Transparent Mode; Configuration Options - Fortinet FortiGate FortiGate-500 Installation Manual

Fortinet fortigate fortigate-500: install guide
Hide thumbs Also See for FortiGate FortiGate-500:
Table of Contents

Advertisement

Getting started

Transparent mode

Configuration options

FortiGate-500 Installation Guide
Figure 6: Example NAT/Route multiple internet connection configuration
External
204.23.1.5
Internet
Port 1
64.83.32.45
In Transparent mode, the FortiGate unit is invisible to the network. Similar to a
network bridge, all FortiGate interfaces must be on the same subnet. You only have to
configure a management IP address so that you can make configuration changes.
The management IP address is also used for antivirus and attack definition updates.
You typically use the FortiGate unit in Transparent mode on a private network behind
an existing firewall or behind a router. The FortiGate unit performs firewall functions,
IPSec VPN, virus scanning, IPS, web content filtering, and Spam filtering.
Figure 7: Example Transparent mode network configuration
Gateway to
public network
204.23.1.5
10.10.10.2
Internet
(firewall, router)
You can connect up to 11 network segments to the FortiGate unit to control traffic
between these network segments.
External can connect to the external firewall or router.
Internal can connect to the internal network.
HA can connect to other FortiGate-500s if you are installing an HA cluster.
DMZ and ports 1 to 8 can connect to other network segments.
Once you have selected Transparent or NAT/Route mode operation, you can
complete the configuration plan and begin to configure the FortiGate unit.
You can use the web-based manager GUI, the control buttons and LCD, or the
command line interface (CLI) for the basic configuration of the FortiGate unit. You can
use the web-based manager setup wizard for easy configuration of a few more
advanced settings.
01-28004-0023-20040830
FortiGate-500 Unit
in NAT/Route mode
INTERNAL EXTERNAL
DMZ
HA
1
2
3
Esc
Enter
NAT mode policies controlling
traffic between internal and
external networks.
FortiGate-500 Unit
in Transparent mode
INTERNAL EXTERNAL
DMZ
HA
1
Esc
Enter
External
10.10.10.1
Management IP
Transparent mode policies
controlling traffic between
internal and external networks
Planning the FortiGate configuration
Internal network
192.168.1.3
Internal
192.168.1.1
Route mode policies
controlling traffic between
4
5
6
7
8
internal networks.
DMZ
DMZ network
10.10.10.2
10.10.10.23
Internal network
2
3
4
5
6
7
8
Internal
10.10.10.3
23

Advertisement

Table of Contents
loading

Table of Contents