Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
173 views
25 pages
NSE4 Security Fabric-LAB
Fortigate NSE4 Security Fabric LAB
Uploaded by
firas L
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save NSE4 Security Fabric-LAB For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
173 views
25 pages
NSE4 Security Fabric-LAB
Fortigate NSE4 Security Fabric LAB
Uploaded by
firas L
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save NSE4 Security Fabric-LAB For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 25
Search
Fullscreen
Lab 2: Security Fabric Inthis la, you wil lear to conigure the Fortnet Securiy Fabre, After you configure the Securiy Fabric, you will _access the physical and logical topology views, Objectives “+ Configure the Secunty Fabric on Loca-FertiGate (root) and ISFW (downsteam) + Configure the Secunty Fabric on Local-FortiGata root) and Remate-Fortiate (downstream) ‘+ Use the Security Fabric topology views tohave legical and physica viens of yournetwork topology ‘+ Run the Securty Fabrerating checks on the root FortiGate and apply a rasommendation Time to Complete Estimated: 45 minutes Topology In this, you wil lear how to configure the Securiy Fabric on allFotiGate devices inthe topology. Lace FortiGate and Ramote-ForiGate are connected through an IPsec tunnel. Local-FortGaie is the root Fotiate in the Security Fabric, and Remcte-FortGale and ISFW are downstream FortiGate devices. FortiAnalyzetisbehind ‘Local FortiGate and wil be used inthe Security Fabric. Prerequisites Before teginning this lab, you must restore configuration tes on Local-FortGate and Remote-FortiGate. The SEW configurationis pretoacedMake sure youresiore the correct configuration on each FortiGate, using the folowing “steps. Failure to restore the correct configuration on each FortiGate will preventyou romdoing the ib oxercisa To restore the Remote FortiGato configuration file 41. Connectio the Remote-FortiGate GUI, and then og in withthe usemame acini n and password passvors. 2. Inthe upper-ight comer ofthe screen click admin, and then cick Configuration > Revisions. FortiGate VM64-KVM 7.0.0 build0066 (GA) Change Password 13. Clckthe + sign to expand the Uist. 4. Selec’ the configuration with the comment remote-SF, and then clck Revert. 5. Click OK 0 reboot ‘To restore the Local-FortiGate configuration file 4. Connectto te Local-FortiGate GUI, and then log in withthe vsemame acini n and password passvors. 2. Inthe upper-right comer ofthe screen, cickadmin, ard then clic Configuration > Revisions.FortiGate VM64-KVM 7.0.0 build0066 (GA) & System > DB Backup 'D Restore 3. Click the + sign to expand the lst. 4, Select the configuration with the comment local-SF, and then click Revert. 5. Click OK to reboot. Exercise 1: Configuring the Security Fabric on Local- FortiGate and ISFW In his exercise, you will configure he Securty Fabiic between Local-ForiGate ((cot) and ISFW (downstream), Configure the Security Fabric on Local-FortiGate (Root) ‘You wil configure the root of the Security Fabric, To enable Security Fabric Connection on Local-FortiGate interfaces 4. Conneetto the Local-FortiGate GUI, and then login withthe usemame acinic and password password. 2. Click Network > Interfaces. 3. Click pons, anc nen cick Eat. 4, Inthe Administrative Access section, select he Security Fabric Connection checkbox. 55. Inthe Network section, enable Device detection.‘Administrative Recess va HTTPS OFMG-Access TELNET Security Fabric ‘comection Network Click OK. OK to confirm, HTTP PING Osnup Orm RADIUS Accounting, receive ior © URREGRERNIY enatie | oisatie Transmitt0P © ESISSRESNIY crabie oisbie Click Network > Interfaces, and then expand port Click the To-Remote-HQ2 interface, and then click Edit, Inthe Administrative Access section, select the Security Fabric Connection checkbox. Click OK. To enable the Security Fab on Local-FortiGate 4. On the Local-FortiGate GUI, click Security Fabric > Fabric Connectors. 