Download Print this page
Fortinet FortiGate FortiGate-500 Quick Start Manual
Fortinet FortiGate FortiGate-500 Quick Start Manual

Fortinet FortiGate FortiGate-500 Quick Start Manual

Hide thumbs Also See for FortiGate FortiGate-500:

Advertisement

FortiGate-500 LED indicators
LED
State
Description
Green
The FortiGate unit is powered on.
Power
Off
The FortiGate unit is powered off.
Status
Green
The FortiGate unit is functioning normally.
Off
The FortiGate unit has a problem or is powered off.
The correct cable is in use and the connected
Amber
equipment has power.
Internal
External
Flashing
Network activity at this interface.
DMZ
Amber
HA
Green
The interface is connected at 100 Mbps.
1 to 8
Off
No link established.

Factory defaults

NAT/Route mode IP addresses
Transparent mode IP address
Interface
IP
Internal
192.168.1.99
Interface
External
192.168.100.99
MANAGEMENT IP 10.10.10.1
DMZ
10.10.10.1
HA
0.0.0.0
1 to 8
0.0.0.0
1
Checking the package contents
Checking the package contents
Connector Type
Speed
Internal
RJ-45
10/100Base-T
External
RJ-45
10/100Base-T
DMZ
RJ-45
10/100Base-T
HA
RJ-45
10/100Base-T
1 to 8
RJ-45
10/100Base-T
CONSOLE
DB-9
9,600 bps
2
Connecting the FortiGate-500
1. Place the unit on a stable surface or mount it in a 19-inch rack. It requires
1.5 inches (3.75 cm) clearance on each side to allow for cooling.
2. Make sure the power switch on the back of the unit is turned off before
connecting the power and network cables.
3. MAIN MENU appears when the unit is up and running.
3

Planning the configuration

NAT/Route mode
In NAT/Route mode, each FortiGate-500 unit is visible to the networks that it is
connected to. All of its interfaces are on different subnets. Each interface that is
connected to a network must be configured with an IP address that is valid for that
network.
You would typically use NAT/Route mode when the FortiGate-500 unit is deployed as a
gateway between private and public networks. In its default NAT/Route mode
configuration, the unit functions as a firewall. Firewall policies control communications
through the FortiGate-500 unit. No traffic can pass through the FortiGate-500 unit until
you add firewall policies.
External
204.23.1.5
Internet
NAT mode policies controlling
traffic between internal and
In NAT/Route mode, firewall policies can operate in NAT mode or in Route mode. In
NAT mode, the FortiGate-500 unit performs network address translation before IP
packets are sent to the destination network. In Route mode, no translation takes place.
Refer to the Documentation CD-ROM for information on how to control traffic, and how to configure HA, antivirus protection, Web content filtering, Spam filtering, intrusion
prevention (IPS), and virtual private networking (VPN).
4

Choosing a configuration tool

Web-based
manager &

Setup Wizard

The FortiGate web-based
manager Setup Wizard
guides you through the
initial configuration steps.
Use it to configure the administrator password, the
internal, external and DMZ interface addresses, the
default gateway address, and the DNS server
addresses. Optionally, use the Setup Wizard to
configure the internal server settings for NAT/Route
mode.
Requirements:
The Ethernet connection between the FortiGate-500
and management computer.
Internet Explorer version 6.0 or higher on the
management computer.
Administrator account settings
IP
User Name
Password
admin
(none)
Protocol Description
Ethernet
Connection to the internal network.
Ethernet
Connection to the Internet.
Ethernet
Optional connection to a DMZ network.
Optional connection to other FortiGate-500 units for
Ethernet
high availability (HA).
Ethernet
Optional connections to other networks.
RS-232
Optional connection to the management computer.
serial
Provides access to the command line interface (CLI).
Internal network
192.168.1.3
FortiGate-500 Unit
Internal
in NAT/Route mode
192.168.1.99
Route mode policies
controlling traffic between
INTERNAL EXTERNAL
DMZ
HA
1
2
3
4
5
6
7
8
Esc
Enter
internal networks.
DMZ
DMZ network
10.10.10.1
external networks.
10.10.10.2
configure advanced settings, see the Documentation
CD-ROM.
Requirements:
The serial connection between the FortiGate-500
and management computer.
A terminal emulation application (HyperTerminal for
Windows) on the management computer.
FortiGate-500

