ABOUT
SERVICES
AUDIT AND CONSULTING
INTEGRATION
OUTSOURCING
TRAINING
Networks
Security
WatchGuard-Network Security
IP telephony
IT Supervision
PRODUCTS
SECURITY SI
NETWORKS
SUPERVISION
ACHEIVEMENTS
FR
Contact
Security
Home
/ Training/ Security
WatchGuard Training
Network Security Essentials for Locally-Managed Fireboxes
Educational goals:
• Set up the network configurations adapted to his company
• Understand and modify the most common rules and parameters
• Check that the firewall is working properly through logs and real-time tracking
• Set up and manage authentications
• Choose and implement the optional security features (WebBlocker, SpamBlocker, Application Control, RED, IPS, Anti-Virus, DLP, ...)
• Set up a Simple Site-To-Site VPN (BOVPN) in IPSEC
• Set up a remote Mobile VPN (MUVPN) in IPsec and SSL
Target population:
• System Administrator, Network Administrator
Prerequisites:
• Basic knowledge of networks and TCP / IP
Duration:
• 4 days
Dates:
Contact us to receive our training schedule
Program:
• Firebox Setup and Management
- Set Up a New Firebox
- Firebox Management Tools
- Configuration Files and Backup Images
- Role-based Administration
- Feature Keys
- Upgrade a Firebox
- Default Threat Protection
- Global Settings and NTP
- Policies Introduction
• Logging and Monitoring
- Logging and Notification
- Types of Log Messages
- Firebox Visibility with WatchGuard Cloud
- Set Up Dimension for Firebox Logging
- Configure Firebox Logging to Dimension
- Monitoring with Firebox System Manager
- Monitoring with Fireware Web UI
- Read Traffic Log Messages in Traffic Monitor
• Network Settings
- Network Routing Modes
- Interfaces
- WINS/DNS in Mixed Routing Mode
- Network Bridges
- Secondary Networks
- VLANS
- Static Routing
- Multi-WAN
- Multi-WAN Failover
- Multi-WAN Interface Overflow
- Multi-WAN Round Robin
- Multi-WAN Routing Table
- Link Monitor
- Routing Decisions Logic
- Software-Defined WAN (SD-WAN)
- Dynamic NAT
- Static NAT (SNAT)
- 1-to-1 NAT
- NAT Loopback
- Traffic Management
- Quality of Service (QoS)
• Firewall Policies
- Policy Source and Destination
- Management Policies
- Limit Policy Scope
- Policy Precedence
- Hidden Policies
- Policy Logging and Notification
- Policy Schedules
- Packet Filters and Proxy Policies
• Security Services
- Security Services Overview
- Globally Configured Security Services
- Intrusion Prevention Service
- Application Control
- Geolocation
- Tor Exit Node Blocking
• Proxies and Proxy-Based Services
- Proxies and Proxy Actions
- AntiVirus Scanning and Proxies
- APT Blocker
- SMTP-proxy Policies
- spamBlocker
- HTTP-proxy Policies and Proxy Actions
- WebBlocker and the HTTP and HTTPS Proxies
- HTTPS-proxy Policies
- Content Actions and Routing Actions
• Authentication
- Authentication Servers
- Firebox Authentication
- AuthPoint Authentication Server
- Third-Party Authentication Servers
- LDAP Authentication Servers
- Active Directory Authentication Servers
- RADIUS Authentication Servers
- SecurID Authentication Servers
- Users and Groups in Policies
• Mobile VPN
- Mobile VPN Introduction
- Select a Mobile VPN Type
- Mobile VPN with IKEv2
- Mobile VPN with L2TP
- Mobile VPN with SSL
- Setup Overview
- Client Configuration Files
- Mobile VPN Routing Options
• Branch Office VPN
- BOVPN Introduction
- Topology
- Fireware BOVPN Types
- IPSec VPN Algorithms and Protocols
- Policies and VPN Traffic
- VPN Negotiations
- BOVPN Configuration
- BOVPN Virtual Interface Configuration
- BOVPN and NAT
- BOVPN and Dynamic Public IP Addresses
- BOVPN over TLS
- BOVPN Topologies
- Troubleshoot BOVPN Tunnels