2. Click Security Fabric Setup, and then click Edit. 3. Inthe Security Fabric Settings section, click Enabled. 4. Click Serve as Fabric Root. ‘A new window opens. 5. Configure the folowing FortiAnalyzer settings: IPaddiess Upload option 6. Click Test Connectivity. 10.0.1.210 RealTimeFortine Sates ston (mao: Pes poizi0 Upoxdopion © BEM este ers ‘Allow acess to FortiGate REST AP| © erty Fortianahercertfeate © ‘Awarning appears indicating that Locai-FortiGate isn't yet authorized on ForiAnalyzer. This authorizaionis configured on FortiAnalyzer in alater step. 7. Click OK 8 Click Accept. 9 Configure the folowing settings: are} Fabric name Allow other Securty Fabricdevices tojon enable (ensure both interfaces are selected) port3, To-Remote-HO2 ‘Your configuration should looklike the following example:Eat Fabric Connector Core Network Security Security Fabric Settings status FEET © oisties SecurtyFabricrle EERE oon existing Fabric 9 Fortianayzer configuration changes willbe saved along withthe Security Fabric settings Fabric name fortne Allowother Security Fabricdevices tojein © ports * 2 To-RemoteHQ2 x Device authorization None Ecit ‘Allow downstream device REST APL access @ CD SAML Single Sign-On © ® GE Advanced Options Management PFQDN © Poewan eam Management port PEE sci 40. click Ox. 44. Click OK tocontirm, Configure the Security Fabric on ISFW “You wil configure ISFW to join the Securly Fabric as a downstream ForuGate, ‘Take the Expert Challenge! On the ISFW GUI, erable Security Fabric Connection on port! and port3, Enable network device ‘tection on both ports. After you enable Security Fabric Connection, configure Security Fabricsettings withthe groupname fort ines. you requie assistance, orto verity yout work, use the step-by-step instructions that folow. ‘After you complete the challenge, see To enable the Security Fabric on ISFW (downstream) on page 31To enable Security Fabric Connection on ISFW interfaces 4. Connectte the ISFW GUI, and then login with the usemame acinin and password » 2. Click Network > Interfaces. 3 Click portt, andihen cick Eat 4, Inthe Administrative Access section, confirm that the Security Fabric Connection checkboxis selected, 5. Inthe Network section, enable Device detection, orm Ci eactusaccouming reehe ioe O EURNBEIMIAY cite iste ronnt.0r © EEEESTERI cote ste Dic Server Network Devicedetecton © © 6. Click OK, 7. Glick OK to confirm 8. Click Network > Interfact 9. Click port, and then click Edit. 10. Inthe Administrative Access section, select the Security Fabric Connection checkbox. 14. Inthe Network section, enable Device detection. 42, Click OK to save the changes. To enable the Security Fabric on ISFW (downstream) 1. Onthe ISFW GUI, click Security Fabric > Fabric Connectors. 2. Click Security Fabric Setup, and then click Edit. 3. Inthe Security Fabric Settings section, click Enabled. ‘Security Fabric Settings status on 4. Inthe Security Fabric role field, confirm that Join Existing Fabric is selected. 5. Inthe Upstream FortiGate IP field, type 10.0.1.254 6. Inthe Default admin profile field, select super_adimin. Your configuration should look like the following example:Ea Fabric Comentor sete EEE 0 ne Serra re Seven Faei Rot EET Upirean Forte? to01254 Alowater ‘ect fabrededcestofn © path x 1 ports x ow domnsiream device REST AP acess @ OD sana sngiesipron © HEED Heist Aavacec Options ede Penang Deautiogn page © BEI ste sivon Detain grote © — Management 7FQON. © Uiewin RERENIN 26031200 Management por EE 5 - verte encore mse = 7. ClckOK. 