Featured

Fortinet | FortiNAC | Security Policies



Published
You can build your online knowledge based and help students or IT Career Learning
Agenda
1. Introduction and Initial Configuration
2. Achieving Network Visibility
3. Identification and Classification of Rogues
4. Visibility, Troubleshooting, and Logging
5. Logical Networks, Fortinet Security Fabric, and Firewall
Tags
6. State-Based Control
7. Security Policies
8. Guest and Contractor Management
9. Security Device Integration and Automated Response
10. FortiGate VPN, High Availability and FortiNAC Control
Manager Integrations

Objectives
After completing this course, you should be able to:
- Configure a FortiNAC system to achieve network visibility
- Leverage the control capabilities for network access and
automated policy enforcement
- Integrate FortiNAC into the Fortinet Security Fabric
- Combine the visibility and control features with security
device integrations to automate threat responses to
security risks
Category
Management
Be the first to comment