Additional Information

Additional Information

Account Navigation

Account Navigation

Currency - All prices are in AUD

Currency - All prices are in AUD
 Loading... Please wait...
FortiWall

Tech Docs

Get UTM Security with Fortinet: Mastering FortiOS Here

Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise.  FortiOS Handbook, Fortinet Manual and FortiOS5 FortiOS 5 information and documentation.

  • Provides tips, tricks, and proven suggestions and guidelines to set up FortiGate implementations
  • Presents topics that are not covered (or are not covered in detail) by Fortinet's documentation
  • Discusses hands-on troubleshooting techniques at both the project deployment level and technical implementation area

FortiOS Cookbook - Application Control (5.0) - YouTube Video

FortiGate Cookbook - Client Reputation (5.0) - YouTube Video

Fortinet FortiOS 5 Endpoint Control - YouTube Video