Getting started

3Start Internet Explorer and browse to the address https://192.168.1.99. (remember to include the “s” in https://).

The FortiGate login is displayed.

Figure 3: FortiGate login

4Type admin in the Name field and select Login.

Connecting to the command line interface (CLI)

As an alternative to the web-based manager, you can install and configure the FortiGate unit using the CLI. Configuration changes made with the CLI are effective immediately without resetting the firewall or interrupting service.

To connect to the FortiGate CLI, you need:

a computer with an available communications port,

the RJ-45 serial cable included in your FortiGate package,

terminal emulation software such as HyperTerminal for Windows.

Note: The following procedure describes how to connect to the CLI using Windows

HyperTerminal software. You can use any terminal emulation program.

To connect to the CLI

1Make sure that the FortiGate unit is powered on.

2Start HyperTerminal, enter a name for the connection, and select OK.

3Configure HyperTerminal to connect directly to the communications port on your computer and select OK.

4Select the following port settings and select OK.

FortiGate-500A Installation Guide

01-28005-0101-20041015

15

Page 15
Image 15
Fortinet Network Router, FORTIGATE, 500A, 127 manual Connecting to the command line interface CLI, To connect to the CLI

500A, Network Router, 127, FORTIGATE specifications

Fortinet FortiGate 127 is an advanced network security appliance designed to deliver comprehensive protection to organizations while ensuring seamless network performance. As a part of Fortinet's leading next-generation firewall (NGFW) offerings, the FortiGate 127 integrates various essential features and technologies that are critical for modern network security.

One of the standout features of the FortiGate 127 is its ability to perform deep packet inspection. This technology enables the device to analyze and filter network traffic, identifying and mitigating threats such as malware, viruses, and intrusions in real-time. With a robust Threat Intelligence system, FortiGate utilizes FortiGuard Labs to provide continuous updates on emerging threats, equipping organizations with the necessary defense against sophisticated cyberattacks.

Another key technology included in the FortiGate 127 is integrated secure SD-WAN functionality. This feature allows organizations to optimize their wide-area network (WAN) connections, enhancing performance and reducing costs through intelligent traffic routing and real-time application visibility. By leveraging software-defined capabilities, businesses can ensure efficient use of their bandwidth, prioritize critical applications, and maintain high levels of uptime.

The FortiGate 127 also excels in providing advanced VPN support. With multiple VPN protocols such as IPsec and SSL, users can establish secure remote connections, facilitating safe access to corporate resources from anywhere. This is particularly important in today's remote work environment, where secure connectivity is essential for maintaining productivity while protecting sensitive data.

In terms of performance, the FortiGate 127 is equipped with high throughput capabilities, ensuring it can handle extensive network traffic without compromising speed or efficiency. Its multi-core architecture allows for parallel processing, which enhances overall performance and responsiveness.

Additionally, the device features an intuitive and user-friendly interface, enabling IT teams to easily manage and configure network policies. With centralized management options, administrators can efficiently oversee multiple FortiGate devices within their network, ensuring optimal visibility and control.

Overall, the Fortinet FortiGate 127 Network Router is a powerful solution for organizations seeking to bolster their security posture. With its combination of deep packet inspection, integrated SD-WAN functionality, advanced VPN support, and high-performance capabilities, it stands out as a vital asset in the modern cybersecurity landscape. It is an ideal choice for businesses aiming to protect their networks from the ever-evolving threat landscape while maintaining operational efficiency.