), and anti-malware configurations
- Configuring web and content filtering policies
HA Concepts and Benefits
- Understanding high availability (HA) and its significance for government operations
- Exploring HA modes: active-active and active-passive
Configuring HA on FortiGate 600E
- Initial HA setup procedures for the FortiGate 6000 series
- Best practices for configuring HA in a government environment
- Monitoring and managing HA status to ensure reliability
Troubleshooting HA
- Identifying and resolving common HA issues
- Conducting failover testing and verification to maintain system integrity
Advanced Routing
- Implementing dynamic routing protocols such as OSPF (Open Shortest Path First) and BGP (Border Gateway Protocol)
- Configuring policy-based routing for enhanced network control
Deep Packet Inspection
- Configuring deep packet inspection (DPI) to enhance security measures
- Developing SSL inspection policies to protect sensitive data
Custom Security Profiles
- Creating and applying custom security profiles for tailored protection
- Configuring advanced threat protection features
Monitoring and Reporting
- Managing logs and reports for compliance and auditing purposes
- Utilizing real-time monitoring tools to track network performance
System Optimization
- Tuning system performance and optimizing resource utilization
- Managing firmware updates and backup procedures
Best Practices for Security and Administration
- Optimizing security policies to align with government standards
- Implementing regular maintenance and auditing processes
Summary and Next Steps
Requirements
- Basic understanding of networking fundamentals
- Familiarity with firewall concepts and security best practices
Audience
- Network administrators for government
- Security professionals
- IT managers
14 Hours
Testimonials (1)
The trainer had an excellent knowledge of fortigate and delivered the content very well. Thanks a lot to Soroush.