8. Click OK to confirm the setungs. : 2 et eae at a ¢ Sete. ‘when joining the Security Fabric, Authorize ISFW (Downstream) on Local-FortiGate (Root) ‘You wil authorize ISFW on Local-FortiGate tojoin the Security Fabric,To authorize ISFW on Local-FortiGate 1. Onthe Local-ForiGate GUI, click Security Fabric > Fabric Connectors, 2. Inthe Topology section. click the highlighted FortiGate serial number, and then cick Authorize, 0 ope |B lacabrorticnte Fabric Root), ic stow n Securty Fabric» Sect Paling 2 Loginto FovmorTM17007959 [After authorization, ‘SFW appears in the Security Fabric topology section, which means ISFW joinedthe Securly Fabric successfully. Please allow a few minutes for Local-FortiGate to retieve information from ISFW. Synchronize an Address Object to Resolve Conflicts ‘You wil create anew address objectto resolve Fabric conflicts in Security Fabric devices. By detautt, Fabric object synchronization is disabled on the supported Fabric cbjects, and these are kept as locally created objects on Security Fabric devices, To synchronize an address object to resolve conflicts 4. Onthe LocalFortiGate GUI, click Policy & Objects> Addresses 2. Click Create New, an¢ then select Addroes, 3 Inthe New Address window, inthe Name el, ype TEOT-NET~ 4. Inthe IP/Netmask field, type 192.¢.2.0/24, and then enable Fabric synchronization. Tew naires Nate vestner Coker Bunge Intertace Oy = Fabnesinetronztien Statirutecontgurtion Comments wwritea ass5. Click OK to savethe new address object. 6. OntheLocal-FottiGate GUI, cick Security Fabric > Fabric Connectors. In the Topology section, you will see a Firewall objects are in conflict with other FortiGates in the fabric notification, ca Freva objectsareln conic with eter FortGates nthe fac. Review (enl obec cones (@ WecabForicate Fabre Root) For this ab, an object withthe same name, a different IP address, and Fabric ‘synchronization enabled was created on ISFW to cteale a Fabric conflict. 7. Click Review firewall object conflicts. 8. Click Rename All Objects with all the default settings. Firewall Object Synchronization x ‘The following objects require manual intervention inorder to |A.synchranize them ith the fabric. Click "Rename All Objects" to automatically resolve al conflicts by renaming them. stratesy EEE ns Automatcalyrenaméon Root FortiGate [SSS Rename AlObIecs J | Sear Q Fabric Object © status Conficting FortiGate & Ear TESENET-1 © Content mismatch Bis ‘The Fabric status and object name will change to resolve the conflict. Qa Conflicting FortiGate + Fabric Object EE Acdress @ TESTNET-LISFW © Resolved8. Click Close fo cise the Firewall Object Sychronization window, 10. On the ISFW GUI, dick Polley & Objects > Addresses to vey natthe synchronization crested a new object, TEST.NET-1, and alcoronamed the previously existing objectto TEST-NET.4_1SFW. Brstetustw Check the Security Fabric Deployment Result ‘Youwill check the Security Fabric deployment resulton Local-FortiGate (root). ‘To check the Security Fabric on Local-FortiGate 4. Onthe Local-Ctient VM, open a new browser, and then go to htips //w.fortinet.com. This is to generate some traffic from the Local-Ciient VM to view in the next steps. 2. Onthe Local-FortiGate GUI, click Dashboard > Status, ‘The Security Fabric widget displays the FortiGate devices in the Security Fabric. Sect Fabre tar 7 ReGae x w @ G teat Foran FabicRood 3. Onthe Local-FortiGate GUI, cick Security Fabric > Physical Topology. ‘This page shows a visualization of access layer devices in the Security Fabric.ome. Your topology viewmight not match what is shown inthis example. 