Fortinet FortiGate FortiGate-60M Quick Start Manual
Fortinet FortiGate FortiGate-60M Quick Start Manual

Fortinet FortiGate FortiGate-60M Quick Start Manual

Fortinet fortigate fortigate-60m: quick start
Hide thumbs Also See for FortiGate FortiGate-60M:

Advertisement

LED
State
Green
Power
Off
Green/Flashing
Status
Green
Off
Green
Link (Internal, DMZ,
WAN1, WAN2)
Flashing Green
Off
100
Green
(Internal, DMZ,
WAN1, WAN2)

Checking the Package Contents

Connector
Type
Speed
Internal
RJ-45
10/100 Base-T
WAN1 and
RJ-45
10/100 Base-T
WAN2
DMZ
RJ-45
10/100 Base-T
Console
RJ-45
9600 Bps
USB
USB

Connecting

Connect the FortiGate unit to a power outlet and to the internal and external networks.
Place the unit on a stable surface. It requires 1.5 inches (3.75 cm) clearance above and
on each side to allow for cooling.
Plug in power cable to unit before connecting power.
The Status light flashes while the unit is starting up and turns off when the system is up
and running.

Planning the Configuration

Before beginning to configure the FortiGate unit, you need to plan how to integrate the unit into your network. Your configuration plan depends on the operating mode you select: NAT/Route
mode (the default) or Transparent mode.

Quick configuration using the default settings

You can quickly set up your FortiGate unit for a home or small office using the web-based
manager and the default settings in NAT/Route mode.
All you need to do is set your network computers to use DHCP, access the web-based
manager, and configure the required settings for the external interface. You can also
configure DNS and a default route if needed. The FortiGate unit automatically assigns IP
addresses for up to 100 computers in the internal network.
1.
Connect the FortiGate unit to the network.
2.
Set the all the network computers to use DHCP to automatically obtain an IP address.
The FortiGate internal interface acts as a DHCP server for the internal network and assigns
IP addresses to all computers in the range 192.168.1.110 –192.168.1.210.
3.
From the management computer browse to https://192.168.1.99. The FortiGate
web-based manager appears.
4.
Go to System > Network > Interface and select Edit for the External interface.
NAT/Route mode
In NAT/Route mode, each FortiGate unit is visible to the network that it is connected to. All of
its interfaces are on different subnets. Each interface that is connected to a network must be
Internal
192.168.1.99
WAN1
10.10.10.1
204.23.1.5
Internet
Router
NAT mode policies controlling
traffic between internal
and external networks.
No traffic can pass through the FortiGate unit until you add firewall policies. In NAT/Route
mode, firewall policies can operate in NAT mode or in Route mode. In NAT mode, the Forti-
Gate unit performs network address translation before IP packets are sent to the destination
network. In Route mode, no translation takes place.
Refer to the Documentation CD-ROM for information on how to control traffic, and how to configure HA, antivirus protection, FortiGuard, Web content filtering, Spam filtering,
intrusion prevention (IPS), and virtual private networking (VPN).
Description
The FortiGate unit is on.
The FortiGate unit is off.
The FortiGate unit is starting up.
The FortiGate unit is running normally.
The correct cable is in use and the connected
equipment has power.
Network activity at this interface.
No link established.
The interface is connected at 100Mbps.
Protocol
Description
Ethernet
A 4-port switch connection for up to four devices or
the internal network
Ethernet
Redundant connections to the Internet.
Ethernet
Optional connection to a DMZ network or to other
FortiGate-60M units for high availability.
RS-232
Optional connection to the management computer.
Provides access to the command line interface
(CLI).
USB
Optional connection for the FortiUSB key, modem or
backup operation.
configured with an IP
Internal Network
address that is valid for
that network.
You would typically use
NAT/Route mode when the
192.168.1.3
FortiGate unit is deployed
Routing policies controlling
traffic between internal
as a gateway between
networks.
DMZ
private and public net-
DMZ
network
works. In its default
NAT/Route mode configu-
ration, the unit functions as
10.10.10.2
a firewall. Firewall policies
control communications
through the FortiGate unit.
PWR
STATUS
© Copyright 2007 Fortinet Incorporated. All rights reserved.
Products mentioned in this document are trademarks or registered trade-
marks of their respective holders.

