How to Optimize Your Fortigate Device for Network Security: A Comparison with Arista NG Firewall

Question:

I work in corporate safety and security for an insurance company, and I have some IT background. I recently gained admin access to a Fortigate 60F device that was installed by a third party and left unmanaged. I noticed that the security features are enabled but not effective, and that there is an unused firewall for a voice subnet. I am considering replacing the Fortigate with an Arista Untangle NGFW device, which I am more familiar with. However, I am not sure if the Fortigate is superior and worth learning. I have not made any changes yet to avoid disrupting the office network. How do Fortigate and Arista compare in terms of network security? What are the best practices for configuring the security features on the Fortigate device?

Answer:

Network security is a crucial aspect of any organization, especially for those that handle sensitive data or operate in highly regulated industries. Choosing the right network security device can make a significant difference in the level of protection, performance, and manageability of your network.

In this article, we will compare two popular network security devices: Fortigate and Arista. We will also provide some best practices for configuring the security features on the Fortigate device, based on your scenario.

Fortigate Overview

Fortigate is a product line of network firewalls developed by Fortinet, a leading provider of cybersecurity solutions. Fortigate devices offer a range of features, such as:

  • Next-generation firewall (NGFW) capabilities, such as application control, intrusion prevention, web filtering, antivirus, and sandboxing
  • Secure SD-WAN functionality, which enables secure and optimized connectivity across multiple WAN links
  • Security Fabric integration, which allows Fortigate devices to communicate and collaborate with other Fortinet products and third-party solutions for enhanced visibility and control
  • Cloud-native and multi-cloud support, which enables Fortigate devices to protect workloads and data across different cloud environments
  • AI-driven security operations, which leverage machine learning and automation to detect and respond to threats faster and more efficiently
  • Fortigate devices come in various models and form factors, from small desktop appliances to large chassis systems. One of the models that you have in your office is the Fortigate 60F, which is a compact and cost-effective device that can deliver up to 10 Gbps of firewall throughput and support up to 200 users.

    Arista Overview

    Arista is a company that specializes in cloud networking solutions, such as switches, routers, and software. Arista also offers a network security device called the Arista NG Firewall, which is based on the open-source Untangle NGFW platform. The Arista NG Firewall provides features such as:

  • Stateful firewall capabilities, such as port forwarding, NAT, and VPN
  • Layer 7 application control, which allows granular control over network traffic based on application signatures and categories
  • Web filtering and antivirus, which block malicious and unwanted web content and files
  • Threat prevention, which leverages threat intelligence feeds and reputation services to block known and emerging threats
  • Reporting and analytics, which provide detailed and customizable insights into network activity and security events
  • The Arista NG Firewall is available as a virtual appliance that can run on any hypervisor or cloud platform, or as a physical appliance that can be deployed as a standalone device or integrated with an Arista switch.

    Fortigate vs Arista Comparison

    Both Fortigate and Arista devices offer network security features that can protect your network from various threats and attacks. However, there are some differences between them that may affect your decision on which one to use. Here are some of the main factors to consider:

  • Performance: Fortigate devices generally offer higher performance than Arista devices, as they are designed with custom ASICs and hardware acceleration. For example, the Fortigate 60F can deliver up to 10 Gbps of firewall throughput, while the Arista NG Firewall can deliver up to 1 Gbps of firewall throughput. This means that Fortigate devices can handle more traffic and support more users without compromising security or speed.
  • Features: Fortigate devices offer more features than Arista devices, as they are part of the Fortinet Security Fabric, which integrates various security solutions and services. For example, Fortigate devices can leverage FortiGuard, which is a cloud-based service that provides real-time updates and intelligence on threats and applications. Fortigate devices can also integrate with FortiSandbox, which is a cloud-based service that analyzes suspicious files and URLs in a safe environment. Arista devices, on the other hand, rely on open-source and third-party solutions for some of their features, such as web filtering and antivirus, which may not be as comprehensive or up-to-date as Fortinet’s solutions.
  • Manageability: Arista devices may be easier to manage than Fortigate devices, as they use a web-based interface that is simple and intuitive. Arista devices also support a command-line interface (CLI) that is similar to Cisco’s IOS, which may be familiar to some network administrators. Fortigate devices, on the other hand, use a web-based interface that is more complex and requires more configuration steps. Fortigate devices also support a CLI that is unique to Fortinet, which may require some learning and adaptation.
  • Best Practices for Configuring Fortigate Security Features

    Based on your scenario, you have a Fortigate 60F device that was installed by a third party and left unmanaged. You noticed that the security features are enabled but not effective, and that there is an unused firewall for a voice subnet. You are considering replacing the Fortigate with an Arista NG Firewall device, which you are more familiar with.

    However, before you make a decision, you may want to try to configure the security features on the Fortigate device and see if they can meet your needs and expectations. Here are some best practices for configuring the security features on the Fortigate device:

  • Update the firmware and security definitions: The first step is to make sure that your Fortigate device is running the latest firmware and security definitions, which can provide better performance, stability, and protection. You can check the current firmware and security definitions on the dashboard of the web UI, and update them if needed. You can also enable automatic updates, which can save you time and hassle.
  • Configure the network interfaces and zones: The next step is to configure the network interfaces and zones, which can define how your Fortigate device connects to and segments your network. You can use the network tab of the web UI to configure the network interfaces and zones. You can also use the setup wizard, which can guide you through the basic configuration steps. You should assign meaningful names and descriptions to your network interfaces and zones, and enable the appropriate security features for each zone. For example, you may want to enable the NGFW features for the internal and external zones, and disable them for the voice zone, which is unused.
  • Configure the security policies and profiles: The final step is to configure the security policies and profiles, which can control and enforce the security features on your network traffic. You can use the policy and objects tab of the web UI to configure the security policies and profiles. You should create and apply security policies that match your network requirements and security objectives. For example, you may want to create a security policy that allows and inspects the traffic from the internal zone to the external zone, and apply a security profile that enables the application control, web filtering, antivirus, and intrusion prevention features. You should also review and modify the default security policies and profiles, which may not be optimal for your network.
  • By following these best practices, you can configure the security features on the Fortigate device and improve the security posture of your network. You can also use the monitoring and logging tools of the Fortigate device to verify and troubleshoot the security features, and adjust them as needed.

    Conclusion

    In

this article, we compared two network security devices: Fortigate and Arista. We also provided some best practices for configuring the security features on the Fortigate device, based on your scenario. We hope that this article has helped you understand the differences and similarities between Fortigate and Arista devices, and how to configure the security features on the Fortigate device. If you have any questions or feedback, please feel free to contact us. Thank you for reading.

Leave a Reply

Your email address will not be published. Required fields are marked *

Privacy Terms Contacts About Us