4. On the Loca-FortiGate GUI, lick Security Fabric > Logical Topology. ‘This dashboard alsplays information about the intertaces that each device in he Secunty Fabre connects to ‘Tofhish the Secusty Fabric configuration, you wal authorize all FortiGate devices on Fortisnalyzer. You will configure this authorization inthe next exercise ‘Your topology view mightnot match what is shown inthis example,Exercise 2: Configuring the Security Fabric on Local- FortiGate and Remote-FortiGate In this exercise, you will edd another FortiGate tothe Secury Fabric tee. n this topology the downstream Remote. FortiGate ie sonnectedto the roo! Local FortiGate over IPsec VPN to join the Security Fabric, Take the Expert Challenge! (On the Remote-FortGate GUI, enable Security Fabric Connection on port6 and the Te-Local-H@1 VPN Interface. Enable network device detection on ports After you enable Security Fabric Connection, Ccenfigure the Secuity Fabric settings wih the group name fort inet, anduse the tunnel IPaddress 20,10. 10.1 teconnest to the root FortGate, IM yourequire assistance, or toventy your work, use the step-by-step instructions that follow. ‘ter youcomplete the challenge, see Authorize Remote-ForiGate (Downstream)on Local-ForiGete Configure the Security Fabric on Remote-FortiGate (Downstream) ‘You will configure Remote-FortiGete to join the Secury Fabric as 2 downstream FertiGate over the IPsec VPN. To enable Security Fabric Connection on Remote-FortiGate interfaces 4. Connect to the Remote-FotiGate GUI, and then log in wth he username admin and password passw 2. Click Network> interfaces. 3, Click ports, and then click Edit. 4, Inthe Administrative Access section, select he Security Fabric Connection checkbox. 5. Inthe Network section, ensure that Device detection is enabled 6 % a 2 Click OK. Click Network > Interfaces, and thon expand porta. Click the To-Local-HQt interface, and then click Edit In the Administrative Access section, select he Security Fabric Connection checkbox. 10. Click OK to save the changes. To enable the Security Fabric on Remote-FortiGate 4. On the Remote-FortGate GUI, cick Security Fabric> Fabric Connectors, 2. Click Security Fabric Setup. and then click Edit. 3. Inthe Security Fabric Settings secion, cick Enabled, suas aS4, Inthe Security Fabric role field, ensure that Join Exi 5. Inthe Upstream FortiGate IP field, type 10. 10.10.1. 6. Inthe Default admin profile field, select super_admin. ‘Your configuration should look like the following example: [Edit Fabric Connector Core Network Security ‘Security Fabric Settings stats FEET 0 osses Seoary Fabric role Serve 5 Fabrc Rot Upstream FortiGate IP 1010101 ‘Allow other Security Fabric devicestojoin © [Bi porté x @ ToocahHan x ‘Allow downstream device REST API access @ CD SAML Single Sign On BEEN Manu |& advanced Options Mode ‘Pending Defaut loin page © BEE sce sin-on Default admin profile © sper din = Management P/EQON @ usewaNi [EEE 1020031 atone [se crin Po 1. Click OK. 8. Click OK to save the settings Authorize Remote-FortiGate (Downstream) on Local-FortiGate (Root) ‘You willauthorize Remote-FortGate on Local-FortGate to join the Security Fabric. To authorizo Romoto-FortiGato on Local-FortiGato 4. Connect tothe Local-FortiGate GUI, and then log in with the username amin and password password, 2. Click Security Fabric > Fabric Connectors. 3._ Inthe Topology section, cick the highlighted FortiGate serial ruber, and then click Authorize.‘Mer authoization, Remate-FortGale appearsin the topciogy fed. Now, both ISFW ‘andRRemote-FortiGate are shown as two downstream devices ofthe roo, Local- FortiGate. Your configuration should lock ike the fellowing example: i taal Forte tricot 4. On the Local-FortiGate GUI, click Security Fabric> Fabric Connectors. 