{"id":23,"date":"2022-03-04T00:29:34","date_gmt":"2022-03-04T05:29:34","guid":{"rendered":"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/front-matter\/introduction\/"},"modified":"2023-08-22T12:00:31","modified_gmt":"2023-08-22T16:00:31","slug":"introduction","status":"publish","type":"front-matter","link":"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/front-matter\/introduction\/","title":{"raw":"Preface","rendered":"Preface"},"content":{"raw":"Firewall technologies are growing very fast and knowing how to protect the network is vital for network administrators. A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules. Firewalls have been the first line of defense in network security for over 25 years.[footnote]<a href=\"https:\/\/www.cisco.com\/c\/en_ca\/products\/security\/firewalls\/what-is-a-firewall.html\">What is a Firewall?<\/a>[\/footnote] The lack of materials available for students to learn is part of our issue.\r\n\r\nSince I have been teaching Enterprise Security at BCIT, I have received a lot of feedback from my students. Then, I have decided to collect all labs and make them as a book for students. This book is part of the Enterprise Security Course and is based on the practical labs in the class. Each chapter begins with a learning objective and step-by-step explanations in GNS3 to beginners on how to build different security scenarios from scratch.\r\n\r\nThe book is divided into ten chapters as following:\r\n<ul>\r\n \t<li><strong>Chapter 1. Basic Settings<\/strong> of FortiGate firewall and how to work with CLI or GUI to configure the firewall.<\/li>\r\n \t<li><strong>Chapter 2. Policy:<\/strong> We will focus on firewall policy and how firewall pass the traffic from one port to another port.<\/li>\r\n \t<li><strong>Chapter 3. NAT: <\/strong>We will use Source NAT and Destination NAT. You will learn how to use port forwarding when you are using DNAT.<\/li>\r\n \t<li><strong>Chapter 4. VPN: <\/strong>This is very important chapter focus on SSL VPN and IPsec VPN. You will learn how to set site-to-site VPN.<\/li>\r\n \t<li><strong>Chapter 5. Authentication: <\/strong>This chapter will focus on Captive Portal and FSSO. You will learn how to install FSSO Agent in the server and monitor Active Directory.<\/li>\r\n \t<li><strong>Chapter 6. High Availability: <\/strong>This chapter will focus on High Availability (Active-Passive) in FortiGate firewalls.<\/li>\r\n \t<li><strong>Chapter 7. Security: <\/strong>This chapter will focus on security profile, DDoS prevention and VLANs configuration.<\/li>\r\n \t<li><strong>Chapter 8. VDOM <\/strong>or Virtual Domain is a feature in FortiGate firewalls to manage resources and access. You will learn how to enable VDOM and how to use it.<\/li>\r\n \t<li><strong>Chapter 9. SD-WAN<\/strong><strong>: <\/strong>This chapter will focus on SD-WAN and how to use this feature.<\/li>\r\n \t<li><strong>Chapter 10. Cloud Technologies:<\/strong> This chapter will focus on how to deploy FortiGate in the cloud.<\/li>\r\n \t<li><strong>Appendix: <\/strong>We will cover basic GNS3 settings you need during this book.<\/li>\r\n<\/ul>\r\nAs we know \u201ca picture is worth 1000 words\u201d and that is why this book is based on snapshots and screen-capture all the steps and configurations. This will be useful for fast-tracking. This book will be a practical resource\/guide that can be used by BCIT students, and students at other institutions as well as IT professionals.\r\n\r\nHamid Talebi","rendered":"<p>Firewall technologies are growing very fast and knowing how to protect the network is vital for network administrators. A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules. Firewalls have been the first line of defense in network security for over 25 years.<a class=\"footnote\" title=\"What is a Firewall?\" id=\"return-footnote-23-1\" href=\"#footnote-23-1\" aria-label=\"Footnote 1\"><sup class=\"footnote\">[1]<\/sup><\/a> The lack of materials available for students to learn is part of our issue.