Download Print this page
Fortinet FortiGate FortiGate-5001FA2 Quick Start Manual
Fortinet FortiGate FortiGate-5001FA2 Quick Start Manual

Fortinet FortiGate FortiGate-5001FA2 Quick Start Manual

Fortinet fortigate fortigate-5001fa2: reference guide
Hide thumbs Also See for FortiGate FortiGate-5001FA2:

Advertisement

FortiGate-5001FA2 normal operating LED indicators
LED
State
Description
PWR
Green
The FortiGate-5001FA2 module is on.
Green
Normal operation.
STA
Red
The FortiGate-5001FA2 is booting or a fault condition exists.
The FortiGate-5001FA2 is ready to be hot-swapped (or card is ready
Blue
to be removed from the chassis).
Flashing
The FortiGate-5001FA2is changing from hot swap to running mode or
IPM
Blue
from running mode to hot swap.
Normal operation. The FortiGate-5001FA2 module is in contact with
Off
the backplane of the FortiGate-5000 series chassis.
The correct optical fiber patch cable is connected to the gigabit fiber
Green
interface.
1, 2, 3, 4
Flashing
Network activity at the gigabit fiber interface.
The correct cable is connected to the copper 10/100/1000 interface
Green
and the connected equipment has power.
5, 6, 7, 8
Flashing
Network activity at this interface.
Amber
The interface is connected at 1000 Mbps.
1
Checking the package contents
Checking the package contents
Connector Type
Speed
Protocol Description
1 and 2
LC SFP 1000Base-SX Ethernet
3 and 4
LC SFP 1000Base-SX Ethernet
5, 6, 7, 8
RJ-45
1000Base-T
Ethernet
RS-232
CONSOLE
DB-9
9600 bps
serial
The blade ships with 4 Small Formfactor Pluggable (SFP) connectors. You can optionally use the
1000Base-LX (single-mode fiber) or 1000Base-TX (copper cable) SFP transceivers.
2
Installing the FortiGate-5001FA2
To install the FortiGate-5001FA2 module
1. Install the RAM DIMMs into the module by pushing the RAM DIM gently until
the locking mechanism locks down the DIM.
2. Extend the extraction levers on the module.
3. Carefully slide the module into a chassis slot.
properly when it touches the chassis up to the extraction levers.
4. Lock the extraction levers by pushing them towards each other.
5. If power is supplied to the chassis, the FortiGate-5001FA2 module powers on
when the extraction levers are closed.
6. Tighten the mounting knots on the left and right sides of the front panel.
7. The power switch is built-in to the left side extraction lever. Ensure that the
lockdown thumbscrew is tightened to ensure that power is not interrupted.
3

Planning the configuration

NAT/Route mode
In NAT/Route mode, each FortiGate-5001FA2 module is visible to the networks that it is
connected to. All of its interfaces are on different subnets. Each interface that is
connected to a network must be configured with an IP address that is valid for that
network.
You would typically use NAT/Route mode when the FortiGate-5001FA2 module is
deployed as a gateway between private and public networks. In its default NAT/Route
mode configuration, the module functions as a firewall. Firewall policies control
communications through the FortiGate-5001FA2 module. No traffic can pass through
the FortiGate-5001FA2 module until you add firewall policies.
Port 3
204.23.1.5
Internet
PWR ACC
NAT mode policies controlling
In NAT/Route mode, firewall policies can operate in NAT mode or in Route mode. In
NAT mode, the FortiGate-5001FA2 module performs network address translation
Refer to the Documentation CD-ROM for information on how to control traffic, and how to configure HA, antivirus protection, Web content filtering, Spam filtering, intrusion
prevention (IPS), and virtual private networking (VPN).
4

