After completing these courses, you will be able to:
- Describe capabilities of FortiGate UTM
- Neutralize threats / misuse: viruses, phishing, spam, torrents, and inappropriate web sites
- Control network access based on device type
- Authenticate users via firewall policies
- Offer an SSL VPN for secure access to your private network
- Establish an IPsec VPN tunnel between two FortiGate appliances
- Compare policy- vs. tunnel-based IPSec VPN
- Apply port forwarding, source NAT, and destination NAT
- Interpret log entries
- Generate reports
- Use the web UI and CLI for administration
- Deploy the right operation mode
- Simplify protocol handling with application control