5. Glick FortiAnalyzer Logging, ard then click Edt ‘Awearning appears indicating thal FortiGate not yet authorized on ForiAnalyzer. You wil authorize all FortiGate devices on Fortnalyzarin the next step.Authorize All Security Fabric FortiGate Devices on FortiAnalyzer You will authorize all Security Fabric devices on FortiAnalyzer. To authorize Local-FortiGate, ISFW, and Remote-FortiGate on FortiAnalyzer 1. Connectto te FomiAnalyzer GUI, anc then log in withthe username acinin and password password, 2. Click Device Manager.3. Click Unauthorized. 5. Click OK to keep the default FortGate names. 6. Inthe Authorize Device wizard, click Close. Allthree devices wil be acded to the FortiAnaiyzer root ADOM. Wait fora few seconds until the Logs status forall ForiGate devices tuns green. Check the FortiAnalyzer Status on All Security Fabric FortiGate Devices You willcheck the FortAnalyzer status cn al three ForiGate devices, ‘To check the FortiAnalyzer status on all FortiGate devices, 1. On the Loca-FortiGale GUI, cick Security Fabric> Fabric Connectors. 2. Click Fortianalyzer Logging, and then click Edit. Inthe FortiAnalyzer Status section, you wil s2e the Connection satus is Connected,3. On the ISFW GUI, click Security Fabric> Fabric Connectors. 4. Click FortiAnalyzer Logging, and then click View. — — = | @ ny rr 1 '5. Onthe Remote-FortiGete GUI click Security Fabric > Fabric Connectors. 6. Click FortiAnalyzer Logging, and then click View.Gocitty Ete ' 2 toh i ap ss.0na/ namo ae - etter ae sto BEIT © ose © crest bree tent Fates eS ne —— ‘peoseaten : Oca tne teeciteet ‘iano RTH ‘how hed CD Check the Security Fabric Deployment Result ‘You will shock the Security Fabrie deployment oeult onthe root, Local-FortGate. ‘To check the Security Fabric on Local-FortiGate 4. On he Local FortiGate GUI cick Dashboard > Status. ‘The Securty Fabric widget displays al FertiGate devices inthe Socurty Fabric BeaBax w 6 a & Loca FortestelF tc oct) be sew i Rete Fortis 2. Onthe LocalForiGate GUI. click Security Fabric > Physical Topology. “Ths page shows.a vsualization of acoess layer devices inthe Secunty Fabric,FQ Jute Intenet> Acs SecantyFatric other @ eves Tae x @B8axms Saveested Topology las upétet 8 seconds age Sect Rating ensts tata 3 minute) and Peco ‘what s shown inthis example, 3. Onthe Local-FortiGate GUI, click Security Fabric > Logical Topology. hdesrean Reet etrcs Bytes Sent /Receved)= ‘You may need to dick the Update Now button to refresh the topology. Your lopology view mightnot match ae Bao ‘This dashboard displaysinformation about the interfaces that each device in the Security Fabric connects to. Meties Bytes SenReehed)= xo & ungaeateaconsan Seca rat imines) a 29 scot) go Your topology ew might not match what is shown in this example, Ata minimum, you should see Local-FortGate, Remote-ForiGate, and ISFW in the topology view.Exercise 3: Running Security Rating ‘The security ratng feature includes three major score cards: Security Posture, Fabric Coverage. and Optimization. These canhelp you make improvements fo your organization's network, such as enforcing password security, applying recommended login attemp! thresholds, encouraging two-factor authentication, and ‘more. n this ab, you will run security ratings and apply some of the recommendations, When you make changes through the Security Posture page, FortGate generates ‘wo configuration revisions for each change you make. Because FortiGate can store only alimited number of revisions, if you meke multiple changes through the secuty rang, you may lose semeof he revaione forthe nextlaks. you lose any revisions that you make forthe labs, contact the instructor for