<\/p>\n<p>Since I have been teaching Enterprise Security at BCIT, I have received a lot of feedback from my students. Then, I have decided to collect all labs and make them as a book for students. This book is part of the Enterprise Security Course and is based on the practical labs in the class. Each chapter begins with a learning objective and step-by-step explanations in GNS3 to beginners on how to build different security scenarios from scratch.<\/p>\n<p>The book is divided into ten chapters as following:<\/p>\n<ul>\n<li><strong>Chapter 1. Basic Settings<\/strong> of FortiGate firewall and how to work with CLI or GUI to configure the firewall.<\/li>\n<li><strong>Chapter 2. Policy:<\/strong> We will focus on firewall policy and how firewall pass the traffic from one port to another port.<\/li>\n<li><strong>Chapter 3. NAT: <\/strong>We will use Source NAT and Destination NAT. You will learn how to use port forwarding when you are using DNAT.<\/li>\n<li><strong>Chapter 4. VPN: <\/strong>This is very important chapter focus on SSL VPN and IPsec VPN. You will learn how to set site-to-site VPN.<\/li>\n<li><strong>Chapter 5. Authentication: <\/strong>This chapter will focus on Captive Portal and FSSO. You will learn how to install FSSO Agent in the server and monitor Active Directory.<\/li>\n<li><strong>Chapter 6. High Availability: <\/strong>This chapter will focus on High Availability (Active-Passive) in FortiGate firewalls.<\/li>\n<li><strong>Chapter 7. Security: <\/strong>This chapter will focus on security profile, DDoS prevention and VLANs configuration.<\/li>\n<li><strong>Chapter 8. VDOM <\/strong>or Virtual Domain is a feature in FortiGate firewalls to manage resources and access. You will learn how to enable VDOM and how to use it.<\/li>\n<li><strong>Chapter 9. SD-WAN<\/strong><strong>: <\/strong>This chapter will focus on SD-WAN and how to use this feature.<\/li>\n<li><strong>Chapter 10. Cloud Technologies:<\/strong> This chapter will focus on how to deploy FortiGate in the cloud.<\/li>\n<li><strong>Appendix: <\/strong>We will cover basic GNS3 settings you need during this book.<\/li>\n<\/ul>\n<p>As we know \u201ca picture is worth 1000 words\u201d and that is why this book is based on snapshots and screen-capture all the steps and configurations. This will be useful for fast-tracking. This book will be a practical resource\/guide that can be used by BCIT students, and students at other institutions as well as IT professionals.<\/p>\n<p>Hamid Talebi<\/p>\n<hr class=\"before-footnotes clear\" \/><div class=\"footnotes\"><ol><li id=\"footnote-23-1\"><a href=\"https:\/\/www.cisco.com\/c\/en_ca\/products\/security\/firewalls\/what-is-a-firewall.html\">What is a Firewall?<\/a> <a href=\"#return-footnote-23-1\" class=\"return-footnote\" aria-label=\"Return to footnote 1\">&crarr;<\/a><\/li><\/ol><\/div>","protected":false},"author":1562,"menu_order":4,"template":"","meta":{"pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"front-matter-type":[14],"contributor":[],"license":[],"class_list":["post-23","front-matter","type-front-matter","status-publish","hentry","front-matter-type-introduction"],"_links":{"self":[{"href":"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/front-matter\/23","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/front-matter"}],"about":[{"href":"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-json\/wp\/v2\/types\/front-matter"}],"author":[{"embeddable":true,"href":"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-json\/wp\/v2\/users\/1562"}],"version-history":[{"count":6,"href":"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/front-matter\/23\/revisions"}],"predecessor-version":[{"id":994,"href":"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/front-matter\/23\/revisions\/994"}],"metadata":[{"href":"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/front-matter\/23\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-json\/wp\/v2\/media?parent=23"}],"wp:term":[{"taxonomy":"front-matter-type","embeddable":true,"href":"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/front-matter-type?post=23"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-json\/wp\/v2\/contributor?post=23"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-json\/wp\/v2\/license?post=23"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}