Transparent Mode - Fortinet FortiGate FortiGate-400 Installation Manual

Fortinet fortigate fortigate-400: install guide
Hide thumbs Also See for FortiGate FortiGate-400:
Table of Contents

Advertisement

Planning the FortiGate configuration

Transparent mode

22
You must configure routing to support redundant Internet connections. Routing can be
used to automatically redirect connections from an interface if its connection to the
external network fails.
Otherwise, security policy configuration is similar to a NAT/Route mode configuration
with a single Internet connection. You would create NAT mode firewall policies to
control traffic flowing between the internal, private network and the external, public
network (usually the Internet).
If you have multiple internal networks, such as a DMZ network in addition to the
internal, private network, you could create route mode firewall policies for traffic
flowing between them.
Figure 6: Example NAT/Route multiple internet connection configuration
Port 2
204.23.1.5
Internet
Port 4/HA
64.83.32.45
In Transparent mode, the FortiGate unit is invisible to the network. Similar to a
network bridge, all FortiGate interfaces must be on the same subnet. You only have to
configure a management IP address so that you can make configuration changes.
The management IP address is also used for antivirus and attack definition updates.
You typically use the FortiGate unit in Transparent mode on a private network behind
an existing firewall or behind a router. The FortiGate unit performs firewall functions,
IPSec VPN, virus scanning, IPS, web content filtering, and Spam filtering.
Figure 7: Example Transparent mode network configuration
Gateway to
public network
204.23.1.5
10.10.10.2
Internet
(firewall, router)
01-28004-0022-20040830
FortiGate-400 Unit
in NAT/Route mode
1
Esc
Enter
NAT mode policies controlling
traffic between internal and
external networks.
FortiGate-400 Unit
in Transparent mode
Esc
Enter
10.10.10.1
Interface 2
Management IP
Transparent mode policies
controlling traffic between
internal and external networks
Internal network
192.168.1.3
Port 1
192.168.1.1
Route mode policies
controlling traffic between
2
3
4 / HA
internal networks.
Port 3
DMZ network
10.10.10.2
10.10.10.23
Internal network
1
2
3
4 / HA
Interface 1
Getting started
10.10.10.3
Fortinet Inc.

Advertisement

Table of Contents
loading

Table of Contents