assistance, Running Security Rating on the Local-FortiGate (Root) Inthis exercise, you wil in a securily rating check, which analyzes the Security Fabric deployment to identify potential wuinerabities and highigh! best pracices. Youmust run the Security Fabric rating on the root Fortiate device inthe Securty Fabric. To review the Security Posture widget 4. Connectto the Local-FortiGate GUI, and then log inwith the usemame acini and password password, 2. Click Security Fabric> Security Rating, and then check the Security Posture widget to see the score of your ‘Security Fabricdeployment. Seeurty Posture tf conigrstonaestnsie ues prc vito oem -416.04When you make changes through the Security Posture page, FortiGate generates ‘two configuration revisions for each change you make. Because FertiGate can slore ‘oniya limited number ofrevisione,f you make multiple changes through the security ‘ating, you may lose some ofthe revisions for the next abs. Ityou lose any revisions thet you make forthe labs, contact tne Instuctor for assistance. ‘Your Security Posture wicget mightnot match what is shown in ths example. To genorate new security rating scores on the root FortiGate 4. Onthe Local-FortiGate GUI, click Security Fabric > Security Rating Security Posture J -416.04 Fable Coverage 125.78 a = _ Opeinzatan 56.12 cnn a a 18 Soman nc ps 1B Sonia nt ane ee Bosse Situ e ‘You can expand each scorecard section to view recommendations for each section, 2. Click Security Posture to show the scorecard details.The Security Posture scorecard shows the folowing information: + A Score field that shows the score for your Securiy Fabric i ‘+ Anoverall count of how many checks passed and falled, with the falled checks aigle divided by severity + Information about each failed check, including which FortiGate device failed the ‘check, the effect ofthe check failure on the security score, and recommendations tofixthe issue ‘+ An Apply option with recommendations that can be applied by the wizard Your Security Posture Score might not match whats shown in this example ‘3. Inthe Security Control column, expand Failed, and then select Administrative Access. ‘The Apply option appears with recommendations that can be applied by the wizard, 4. Inthe right pane, under Local-FortiGate, click Apply. FED sere rece set rite tna wu eaeIfyou cant see the Apply button, zoom out on the web page to view the fll page, §. Click OK to save the configuration fl. ‘The View Diff button appears beside Apply after audit log settings are applied successfully. 6._ Click View Diff to view the configuration changes thatthe wizard applied to Local-FortiGate. Conkguation Dit contig system gtobat set aanin-nttps-redirect disable Set asin. Lockout-auration 1 sipped 24 es edit "ports" set von “root Set Ip 19.200.1.1 255.255.255.0 set atlowaccess’ping https ssh http tote Set type physica Set Ua-reception enable Set role van tioned 14203. end contig router multicast end 7. Click Close. 8. Click Security Fabric > Security Rating, 8. Click Run Now to get the new Security Posture score, eS = 416.04 You wil notice the Security Posture widget displays information from the most recent security rating check,When you run a Security Fabric rating, your organization's Security Fabric receives a ‘Security Fabric score. The score willbe postive or negative, and a higher score represents a more secure network. The score is based on how many checks your network passes and fails, as well as the severity level of these checks, You can repeat steps 2107 forall other sections and devices to apply recommendations, which willimprove your Security Fabric score. ‘Your security rating scores might not match whatis shown in this example.
