Planning the FortiGate configuration
Planning the FortiGate configuration
NAT/Route mode
20
Web
To apply antivirus scanning and web content blocking to HTTP content
traffic. You can add this protection profile to firewall policies that control
HTTP traffic.
Unfiltered
To apply no scanning, blocking or IPS. Use if you do not want to apply
content protection to content traffic. You can add this protection profile to
firewall policies for connections between highly trusted or highly secure
networks where content does not need to be protected.
Figure 4: Web protection profile settings
Before you configure the FortiGate unit, you need to plan how to integrate the unit into
the network. Among other things, you must decide whether you want the unit to be
visible to the network, which firewall functions you want it to provide, and how you
want it to control the traffic flowing between its interfaces.
Your configuration plan depends on the operating mode that you select. The FortiGate
unit can be configured in one of two modes: NAT/Route mode (the default) or
Transparent mode.
In NAT/Route mode, the FortiGate unit is visible to the network. Like a router, all its
interfaces are on different subnets. The following interfaces are available in
NAT/Route mode:
•
External is the interface to the external network (usually the Internet).
•
Internal is the interface to the internal network.
•
Ports 1, 3, and 4 can be connected to any networks.
•
Port 2 can be connected to a DMZ network or to any other network.
•
Port 5/HA can be connected to another network. Port 5/HA can also be connected
to other FortiGate-3600s if you are installing an HA cluster.
01-28005-0027-20041101
Getting started
Fortinet Inc.
Need help?
Do you have a question about the FortiGate FortiGate-3600 and is the answer not in the manual?