Course Outline

Introduction to Fortinet and FortiGate 600E

  • Overview of Fortinet for government
  • Features and specifications of the FortiGate 600E
  • Understanding the FortiOS operating system

Basic Configuration

  • Initial setup procedures for the FortiGate 600E
  • Navigating the FortiOS user interface
  • Executing basic configuration tasks

Firewall Policies

  • Understanding firewall policies in a government context
  • Creating and managing access control policies
  • Configuring NAT (Network Address Translation) and PAT (Port Address Translation)

User Authentication

  • Configuring user authentication for secure access
  • Integrating with external authentication servers such as LDAP and RADIUS

SSL VPN Configuration

  • Setting up SSL (Secure Sockets Layer) Virtual Private Networks (VPNs)
  • Customizing portal layouts and access for various user groups

Threat Management

  • Implementing antivirus, intrusion prevention systems (IPS), and anti-malware configurations
  • Configuring web and content filtering policies

HA Concepts and Benefits

  • Understanding high availability (HA) and its significance for government operations
  • Exploring HA modes: active-active and active-passive

Configuring HA on FortiGate 600E

  • Initial HA setup procedures for the FortiGate 6000 series
  • Best practices for configuring HA in a government environment
  • Monitoring and managing HA status to ensure reliability

Troubleshooting HA

  • Identifying and resolving common HA issues
  • Conducting failover testing and verification to maintain system integrity

Advanced Routing

  • Implementing dynamic routing protocols such as OSPF (Open Shortest Path First) and BGP (Border Gateway Protocol)
  • Configuring policy-based routing for enhanced network control

Deep Packet Inspection

  • Configuring deep packet inspection (DPI) to enhance security measures
  • Developing SSL inspection policies to protect sensitive data

Custom Security Profiles

  • Creating and applying custom security profiles for tailored protection
  • Configuring advanced threat protection features

Monitoring and Reporting

  • Managing logs and reports for compliance and auditing purposes
  • Utilizing real-time monitoring tools to track network performance

System Optimization

  • Tuning system performance and optimizing resource utilization
  • Managing firmware updates and backup procedures

Best Practices for Security and Administration

  • Optimizing security policies to align with government standards
  • Implementing regular maintenance and auditing processes

Summary and Next Steps

Requirements

  • Basic understanding of networking fundamentals
  • Familiarity with firewall concepts and security best practices

Audience

  • Network administrators for government
  • Security professionals
  • IT managers
 14 Hours

Number of participants


Price per participant

Testimonials (1)

Upcoming Courses

Related Categories