LED
State
Description
Green
The FortiWiFi unit is on.
Power
Off
The FortiWiFi unit is off.
Green/Flashing
The FortiWiFi unit is starting up.
Status
Off
The FortiWiFi unit is running normally.
Red
Modem is in use and connected.
Green
The correct cable is in use and the connected equipment
has power.
Internal, DMZ,
WAN1, WAN2
Flashing Green
Network activity at this interface.
Off
No link established.
Green
Wireless interface is up.
Wifi
Flashing
Network activity at this interface.
Off
Wireless interface is down.
HA
Green
The FortiWiFi unit being used in an HA cluster.
Red
A critical error has occurred.
Alarm
Amber
A minor error has occurred.
Off
No errors detected.
Checking the Package Contents
Connector
Type
Speed
Internal
RJ-45
10/100 Base-T
WAN1 and
RJ-45
10/100 Base-T
WAN2
DMZ
RJ-45
10/100 Base-T
Console
RJ-45
9600 Bps
USB
USB
Modem
RJ-11
Connecting
Connect the FortiWiFi unit to a power outlet and to the internal and external networks.
•
Place the unit on a stable surface. It requires 1.5 inches (3.75 cm) clearance above and on each side
to allow for cooling.
•
Plug in power cable to unit.
•
Plug the power cable to the power supply.
•
Plug the power supply into the electrical outlet.
•
The Status light flashes while the unit is starting up and turns off when the system is up and running.
Planning the Configuration
Before beginning to configure the FortiWiFi unit, you need to plan how to integrate the unit into your network. Your configuration plan depends on the operating mode you select: NAT/Route
mode (the default) or Transparent mode.
Quick configuration using the default settings
You can quickly set up your FortiWiFi unit for a home or small office using the web-based
manager and the default settings in NAT/Route mode.
All you need to do is set your network computers to use DHCP, access the web-based
manager, and configure the required settings for the external interface. You can also
configure DNS and a default route if needed. The FortiWiFi unit automatically assigns IP
addresses for up to 100 computers in the internal network.
1.
Connect the FortiWiFi unit to the network.
2.
Set the all the network computers to use DHCP to automatically obtain an IP address.
The FortiWiFi internal interface acts as a DHCP server for the internal network and assigns
IP addresses to all computers in the range 192.168.1.110 –192.168.1.210.
3.
From the management computer browse to https://192.168.1.99. The FortiGate
web-based manager appears.
4.
Go to System > Network > Interface and select Edit for the External interface.
NAT/Route mode
In NAT/Route mode, each FortiWiFi unit is visible to the network that it is connected to. All of
its interfaces are on different subnets. Each interface that is connected to a network must be
configured with an IP address that is valid for that network.
You would typically use NAT/Route mode when the FortiWiFi unit is deployed as a gateway
between private and public networks. In its default NAT/Route mode configuration, the unit
functions as a firewall. Firewall policies control communications through the FortiWiFi unit.
No traffic can pass through the FortiWiFi unit until you add firewall policies. In NAT/Route
mode, firewall policies can operate in NAT mode or in Route mode. In NAT mode, the Forti-
WiFi unit performs network address translation before IP packets are sent to the destination
network. In Route mode, no translation takes place.
Refer to the Tools and Documentation CD-ROM for information on how to control traffic, configure HA, antivirus protection, FortiGuard, Web content filtering, Spam filtering,
intrusion prevention (IPS), and virtual private networking (VPN).
Protocol
Description
Ethernet
A 6-port switch connection for up to six devices or the
internal network.
Ethernet
Redundant connections to the Internet.
Ethernet
Optional connection to a DMZ network or to other
FortiWiFi-60B units for high availability (HA).
RS-232
Optional connection to the management computer.
Provides access to the command line interface (CLI).
USB
Optional connection for a modem or USB Key backup
operation.
Phone line for internal modem.
B
© Copyright 2007 Fortinet Incorporated. All rights reserved.
Products mentioned in this document are trademarks or registered trade-
marks of their respective holders.
Regulatory Compliance
FCC Class A Part 15 CSA/CUS
15 june 2007
Front
INTERNAL
1
3
5
POWER STATUS
HA
ALARM
Wifi
WAN 1
WAN 2
DMZ
2
4
6
B
Internal Interface
PCMCIA
Power
HA
WiFi
LED
Card Slot
LED
DMZ Interface
LED
Alarm
Status
LED
LED
WAN 1,2
Interface
Straight-through
Ethernet cable
2 Mounting Brackets
DB-9 Serial Cable
Power cable connects to power supply
DC+12V
CONSOLE
Ethernet cables connect
Straight-through
to computers on internal network
5.
Select one of the following Addressing modes
•
Manual: enter a static IP address and netmask, select OK, and go to step 6
•
DHCP: to get an IP address from the ISP select DHCP and go to step 9
•
PPPoE: to get an IP address from the ISP select PPPoE and go to step 9
6.
Go to System > Network > Options.
7.
Select one of the following DNS settings
•
Obtain DNS server address automatically: select to get the DNS addresses from the
ISP, select Apply
•
Use the following DNS server addresses: select and enter the DNS server
addresses given to you by the ISP, select Apply
8.
Go to Router > Static, select Create New, enter the default gateway address and select
OK. Network configuration is complete. Proceed to part 7 of this Quick Start Guide.
9.
Select Retrieve default gateway from server and Override internal DNS options if your
ISP supports them, select OK, and proceed to part 7 of this Quick Start Guide.
Go to step 6 if you are not selecting these options.
Transparent mode
In Transparent mode, the FortiWiFi unit is invisible to the network. All of its interfaces are on
the same subnet. You only have to configure a management IP address so that you can make
configuration changes.
You would typically use the FortiWiFi unit in Transparent mode on a private network behind
an existing firewall or behind a router. In its default Transparent mode configuration, the unit
functions as a firewall. No traffic can pass through the FortiWiFi unit until you add firewall poli-
cies.
You can connect up to six network segments to the FortiWiFi unit to control traffic between
these network segments.
INTERNAL
1
3
5
POWER STATUS
HA
ALARM
Wifi
WAN 1
WAN 2
DMZ
2
4
6
FortiWiFi-60B
01-30004-0407-20070615
Back
INTERNAL
5
3
1
DC+12V
CONSOLE
USB
6
4
2
DMZ
Ground
DMZ
Internal Interface,
Power
switch connectors
USB
Connection
RJ-45 Serial Connection
Power Supply
Copyright 2007 Fortinet Incorporated. All rights reserved.
Trademarks
Products mentioned in this document are trademarks.
Documentation
RJ-45 to
Power Cable
Optional RS-232 serial cable connects to serial port
on management computer
INTERNAL
5
3
1
USB
MODEM
6
4
2
DMZ
WAN 2
WAN 1
Straight-through Ethernet
cables connect to Internet
Optional connection to
DMZ network
WAN 2
WAN 1
MODEM
WAN2
MODEM
WAN1
Q u i c k S t a r t G u i d e
INTERNAL
1
3
5
POWER STATUS
HA
ALARM
Wifi
WAN 1
WAN 2
DMZ
2
4
6
B
FortiWiFi-60B
Need help?
Do you have a question about the FortiWiFi FortiWiFi-60B and is the answer not in the manual?
Questions and answers