Download Print this page
Fortinet FortiGate FortiGate-300 Quick Start Manual
Fortinet FortiGate FortiGate-300 Quick Start Manual

Fortinet FortiGate FortiGate-300 Quick Start Manual

Hide thumbs Also See for FortiGate FortiGate-300:

Advertisement

FortiGate-300 LED Indicators
LED
State
Description
Green
The FortiGate unit is powered on.
Power
Off
The FortiGate unit is powered off.
The correct cable is in use, and the connected equipment has
Amber
power.
Internal
Flashing
Network activity at this interface.
External
amber
DMZ/HA
Green
The interface is connected at 100 Mbps.
Off
No link established.

Factory default settings

NAT/Route mode
Internal interface
192.168.1.99
External interface
192.168.100.99
DMZ/HA interface
10.10.10.1
1
Checking the package contents
Connector Type
Speed
Protocol
Internal
RJ-45
10/100Base_T Ethernet
External
RJ-45
10/100Base_T Ethernet
DMZ/HA
RJ-45
10/100Base_T Ethernet
RS-232
CONSOLE DB-9
115200 bps
serial
2
Connecting the FortiGate-300
Place the unit on a stable surface or mount it in a 19-inch rack. It
requires 1.5 inches clearance (3.75 cm) on each side to allow for
cooling.
Make sure the power switch on the back of the unit is turned off before
connecting the power and network cables.
MAIN MENU appears when the unit is up and running.
3

Planning the configuration

NAT/Route mode
In NAT/Route mode, the FortiGate-300 is visible to the networks that it is connected to.
All of its interfaces are on different subnets. You must configure the internal and
external interfaces with IP addresses. Optionally, you can also configure the DMZ
interface.
You would typically use NAT/Route mode when the FortiGate-300 is deployed as a
gateway between private and public networks. In its default NAT/Route mode
configuration, the unit functions as a firewall. Firewall policies control communications
through the FortiGate-300 unit. No traffic can pass through the FortiGate-300 unit until
you add firewall policies.
External
204.23.1.5
Internet
NAT mode policies controlling
traffic between internal and
external networks.
In NAT/Route mode, firewall policies can operate in NAT mode or in Route mode. In
NAT mode, the FortiGate-300 performs network address translation before IP packets
are sent to the destination network. In Route mode, no translation takes place.
Refer to the Documentation CD-ROM for information on how to control traffic, and how to configure HA, antivirus protection, Web content filtering, Spam filtering, intrusion
prevention (IPS), and virtual private networking (VPN).
4

Choosing a configuration tool

Web-based
manager and

Setup Wizard

Using the Setup
Wizard you can add
basic settings by
stepping through the
wizard pages and
filling in the information required.
The FortiGate web-based manager is an easy to use
management tool. Use it to configure the administrator
password, interface addresses, the default gateway
address, and the DNS server addresses.
Requirements:
Ethernet connection between the FortiGate-300 and
a management computer.
Internet Explorer version 6.0 or higher on the
management computer.

Transparent mode

Management IP
10.10.10.1
Administrative account settings
User name
admin
Password
(none)
Description
Connection to the internal network.
Connection to the Internet.
Optional connection to a DMZ network, or other FortiGate-300
units for high availability (HA). For details, see the
Documentation CD-ROM.
Optional connection to the management computer.
Provides access to the command line interface (CLI).
Internal network
192.168.1.1
FortiGate-300 Unit
Internal
in NAT/Route mode
192.168.1.99
Route mode policies
controlling traffic between
Esc
Enter
internal networks.
DMZ
DMZ network
10.10.10.1
10.10.10.2
server addresses. To configure advanced settings, see
the Documentation CD-ROM.
Requirements:
The RJ-45-serial connection between the
FortiGate-300 and management computer.
A terminal emulation application (HyperTerminal for
Windows) on the management computer.
FortiGate-300

QuickStart Guide

© Copyright 2004 Fortinet Incorporated. All rights reserved.
Trademarks
Products mentioned in this document are trademarks or registered trademarks of their respective holders.
Regulatory Compliance
FCC Class A Part 15 CSA/CUS
03 November 2004
For technical support please visit http://www.fortinet.com.
Check that the package contents are complete.
LCD
Connect the FortiGate-300 unit to power outlets and to the internal and external networks.
Esc
Enter
or
Straight-through Ethernet cable connects to LAN or switch on internal network
Before configuring the FortiGate-300, you need to plan how to integrate the unit into your
network. Your configuration plan is dependent upon the operating mode that you select: NAT/
Route mode (the default) or Transparent mode.
Transparent mode
In Transparent mode, the FortiGate-300 is invisible to the network. All of its interfaces
are on the same subnet. You only have to configure a management IP address so that
you can make configuration changes.
You would typically use the FortiGate-300 in Transparent mode on a private network
behind an existing firewall or behind a router. In its default Transparent mode
configuration, the unit functions as a firewall. No traffic can pass through the
FortiGate-300 unit until you add firewall policies.
Gateway to
public network
204.23.1.5
10.10.10.2
Internet
(firewall, router)
You can connect up to three network segments to the FortiGate-300 unit to control
traffic between these network segments.
Choose among three different tools to configure the FortiGate-300.
Command Line
Interface (CLI)
The CLI is a full-featured
management tool.
Use it to configure the
administrator password,
the interface addresses,
the default gateway
address, and the DNS
Esc
Enter
01-28005-0035-20041103
Front
Esc
Enter
Control
Internal
External
DMZ/HA
Power
Buttons
Interface
Interface
Interface
Light
Back
Removable
RS-232 Serial
Power
Power
Hard Drive
Switch
Connection
Connection
Power cable connects to power outlet
Optional null modem cable connects to serial port on management computer
Straight-through Ethernet cable connects to DMZ network, or to another FortiGate-300 for HA
Straight-through Ethernet cable connects to Internet (public switch, router or modem)
Crossover Ethernet cable connects to management computer on internal network
FortiGate-300 Unit
in Transparent mode
Esc
Enter
External
10.10.10.1
Internal
Management IP
Transparent mode policies
controlling traffic between
internal and external networks
The control buttons and LCD are located on the front
panel of the FortiGate-300. Use them to configure the
internal, external and Port 1 (DMZ) interface addresses,
and the default gateway address. To configure the other
interface addresses, and the DNS server addresses,
use the web-based manager or the CLI.
Requirements:
Physical access to the FortiGate-300.
Ethernet Cables:
Orange - Crossover
Grey - Straight-through
Null-Modem Cable
(RS-232)
Power Cable
Rack-Mount Brackets
FortiGate-300
USER MANUAL
Esc
Enter
QuickStart Guide
Copyright 2003 Fortinet Incorporated. All rights reserved.
Trademarks
Products mentioned in this document are trademarks.
Documentation
Internal network
10.10.10.3
Control
Buttons &
LCD

Advertisement

loading

Summary of Contents for Fortinet FortiGate FortiGate-300

  • Page 1: Quickstart Guide

    DMZ/HA Green The interface is connected at 100 Mbps. No link established. © Copyright 2004 Fortinet Incorporated. All rights reserved. Factory default settings Trademarks Products mentioned in this document are trademarks or registered trademarks of their respective holders. NAT/Route mode...
  • Page 2: Using The Command Line Interface

    Collecting information Use these tables to record your FortiGate-300 configuration. NAT/Route mode Transparent mode ____.____.____.____ ____.____.____.____ Internal Interface: Management IP: Netmask: ____.____.____.____ Netmask: ____.____.____.____ ____.____.____.____ The management IP address and netmask must be valid for the network from which External Interface: you will manage the FortiGate-300.