QuickStart Guide

© Copyright 2004 Fortinet Incorporated. All rights reserved.
Trademarks
Products mentioned in this document are trademarks or registered trademarks of their respective holders.
Regulatory Compliance
FCC Class A Part 15 CSA/CUS
03 November 2004
For technical support please visit http://www.fortinet.com.
Check that the package contents are complete.
LCD
Control
Buttons
Connect the FortiGate-500 unit to a power outlet and to the internal and external networks.
Straight-through Ethernet cable connects
Straight-through Ethernet cable connects to Internet (public switch, router or modem)
to LAN or switch on internal network
Straight-through Ethernet cable connects to DMZ network
Crossover Ethernet cable connects to
management computer on internal network
INTERNAL EXTERNAL
DMZ
HA
Esc
Enter
Straight-through Ethernet cables connect to other networks
Before beginning to configure the FortiGate-500, you need to plan how to integrate the unit into
your network. Your configuration plan is dependent upon the operating mode that you select:
NAT/Route mode (the default) or Transparent mode.

Transparent mode

In Transparent mode, the FortiGate-500 unit is invisible to the network. All of its
interfaces are on the same subnet. You only have to configure a management IP
address so that you can make configuration changes.
You would typically use the FortiGate-500 unit in Transparent mode on a private
network behind an existing firewall or behind a router. In its default Transparent mode
configuration, the unit functions as a firewall. No traffic can pass through the
FortiGate-500 unit until you add firewall policies.
Gateway to
public network
204.23.1.5
10.10.10.2
Internet
(firewall, router)
You can connect up to 12 network segments to the FortiGate-500 unit to control traffic
between these network segments.
Choose among three different tools to configure the FortiGate-500.
Command Line
Interface (CLI)
The CLI is a full-featured
management tool.
Use it to configure the
administrator password,
the interface addresses,
the default gateway
address, and the DNS
server addresses. To
INTERNAL EXTERNAL
DMZ
HA
1
2
Esc
Enter
01-28005-0037-20041103
Front
INTERNAL EXTERNAL
DMZ
HA
1
2
3
4
5
6
7
8
Esc
Enter
Internal,External,DMZ
1 to 8
Status
Power
HA Interface
Interface
LED
LED
Back
Removable
RS-232 Serial
Power
Power
Hard Drive
Connection
Connection
Switch
Straight-through Ethernet cable connects to another FortiGate-500 for HA
1
2
3
4
5
6
7
8
Optional null modem cable connects
to serial port on management computer
Power cable connects to power outlet
FortiGate-500 Unit
in Transparent mode
INTERNAL EXTERNAL
DMZ
HA
1
2
3
4
5
6
7
8
Esc
Enter
External
10.10.10.1
Internal
Management IP
Transparent mode policies
controlling traffic between
internal and external networks
The control buttons and LCD are located on the front
panel of the FortiGate-500. Use them to configure the
internal, external and DMZ interface addresses, and the
default gateway address. To configure the other
interface addresses, and the DNS server addresses,
use the web-based manager or the CLI.
Requirements:
Physical access to the FortiGate-500.
3
4
5
6
7
8
Ethernet Cables:
Orange - Crossover
Grey - Straight-through
Null-Modem Cable
(RS-232)
Power Cable
Rack-Mount Brackets
FortiGate-500
USER MANUAL
Esc
Enter
INTERNAL EXTERNAL
DMZ
HA
1
2
3
4
5
6
7
8
QuickStart Guide
Copyright 2003 Fortinet Incorporated. All rights reserved.
Trademarks
Products mentioned in this document are trademarks.
Documentation
Internal network
10.10.10.3
Control
Buttons &
LCD

Advertisement

loading

Summary of Contents for Fortinet FortiGate FortiGate-500

  • Page 1: Quickstart Guide

    Green The interface is connected at 100 Mbps. 1 to 8 No link established. © Copyright 2004 Fortinet Incorporated. All rights reserved. Trademarks Factory defaults Products mentioned in this document are trademarks or registered trademarks of their respective holders. Regulatory Compliance...
  • Page 2: General Settings

    Collecting information Use these tables to record your FortiGate-500 configuration. You can record NAT/Route or Transparent mode settings and general settings that apply to both modes. Using the table below you can record settings for the Internal and External interfaces and three other interfaces. NAT/Route mode Transparent mode ____.____.____.____...