Download Print this page
Fortinet FortiGate FortiGate-100A Quick Start Manual
Fortinet FortiGate FortiGate-100A Quick Start Manual

Fortinet FortiGate FortiGate-100A Quick Start Manual

Fortinet fortigate fortigate-100a: quick start
Hide thumbs Also See for FortiGate FortiGate-100A:

Advertisement

LED
State
Green
Power
Off
Flashing Green
Green
Status
Off
Green
Link
Internal, 1, 2, 3, 4,
WAN1 and WAN2,
Flashing Green
DMZ1 and DMZ2
Off
100
Green
Internal, 1, 2, 3, 4,
WAN1 and WAN2,
DMZ1 and DMZ2
Checking the Package Contents
Connector
Type
Speed
Internal
RJ-45
10/100 Base-T
WAN1 and
RJ-45
10/100 Base-T
WAN2
DMZ1 and
RJ-45
10/100 Base-T
DMZ2
Console
RJ-45
9600 Bps
USB
USB
Connecting
Connect the FortiGate unit to a power outlet and to the internal and external networks.
Place the unit on a stable surface. It requires 1.5 inches (3.75 cm) clearance above and
on each side to allow for cooling.
Plug in power cable to the unit before connecting power.
The Status light flashes while the unit is starting up and turns off when the system is up
and running.

Planning the Configuration

Before beginning to configure the FortiGate unit, you need to plan how to integrate the unit into your network. Your configuration plan depends on the operating mode you select: NAT/Route
mode (the default) or Transparent mode.
NAT/Route mode
In NAT/Route mode, each FortiGate unit is visible to the network that it is connected to. All
Internal
WAN1
204.23.1.5
Internet
Router
DMZ
NAT mode policies
controlling traffic between
internal and external networks
ration, the unit functions as a firewall. Firewall policies control communications through the
FortiGate unit. No
traffic can pass through the FortiGate unit until you add firewall policies. In NAT/Route mode,
firewall policies can operate in NAT mode or in Route mode. In NAT mode, the FortiGate unit
performs network address translation before IP packets are sent to the destination network.
In Route mode, no translation takes place.
Refer to the Documentation CD-ROM for information on how to control traffic, and how to configure HA, antivirus protection, FortiGuard, Web content filtering, Spam filtering,
intrusion prevention (IPS), and virtual private networking (VPN).

Choosing a Configuration Tool

Web-based manager
The FortiGate web-based manager is an easy to use management tool. Use it to configure
the administrator password, the interface and default gateway addresses, and the DNS
server addresses.
Requirements:
An Ethernet connection between the FortiGate unit and management computer.
Internet Explorer 6.0 or higher on the management computer.
Description
The FortiGate unit is on.
The FortiGate unit is off.
The FortiGate unit is starting up.
The FortiGate unit is running normally.
The FortiGate unit is powered off.
The correct cable is in use and the connected
equipment has power.
Network activity at this interface.
No link established.
The interface is connected at 100Mbps.
Protocol
Description
Ethernet
A 4-port switch connection for up to four network
devices or the internal network.
Ethernet
Connection to the Internet.
Ethernet
Optional connection to one or two DMZ networks, or
other FortiGate-100A units for high availability (HA).
For details, see the Documentation CD-ROM.
RS-232
Optional connection to the management computer.
Provides access to the command line interface
(CLI).
USB
Optional connection for the FortiUSB key, modem or
backup operation
of its interfaces are on
Internal
different subnets. Each
network
interface that is connected
Internal network
192.168.1.99
to a network must be
192.168.1.3
configured with an IP ad-
dress that is valid for that
Route mode policies
network.
controlling traffic between
internal networks
You would typically use
DMZ
NAT/Route mode when
network
the FortiGate unit is
deployed as a gateway
DMZ network
between private and public
10.10.10.2
10.10.10.1
networks. In its default
NAT/Route mode configu-
PWR
A
© Copyright 2007 Fortinet Incorporated. All rights reserved.
Products mentioned in this document are trademarks or registered trade-
marks of their respective holders.
Regulatory Compliance
FCC Class A Part 15 CSA/CUS
17 January 2007
PWR
STATUS
WAN 1
LINK 100
A
WAN
Power
Status
LED
LED
4
3
DC+12V
Console
USB
Power
USB
Connection
Internal Interface
RS-232 Serial
(4-port switch connectors)
Connection
Power cable connects to power supply
Optional RS-232 serial cable connects to serial port on management computer
4
DC+12V
Console
USB
Ethernet cables connect
Straight-through
to computers on internal network

Transparent mode

In Transparent mode, the FortiGate unit is invisible to the network. All of its interfaces are on
the same subnet. You only have to configure a management IP address so that you can make
Gateway to public network
204.23.1.5
10.10.10.2
WAN1
Internet
Router
Transparent mode policies
controlling traffic between
internal and external networks
You can connect up to four network segments to the FortiGate unit to control traffic between
these network segments.
Command Line Interface (CLI)
The CLI is a full-featured management tool. Use it to configure the administrator password,
the interface addresses, the default gateway address, and the DNS server addresses. To
configure advanced settings, see the Documentation CD-ROM.
Requirements:
The DB-9 serial connection between the FortiGate unit and management computer.
A terminal emulation application (HyperTerminal for Windows) on the management
computer.
INTERNAL
STATUS
WAN 1
WAN 2
DMZ 1
DMZ 2
1
2
3
4
LINK 100
LINK 100
LINK 100
LINK 100
LINK 100
LINK 100
LINK 100
LINK 100
FortiGate-100A
01-30004-0066-20070117
Front
INTERNAL
WAN 2
DMZ 1
DMZ 2
1
2
3
4
LINK 100
LINK 100
LINK 100
LINK 100
LINK 100
LINK 100
LINK 100
DMZ
Internal Interface
1,2
1,2
(4-port switch)
Back
Power Cable Power Supply
2
1
Internal
DMZ 2
DMZ 1
WAN 2
WAN 1
DMZ2
WAN2
DMZ1
WAN1
Documentation
3
2
1
Internal
DMZ 2
DMZ 1
WAN 2
WAN 1
Optional connection to
Straight-through Ethernet
1 or 2 DMZ networks
cables connect to Internet
(public switch, router or modem)
configuration changes.
Internal
You would typically use the
network
FortiGate unit in Transparent
mode on a private network
Internal
behind an existing firewall or
behind a router. In its default
10.10.10.3
Transparent mode configuration,
the unit functions as a firewall.
No traffic can pass through the
FortiGate unit until you add
firewall policies.
Ethernet Cables:
Orange - Crossover
Grey - Straight-through
RJ-45 to
DB-9 Serial Cable
Q u i c k S t a r t G u i d e
INTERNAL
EXTERNAL
DMZ
POWER
STATUS
FortiGate-100A
Trademarks
Copyright 2006 Fortinet Incorporated. All rights reserved.
Products mentioned in this document are trademarks.

Advertisement

loading

Summary of Contents for Fortinet FortiGate FortiGate-100A

  • Page 1: Planning The Configuration

    An Ethernet connection between the FortiGate unit and management computer. • Internet Explorer 6.0 or higher on the management computer. © Copyright 2007 Fortinet Incorporated. All rights reserved. Products mentioned in this document are trademarks or registered trade- marks of their respective holders.
  • Page 2: General Settings

    <gateway_ip> Configure the DNS server IP address. config system dns set primary <dns-server_ip> set secondary <dns-server_ip> Visit these links for more information and documentation for your Fortinet product. • Technical Documentation - http://docs.forticare.com • Fortinet Knowledge Center - http://kc.forticare.com •...