Summary of Contents for Fortinet FortiGate FortiGate-5001FA2
Page 1
FortiGate-5001FA2 security system for your network, and contains troubleshooting information to help you diagnose and fix problems. The most recent versions of this and all FortiGate-5000 series documents are available from the page of the Fortinet Technical Documentation Visit http://support.fortinet.com updates, technical support, and FortiGuard services.
Some FortiGate-5000 series components may overload your supply circuit and impact your overcurrent protection and supply wiring. Refer to nameplate ratings to address this concern. • Make sure all FortiGate-5000 series components have reliable grounding. Fortinet recommends direct connections to the branch circuit. •...
Troubleshooting ... 18 FortiGate-5001FA2 does not startup... 18 FortiGate-5001FA2 cannot display chassis information... 20 Quick Configuration Guide ... 21 Registering your Fortinet product ... 21 Planning the configuration ... 21 NAT/Route mode ... 22 Transparent mode ... 22 Choosing the configuration tool ... 23 Web-based manager...
Page 4
For more information ... 33 Fortinet documentation ... 33 Fortinet Tools and Documentation CD... 33 Fortinet Knowledge Center ... 33 Comments on Fortinet technical documentation ... 33 Customer service and technical support ... 33 Register your Fortinet product... 33 Contents...
FortiGate-5001FA2 security system FortiGate-5001FA2 security system The FortiGate-5001FA2 security system is a high-performance FortiGate security system with a total of 8 front panel gigabit ethernet interfaces and two base backplane interfaces. Use the front panel interfaces for connections to your networks and the backplane interfaces for communication between FortiGate-5000 series boards over the FortiGate-5000 chassis backplane.
The front panel also includes the RS-232 console port for connecting to the FortiOS CLI and a USB port. The USB port can be used with a Fortinet USB key. For information about using the FortiUSB key, see the Firmware and FortiUSB Guide.
Base backplane gigabit communication FA2 interfaces and active-active HA performance Base backplane gigabit communication • Session Oriented Traffic with long session lifetime, such as FTP sessions. Packet size does not affect performance for traffic with long session lifetime. For long sessions, processing that would otherwise be handled by the FortiGate-5001FA2 CPUs is off-loaded to the acceleration module.
Hardware installation Hardware installation Before use, the FortiGate-5001FA2 board must be correctly inserted into an Advanced Telecommunications Computing Architecture (ACTA) chassis such as the FortiGate-5140, FortiGate-5050, or FortiGate-5020 chassis. Before inserting the board into a chassis you should make sure RAM DIMMS are installed and FortiGate-5001FA2 jumpers are set.
Installing SFP transceivers Hardware installation Figure 2: Location of FortiGate-5001FA2 RAM DIMM slots RAM DIMM slots Front Faceplate Insert each RAM DIMM perpendicular to the RAM DIMM slots. Push the DIMM firmly into place using the minimum amount of force required. When the DIMM is properly seated, the socket guide posts click into place.
For cage slots 3 to 8, turn each SFP transceiver over before sliding it into the cage slot until it locks into place. Changing FortiGate-5001FA2 jumper settings The JP3 jumper on the FortiGate-5001FA2 board is factory set by Fortinet into one of two positions (see •...
Page 12
Changing FortiGate-5001FA2 jumper settings Normally, because the jumpers are factory set, you do not have to change them. However, if you are moving a FortiGate-5001FA2 from a FortiGate-5140 or FortiGate-5050 to a FortiGate-5020 or the reverse, you need to move the JP3 jumper.
Hardware installation To change or verify the JP3 jumper setting To complete this procedure, you need: • A FortiGate-5001FA2 board • A tool for moving jumpers (optional) • An electrostatic discharge (ESD) preventive wrist strap with connection cord Caution: FortiGate-5001FA2 boards must be protected from static discharge and physical shock.
Inserting a FortiGate-5001FA2 board into a chassis Before inserting the FortiGate-5001FA2 board in a chassis Insertion procedure Figure 4: FortiGate-5001FA2 mounting components Closed Alignment Pin Retention Lock Screw Handle Open Before installing the FortiGate-5001FA2 board in a chassis you should verify that the RAM DIMMs are installed and the JP3 jumper is set correctly.
Page 15
Hardware installation Caution: FortiGate-5001FA2 boards must be protected from static discharge and physical shock. Only handle or work with FortiGate-5001FA2 boards at a static-free workstation. Always wear a grounded electrostatic discharge (ESD) preventive wrist strap when handling FortiGate-5001FA2 boards. Attach the ESD wrist strap to your wrist and to an ESD socket or to a bare metal surface on the chassis or frame.
Page 16
Inserting a FortiGate-5001FA2 board into a chassis Turn both handles to their fully-closed positions. The handles should hook into the sides of the chassis slot. Closing the handles draws the FortiGate-5001FA2 board into place in the chassis slot and into contact with the chassis backplane.
Hardware installation Removing a FortiGate-5001FA2 board from a chassis The following procedure describes how to correctly use the FortiGate-5001FA2 mounting components shown in from a FortiGate-5000 series chassis slot. To remove a FortiGate-5001FA2 board from a FortiGate-5000 series chassis FortiGate-5001FA2 boards are hot swappable. The procedure for removing the FortiGate-5001FA2 board from a FortiGate-5000 series chassis slot is the same whether or not the FortiGate-5000 series chassis is powered on.