Choosing a configuration tool

and the DNS server addresses. To configure advanced settings, see the online help
and Documentation CD-ROM.
Requirements:
An Ethernet connection between the FortiGate-5001FA2 and a management
computer.
Internet Explorer version 6.0 or higher on the management computer.
Multimode fiber optic connections to gigabit optical
networks.
Enhanced small packet performance multimode fiber
optic connections to gigabit optical networks.
Copper gigabit connection to 10/100/1000 copper
networks.
Serial connection to the command line interface.
The module is seated
Internal network
Port 4
FortiGate-5001FA2 Module
192.168.1.99
in NAT/Route mode
Route mode policies
USB
1
2
3
4
5
6
7
8
CONSOLE
controlling traffic between
STA IPM
internal networks.
Port 5
DMZ network
10.10.10.1
traffic between internal and
external networks.
Web-based manager and
Setup Wizard
Using the Setup Wizard you can configure basic
configuration settings by following the wizard pages
and filling in the information required.
The FortiGate web-based manager is an easy to
use management tool.
Use it to configure the administrator password,
interface addresses, the default gateway address,
FortiGate-5001FA2
PWR ACC
© Copyright 2005 Fortinet Incorporated. All rights reserved.
Trademarks
Products mentioned in this document are trademarks or registered trademarks of their respective holders.
Regulatory Compliance
FCC Class A Part 15 CSA/CUS
23 November 2005
For technical support please visit http://www.fortinet.com.
Check that the package contents are complete.
4 1000Base-SX
SFP Transceivers
Install the FortiGate-5001FA2 module into a FortiGate 5000 series chassis and connect the
network cables. Always wear an ESD wrist strap or ankle strap to avoid static discharges.
8. Install SFP transceivers and connect the network cables.
Mounting
RS-232 Serial
Knot
Connection
CONSOLE
PWR ACC
Extraction
Lever
Lockdown
Thumbscrew
Before beginning to configure the FortiGate-5001FA2 module, you need to plan how to integrate
the unit into your network. Your configuration plan is dependent upon the operating mode that you
select: NAT/Route mode (the default) or Transparent mode.
before IP packets are sent to the destination network. In route mode, no translation
takes place.

Transparent mode

In Transparent mode, the FortiGate-5001FA2 module is invisible to the network. All of
its interfaces are on the same subnet. You only have to configure a management IP
address so that you can make configuration changes.
You would typically use the FortiGate-5001FA2 module in Transparent mode on a
private network behind an existing firewall or behind a router. In its default Transparent
mode configuration, the unit functions as a firewall. No traffic can pass through the
FortiGate-5001FA2 module until you add firewall policies.
192.168.1.3
204.23.1.5
Internet
(firewall, router)
10.10.10.2
You can connect up to eight network segments to the FortiGate-5001FA2 module to
control traffic between these network segments.
Choose between two different tools to configure the FortiGate-5001FA2 module.
Command Line Interface (CLI)
The CLI is a full-featured management tool.
Use it to configure the administrator password, the
interface addresses, the default gateway address,
and the DNS server addresses. To configure
advanced settings, see the FortiGate CLI
Reference Guide on the Documentation CD-ROM.
Requirements:
The serial connection between the
FortiGate-5001FA2 module and a
management computer.
A terminal emulation application (HyperTerminal for Windows) on the management
computer.
USB
1
2
3
4
CONSOLE

QuickStart Guide

USB
1
2
3
CONSOLE
PWR ACC
RAM DIMs
USB
1
2
3
4
USB
3 and 4
Gigabit Fiber
1 and 2
10/100/1000 Copper
Gigabit Fiber
Accelerated
FortiGate-5001FA2 Module
Gateway to
in Transparent mode
public network
192.168.1.1
USB
1
2
3
4
5
6
CONSOLE
PWR ACC
Port 1
192.168.1.2
Management IP
Transparent mode policies
controlling traffic between
internal and external networks
5
6
7
8
STA IPM
01-28011-0273-20051123
4
5
6
7
8
STA IPM
FortiGate-5001FA2
USB
1
2
CONSOLE
3
4
5
6
7
8
ACC
PWR
STA IPM
QuickStart Guide
Copyright 2005 Fortinet Incorporated. All rights reserved.
Trademarks
Products mentioned in this document are trademarks.
01-28005-0043-20051110
QuickStart Guide
Mounting
Knot
5
6
7
8
STA IPM
Extraction
Lever
5 6 7 8
Internal network
7
8
STA IPM
192.168.1.3
Port 2

Advertisement

loading

Summary of Contents for Fortinet FortiGate FortiGate-5001FA2

  • Page 1: Quickstart Guide

    You would typically use the FortiGate-5001FA2 module in Transparent mode on a private network behind an existing firewall or behind a router. In its default Transparent mode configuration, the unit functions as a firewall. No traffic can pass through the FortiGate-5001FA2 module until you add firewall policies.
  • Page 2: General Settings

    Fortinet Knowledge Center The knowledge center contains short how-to articles, FAQs, technical notes, product and feature guides, and much more. Visit the Fortinet Knowledge Center at http://kc.forticare.com. Use these tables to record your FortiGate-5001FA2 configuration. You can record NAT/Route or Transparent mode settings and general settings that apply to both modes.