Regulatory Compliance

FCC Class A Part 15 CSA/CUS
1 March 2007
Front
PWR
STATUS
1
LINK 100
Power
Status
LED
LED
Back
DC+12V
Modem
Console
USB
WAN2
WAN2
Power
Connection
USB
WAN1
RJ-45 Serial
Connection
Power cable connects to power supply
Modem phone line connection
Optional RJ-45 to DB-9 serial cable connects to management computer
DC+12V
WAN2
Modem
Console
USB
USB
Optional redundant connection to Internet
Straight-through Ethernet cable connects
to Internet (public switch, router or modem)
5.
Select one of the following Addressing modes
Manual: enter a static IP address and netmask, select OK, and go to step 6
DHCP: to get an IP address from the ISP select DHCP and go to step 9
PPPoE: to get an IP address from the ISP select PPPoE and go to step 9
6.
Go to System > Network > DNS.
7.
Select one of the following DNS settings
Obtain DNS server address automatically: select to get the DNS addresses from the
ISP, select Apply
Use the following DNS server addresses: select and enter the DNS server
addresses given to you by the ISP, select Apply
8.
Go to Router > Static, select Create New, enter the default gateway address and select
OK. Network configuration is complete. Proceed to part 7 of this Quick Start Guide.
9.
Select Retrieve default gateway from server and Override internal DNS options if your
ISP supports them, select OK, and proceed to part 7 of this Quick Start Guide.
Go to step 6 if you are not selecting these options.

Transparent mode

In Transparent mode, the FortiGate unit is invisible to the network. All of its interfaces are on
the same subnet. You only have to configure a management IP address so that you can make
Gateway to public network
204.23.1.5
10.10.10.2
WAN1
Internet
Router
Management IP
10.10.10.1
Transparent mode policies
controlling traffic between
internal and external networks.
You can connect up to four network segment to the FortiGate unit to control traffic between
these network segments.
INTERNAL
1
2
3
4
DMZ
WAN1
WAN2
LINK 100
LINK 100
LINK 100
LINK 100
LINK 100
LINK 100
LINK 100
FortiGate-60M
01-30004-0110-20070301
INTERNAL
2
3
4
DMZ
WAN1
WAN2
LINK 100
LINK 100
LINK 100
LINK 100
LINK 100
LINK 100
Internal
DMZ
WAN 1,2
Interface
Interface
Interface
Power Cable Power Supply
4
3
2
1
WAN1
DMZ
Internal
DMZ
Internal Interface,
switch connectors
1,2,3,4
Documentation
4
3
2
1
WAN1
DMZ
Internal
Ethernet cables connect
Straight-through
to computers on internal network
Optional connection to DMZ network
configuration changes.
Internal
You would typically use the
network
FortiGate unit in
Transparent mode on a private
Internal
network behind an existing
10.10.10.3
firewall or behind a router. In
its default Transparent mode
configuration, the unit functions
as a firewall. No traffic can pass
through the FortiGate unit until
you add firewall policies.
Ethernet Cables:
Orange - Crossover
Grey - Straight-through
RJ-45 to
DB-9 Serial Cable
Q u i c k S t a r t G u i d e
INTERNAL
PWR
STATUS
1
2
3
4
DMZ
WAN1
WAN2
LINK 100
LINK 100
LINK 100
LINK 100
LINK 100
LINK 100
LINK 100
FortiGate-60M
Copyright 2006 Fortinet Incorporated. All rights reserved.
Trademarks
Products mentioned in this document are trademarks.

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the FortiGate FortiGate-60M and is the answer not in the manual?

Questions and answers

Summary of Contents for Fortinet FortiGate FortiGate-60M

  • Page 1: Planning The Configuration

    Use the following DNS server addresses: select and enter the DNS server addresses given to you by the ISP, select Apply Go to Router > Static, select Create New, enter the default gateway address and select OK. Network configuration is complete. Proceed to part 7 of this Quick Start Guide.
  • Page 2: Choosing A Configuration Tool

    <gateway_ip> Configure the DNS server IP address. config system dns set primary <dns-server_ip> set secondary <dns-server_ip> Visit these links for more information and documentation for your Fortinet product. • Technical Documentation - http://docs.forticare.com • Fortinet Knowledge Center - http://kc.forticare.com •...

This manual is also suitable for:

Fortigate-60m

Table of Contents