Troubleshooting Troubleshooting FortiGate-5001FA2 does not startup Open the left and right handles to their fully open positions. Opening the handles slides the board a short distance out of the slot, disconnecting the board from the chassis backplane. The IPM LED turns blue. All other LEDs turn off. Alignment Pin Handle Handle...
Page 19
LEDs are off). If the shelf manager is not functioning normally, you can try removing it from the chassis and reinstalling it. If this does not solve the problem, contact Fortinet Technical Support. If the shelf manager has been removed from the chassis, you should re-install it. If you are planning on operating the chassis without a shelf manager, you can move the FortiGate-5001FA2 JP3 jumper between pins 1 and 2.
FortiGate-5000 Series Firmware and FortiUSB Guide. If this does not solve the problem, contact Fortinet Technical Support. FortiGate-5001FA2 cannot display chassis information If the FortiGate-5001FA2 board is installed in a FortiGate-5140 or 5050 chassis, if...
Register your product by visiting Registration. To register, enter your contact information and the serial numbers of the Fortinet products that you or your organization have purchased. You can register multiple Fortinet products in a single session without re-entering your contact information.
Planning the configuration NAT/Route mode Transparent mode In NAT/Route mode, the FortiGate-5001FA2 security system is visible to the networks that it is connected to. Each interface connected to a network must be configured with an IP address that is valid for that network. In many configurations, in NAT/Route mode all of the FortiGate interfaces are on different networks, and each network is on a separate subnet.
You would typically deploy a FortiGate-5001FA2 security system in Transparent mode on a private network behind an existing firewall or behind a router. In the default Transparent mode configuration, the FortiGate-5001FA2 security system functions as a firewall. No traffic can pass through the FortiGate-5001FA2 security system until you add firewall policies.
Factory default settings Factory default settings Configuring NAT/Route mode The FortiGate-5001FA2 unit ships with a factory default configuration. The default configuration allows you to connect to and use the FortiGate-5001FA2 web-based manager to configure the FortiGate-5001FA2 board onto the network. To configure the FortiGate-5001FA2 board onto the network you add an administrator password, change the network interface IP addresses, add DNS server IP addresses, and, if required, configure basic routing.
Enter the Primary and Secondary DNS IP addresses that you added to page 24 To configure the Default Gateway Go to Router > Static and select Edit icon for the static route. Select the Device that you recorded above. Set Gateway to the Default Gateway IP address that you added to page Select OK.
Table 6 on page config system dns set primary <dns-server_ip> set secondary <dns-server_ip> Configure the default gateway to the setting that you added to config router static edit 1 set device <interface_name> set gateway <gateway_ip> Quick Configuration Guide Table 6 on...
Quick Configuration Guide Configuring Transparent mode Table 7 settings. Table 7: Transparent mode settings Admin Administrator Password: Management IP Default Route DNS Servers Using the web-based manager to configure Transparent mode Connect port1 of the FortiGate-5001FA2 board to the same hub or switch as the computer you will use to configure the FortiGate board.
Table 7 on page config system dns set primary <dns-server_ip> set secondary <dns-server_ip> Fortinet periodically updates the FortiGate-5001FA2 FortiOS firmware to include enhancements and address issues. After you have registered your FortiGate-5001FA2 security system (see page 21) you can download FortiGate-5001FA2 firmware from the support web site http://support.fortinet.com.
Page 29
Quick Configuration Guide Under System Information > Firmware Version, select Update. Type the path and filename of the firmware image file, or select Browse and locate the file. Select OK. The FortiGate-5001FA2 board uploads the firmware image file, upgrades to the new firmware version, restarts, and displays the FortiGate login.
FortiGate-5001FA2 base backplane data communication FortiGate-5001FA2 base backplane data communication You can configure the FortiGate-5001FA2 boards for data communications using the two FortiGate-5140, FortiGate-5050, or FortiGate-5020 chassis base backplane interfaces. Note: Different FortiGate-5000 series boards may use different names for the base backplane interfaces.
Quick Configuration Guide Figure 9: FortiGate-5001FA2 interface list with backplane interfaces enabled To enable base backplane data communication from the FortiGate-5001FA2 From the FortiGate-5001FA2 board CLI you can use the following steps to enable base backplane data communication. Enter the following command to show the backplane interfaces: config system global The port9 and port10 backplane interfaces now appear in all Interface lists.
Page 32
Powering off the FortiGate-5001FA2 board Quick Configuration Guide FortiGate-5001FA2 Security System Guide 01-30000-0379-20080606...
Fortinet Tools and Documentation CD All Fortinet documentation is available from the Fortinet Tools and Documentation CD shipped with your Fortinet product. The documents on this CD are current for your product at shipping time. For the latest versions of all Fortinet documentation see the Fortinet Technical Documentation web site at http://docs.forticare.com.
Need help?
Do you have a question about the FortiGate FortiGate-5001FA2 and is the answer not in the manual?
Questions and answers