Forcepoint Firewall Training
Introduction
- Welcome to the course
- Understand and prepare to use the virtual training environment
NGFW Overview
- Articulate NGFW key benefits and differentiators from other firewall products
- Differentiate the various NGFW operating modes
- Describe the NGFW Hardware Platform and Virtualization options
- Describe different installation methods
- Understand different NGFW deployment options
SMC Overview
- Articulate the NGFW system architecture
- Describe the components of the SMC and its supported platforms
- Identify the properties of the Management & Log server
- Identify the properties of the Web Portal Server
- Articulate the SMC Deployment options
- Understand communication between SMC components and NGFW
- Understand locations and contact addresses
Getting Started with SMC
- Describe a high-level overview of the functionality of the management client
- Prepare to perform system backups
- Describe SMC High Availability solutions
- Understand different SMC Administrator roles and access limitation
- Articulate SMC logging approach and how to utilize Logs view
NGFW Policies and Templates
- Describe the types of NGFW policies
- Understand firewall policy templates
- Explain automatic rules
- Understand a firewall policy hierarchy
Access Control and NAT
- Utilize the policy editor to customize NGFW policies
- Configure Access Control Rules
- Understand Rules Options
- Describe the supported types of NAT
- Configure the Network Address Translation
Traffic Inspection
- Understand the difference between stateful and proxy mode
- Configure web filtering
- Explain different ways to control applications
- Configure Sidewinder Proxy on the NGFW
- Describe integration with external solutions
Inspection Policies
- Describe the Inspection Policies and Inspection Policy hierarchy
- Configure the system policies and utilize the template for deep packet inspection
- Articulate the different inspection policy components and options
- Modify Inspection rules to react with various traffic
- Understand how to tune the Inspection Policy
Malware Detection and File Filtering Policies
- Explain the malware detection process in the NGFW
- Articulate the different options for detecting malware
- Configure a File Filtering Policy
- Explain the detection methods used in the NGFW Inspection
Alerting and Notifications
- Explain the alert escalation process in the NGFW system
- Create an alert policy and alert chain to escalate an alert
- Configure alert notifications channels
Users and Authentication
- Identify supported directory servers and authentication methods
- Explain and configure user authentication
- Comprehend user identification
- Understand how to integrate active directory interacts with the FUID agent
- Understand ECA agent integration in windows environments
Mobile VPN and SSL VPN Portal
- Understand client based and clientless remote access
- Articulate the different Forcepoint options for remote access
- Perform the SSL VPN Portal configuration
Site-to-Site VPN
- Understand NGFW VPN Terminology
- Differentiate between policy-based VPN and route-based VPN
- Understand different site-to-site VPN topologies
- Configure a policy-based VPN
Using Logs
- Describe the log entry types available in the NGFW
- Analyze how pruning filters affect log data
- Create permanent filters
- Illustrate the analysis and visualization tools for logs
- Configure log data management tasks
Monitoring, Statistics, and Reporting
- Understand status monitoring views and dashboards
- Understand Overviews and alert thresholds
- Create customizable reports from log data
- Comprehend the different third-party probing methods
Policy Tools
- Understand policy snapshots within the Management Server
- Run the Rule Search tool available for Access rules, NAT rules, and Inspection Policies
- Utilize the Policy Validation tool
- Understand the Rule Counter Analysis
- Comprehend the Policy Activation process in NGFW
Troubleshooting
- Understand the full troubleshooting process
- Recognize the different kinds of logs that SMC provides to perform troubleshooting
- Utilize various logs for troubleshooting and understand their meaning
- Capture traffic and run diagnostics
- Learn what to provide support when troubleshooting
- Apply knowledge through three common problem scenarios