You might also like
Fortinet Fortinac Study Guide For Fortinac 72
PDF
No ratings yet
Fortinet Fortinac Study Guide For Fortinac 72
452 pages
Lab Guide BAE - FortiSASE v25
PDF
No ratings yet
Lab Guide BAE - FortiSASE v25
175 pages
CSE HOL FortiLink 7.2
PDF
No ratings yet
CSE HOL FortiLink 7.2
54 pages
FortiOS 7.2 Best Practices
PDF
No ratings yet
FortiOS 7.2 Best Practices
44 pages
Fortinet Security Fabric Fortigate 60F
PDF
No ratings yet
Fortinet Security Fabric Fortigate 60F
11 pages
Nse4 - FGT-7.2 V13.35
PDF
No ratings yet
Nse4 - FGT-7.2 V13.35
97 pages
FortiGate Complete Configuration Guide
PDF
No ratings yet
FortiGate Complete Configuration Guide
6 pages
Fortinet Nse4 Lab Guide
PDF
No ratings yet
Fortinet Nse4 Lab Guide
16 pages
Fortigate Fortiwifi and Fortiap Configuration Guide 56
PDF
No ratings yet
Fortigate Fortiwifi and Fortiap Configuration Guide 56
205 pages
Transparent Mode Fortigate Getting Started 52
PDF
100% (1)
Transparent Mode Fortigate Getting Started 52
84 pages
NSE2 Exam
PDF
100% (3)
NSE2 Exam
40 pages
FortiAnalyzer Admin Guide 72
PDF
No ratings yet
FortiAnalyzer Admin Guide 72
55 pages
FortiManager VM VMware Install Guide
PDF
No ratings yet
FortiManager VM VMware Install Guide
26 pages
FTNT Secure SDWAN Use Cases
PDF
No ratings yet
FTNT Secure SDWAN Use Cases
32 pages
LAB 08 Web Filtering
PDF
No ratings yet
LAB 08 Web Filtering
19 pages
Palo Firewall-Migration-Guide
PDF
No ratings yet
Palo Firewall-Migration-Guide
14 pages
FortiOS 7.0.0 New Features Guide
PDF
No ratings yet
FortiOS 7.0.0 New Features Guide
355 pages
Fortinet Solutions RSSO - RADIUS Single Sign On
PDF
100% (1)
Fortinet Solutions RSSO - RADIUS Single Sign On
27 pages
Fortinet Security Fabric Overview 1653078793
PDF
No ratings yet
Fortinet Security Fabric Overview 1653078793
1 page
FortiGate Sec 02 Security Fabric
PDF
No ratings yet
FortiGate Sec 02 Security Fabric
39 pages
FCSS - EFW - AD-7.4 Fortinet Updated Practice Questions
PDF
No ratings yet
FCSS - EFW - AD-7.4 Fortinet Updated Practice Questions
22 pages
FortiSwitchOS-7.2.1-FortiLink Guide-FortiSwitch Devices Managed by FortiOS 7.2
PDF
No ratings yet
FortiSwitchOS-7.2.1-FortiLink Guide-FortiSwitch Devices Managed by FortiOS 7.2
238 pages
FFT - Introduction To Fortinet Network Security Lab Guide r3.15
PDF
No ratings yet
FFT - Introduction To Fortinet Network Security Lab Guide r3.15
127 pages
Nse4 - FGT-7 2 - CSL-11 09 - 104
PDF
No ratings yet
Nse4 - FGT-7 2 - CSL-11 09 - 104
67 pages
FortiAnalyzer Administrator
PDF
No ratings yet
FortiAnalyzer Administrator
2 pages
Nse4 - FGT 6.2 V12.75 Nov PDF
PDF
No ratings yet
Nse4 - FGT 6.2 V12.75 Nov PDF
52 pages
Nse4 FGT-6
PDF
No ratings yet
Nse4 FGT-6
51 pages
Ebin - Pub Fortinet Fortianalyzer Lab Guide For Fortianalyzer 70
PDF
No ratings yet
Ebin - Pub Fortinet Fortianalyzer Lab Guide For Fortianalyzer 70
145 pages
Lab 2: Security Fabric: Do Not Reprint © Fortinet
PDF
No ratings yet
Lab 2: Security Fabric: Do Not Reprint © Fortinet
27 pages
Lab Guide
PDF
No ratings yet
Lab Guide
107 pages
FA FTNT Fast Track Brochure 3302021 Final
PDF
No ratings yet
FA FTNT Fast Track Brochure 3302021 Final
47 pages
Laboratorio 9
PDF
No ratings yet
Laboratorio 9
21 pages
Laboratorio 12
PDF
No ratings yet
Laboratorio 12
24 pages
Course - FortiGate Essentials 6.4 Self-Paced
PDF
No ratings yet
Course - FortiGate Essentials 6.4 Self-Paced
4 pages
Fortinet NSE4 - FGT-6 4 v2021-05-11 q39
PDF
No ratings yet
Fortinet NSE4 - FGT-6 4 v2021-05-11 q39
22 pages
Enterprise FW 03-Security Fabric
PDF
No ratings yet
Enterprise FW 03-Security Fabric
31 pages
FortiSASE 23.3 Concept Guide
PDF
No ratings yet
FortiSASE 23.3 Concept Guide
18 pages
FortiOS-7.2-ZTNA Reference Guide
PDF
No ratings yet
FortiOS-7.2-ZTNA Reference Guide
12 pages
Config Vlan Fortigate-2
PDF
No ratings yet
Config Vlan Fortigate-2
8 pages
FortiGate VM Azure
PDF
No ratings yet
FortiGate VM Azure
11 pages
Fortigate Troubleshooting 40 Mr2
PDF
No ratings yet
Fortigate Troubleshooting 40 Mr2
148 pages
FortiDDoS Admin Guide
PDF
No ratings yet
FortiDDoS Admin Guide
24 pages
Fortinet Network Security Professional
PDF
No ratings yet
Fortinet Network Security Professional
1 page
FCP FGT AD-7.4-demo
PDF
No ratings yet
FCP FGT AD-7.4-demo
7 pages
60 Active Passive+Lab
PDF
No ratings yet
60 Active Passive+Lab
13 pages
Forticlient 7.0.0 Windows Release Notes
PDF
No ratings yet
Forticlient 7.0.0 Windows Release Notes
19 pages
FortiGate VM Azure
PDF
No ratings yet
FortiGate VM Azure
11 pages
LAb3 Security Firewall Policies
PDF
No ratings yet
LAb3 Security Firewall Policies
18 pages
FortiGate 7.4 Administrator Instructor Guide
PDF
No ratings yet
FortiGate 7.4 Administrator Instructor Guide
15 pages
Laboratorio 13
PDF
No ratings yet
Laboratorio 13
17 pages
CCNP Enterprise Brochure
PDF
No ratings yet
CCNP Enterprise Brochure
6 pages
NSE 4 Network Security Professional: Exam Description
PDF
No ratings yet
NSE 4 Network Security Professional: Exam Description
3 pages
Fortidemo: Quick Step Guide
PDF
No ratings yet
Fortidemo: Quick Step Guide
9 pages
Fortiswitch: High Performance Gigabit and 10 Gigabit Ethernet Switches
PDF
No ratings yet
Fortiswitch: High Performance Gigabit and 10 Gigabit Ethernet Switches
3 pages
Fortinet Single Sign On Polling Mode Windows AD Network PDF
PDF
No ratings yet
Fortinet Single Sign On Polling Mode Windows AD Network PDF
6 pages
FortiNAC 8.3 Course Description-Online
PDF
No ratings yet
FortiNAC 8.3 Course Description-Online
2 pages
FortiOS-7.2-Endpoint Posture Check
PDF
No ratings yet
FortiOS-7.2-Endpoint Posture Check
9 pages
Complete Reference / Firewalls: TCR / Strassberg, Rollie, Gondek / 9567-3 / Front Matter FM:xi
PDF
No ratings yet
Complete Reference / Firewalls: TCR / Strassberg, Rollie, Gondek / 9567-3 / Front Matter FM:xi
14 pages
Procedure To Upgrade Fortigate Boxes
PDF
No ratings yet
Procedure To Upgrade Fortigate Boxes
1 page
Ems Compatibility Chart
PDF
No ratings yet
Ems Compatibility Chart
1 page