Fortinet ORTIWIFI-60A /AM manual Factory default Transparent mode network configuration

Page 25

 

 

Factory defaults

Factory default Transparent mode network configuration

Table 4: Factory default NAT/Route mode network configuration (Continued)

WLAN

Netmask:

255.255.255.0

 

Administrative Access:

Ping

 

 

 

 

Default Gateway (for default route)

192.168.100.1

 

 

 

 

Default Route

 

 

A default route consists of a default gateway and the name of

Network Settings

the interface connected to the external network (usually the

Internet). The default gateway directs all non-local traffic to this

 

interface and to the external network.

 

 

 

 

 

Primary DNS Server

65.39.139.53

 

 

 

 

Secondary DNS Server

65.39.139.63

 

 

 

Factory default Transparent mode network configuration

In Transparent mode, the FortiWiFi unit has the default network configuration listed in Table 5.

Table 5: Factory default Transparent mode network configuration

Administrator

User name:

admin

account

Password:

(none)

 

 

 

 

Management IP

IP:

0.0.0.0

Netmask:

0.0.0.0

 

 

 

 

DNS

Primary DNS Server:

65.39.139.53

Secondary DNS Server:

65.39.139.63

 

 

 

 

 

Internal

HTTPS, Ping

Administrative access

DMZ

HTTPS, Ping

 

WAN1

Ping

 

WAN2

Ping

 

WLAN

HTTPS, Ping

 

 

 

Factory default firewall configuration

FortiWiFi firewall policies control how all traffic is processed by the FortiWiFi unit. Until firewall policies are added, no traffic can be accepted by or pass through the FortiWiFi unit. The factory default configuration contains one firewall policy that allows all traffic originating on the internal network to access the Internet. No other traffic is allowed through the FortiWiFi unit. To allow traffic through the FortiWiFi unit, you can add firewall policies. See the FortiGate Administration Guide for information about adding firewall policies.

The following firewall configuration settings are included in the default firewall configuration to make it easier to add firewall policies.

FortiWiFi-60A/AM FortiOS 3.0 MR4 Install Guide

25

01-30004-0283-20070215

Image 25
Contents Install G U I D E Regulatory compliance TrademarksContents Configuring the modem interface Configuring the FortiWiFiFortiWiFi Firmware Using a wireless networkIndex Page FortiWiFi-60A/AM About the FortiWiFi unitFortiGuard Subscription Services Register your FortiWiFi unitFortinet Family Products FortiClientFortiAnalyzer FortiMailFortiReporter FortiBridgeDocument conventions About this documentAddressipv4 Typographic conventionsFortinet documentation FortiGate Install GuideFortinet Knowledge Center Customer service and technical supportComments on Fortinet technical documentation Customer service and technical support Package Contents Installing the FortiWiFi unitTo power on the FortiWiFi unit Powering on the FortiWiFi unitSpecifications MountingPowering off the FortiWiFi unit Connecting to the FortiWiFi unitCommand line interface To power off the FortiWiFi unitTo connect to the web-based manager Connecting to the web-based managerSystem Dashboard Connecting to the CLITo connect to the CLI Quick installation using factory defaultsWelcome Bits per second 9600 Data bits ParityGo to System Network Options Quick installation using factory defaults Factory defaults Factory default NAT/Route mode network configuration Factory default Dhcp server configurationFactory default firewall configuration Factory default Transparent mode network configurationFactory default protection profiles Restoring the default settings using the web-based manager Restoring the default settingsRestoring the default settings using the CLI To reset the default settings Go to System StatusRestoring the default settings NAT/Route mode Planning the FortiWiFi configurationExample NAT/Route mode network configuration NAT/Route mode with multiple external network connectionsExample NAT/Route multiple internet connection Transparent modePreparing to configure the FortiWiFi unit in NAT/Route mode NAT/Route mode installationUsing the web-based manager Dhcp or PPPoE configurationNAT/Route mode settings Administrator Password Internal PPPoE setting User name PasswordTo configure interfaces Go to System Network Interface Configuring basic settingsVerifying the web-based manager configuration Adding a default routeUsing the command line interface Configuring the FortiWiFi unit to operate in NAT/Route modeTo configure interfaces To add/change the administrator passwordExample To set the WAN1 interface to use DHCP, enterTo add a default route To configure DNS server settingsTo set the WAN1 interface to use PPPoE, enter Get system interfaceTo connect the FortiWiFi unit Connecting the FortiWiFi unit to the networksNAT/Route mode connections Configuring the networksPreparing to configure Transparent mode Transparent mode installationTransparent mode settings Administrator Password DNS SettingsTo verify the DNS server settings To change to Transparent mode using the CLIConnecting the FortiWiFi unit to your network Reconnecting to the web-based managerTo connect the FortiWiFi unit running in Transparent mode Set the date and time Next stepsUpdating antivirus and IPS signatures To update IPS signatures using the CLI Scheduling antivirus and IPS updatesUpdating the IPS signatures from the CLI EveryAdding an override server To enable schedule updates from the CLIDaily WeeklyConfig system autoupdate override set address Set status End To add an override server using the CLINext steps Configuring the modem interface Redundant mode configuration Selecting a modem modeStand alone mode configuration To configure the FortiWiFi-60A using the CLIEnter the following to configure the dialup account Configuring modem settings To configure modem settings Go to System Network Modem Connecting and disconnecting the modem in Stand alone modeTo connect to a dial-up account Go to System Network Modem To disconnect the modemKeywords and variables Description Default Configuring the modem using the CLIPeermodem1 Adding firewall policies for modem connections Adding a Ping ServerDead gateway detection FortiWiFi unit as an Access Point Setting up a wireless networkUsing multiple access points Positioning an Access PointRadio Frequency interface Wireless Equivalent Privacy WEP Wireless SecurityAdditional security measures Wi-Fi Protected Access WPAMAC address filtering Service Set Identifier FortiWiFi operation modesAccess Point mode To disable Ssid Go to System Wireless SettingsClient mode Setting up the FortiWiFi unit as an Access PointChanging the operating mode To set the data security Go to System Wireless Settings Set the Dhcp settingsSet the security options Configure the firewall policies To upgrade the firmware using the web-based manager Upgrading the firmware using the web-based managerUpgrading to a new firmware version To upgrade the firmware using the CLI Upgrading the firmware using the CLIExecute restore image Tftp namestr tftpipv4 Execute restore image image.outReverting to a previous firmware version Execute update-nowTo revert to a previous firmware version using the CLI Reverting to a previous firmware version using the CLIExecute restore image Tftp image.out To install firmware from a system reboot Press any key to display configuration menu Press Any Key To Download Boot ImageEnter Tftp Server Address Enter Local AddressSave as Default firmware/Run image without savingD/R Restoring the previous configurationFortiUSB key Do You Want To Save The Image? y/nTo backup configuration using the CLI Backup and Restore from the FortiUSB keyTo restore configuration using the CLI To configure the USB Auto-Install using the CLI Using the USB Auto-Install featureAdditional CLI Commands for the FortiUSB key Testing a new firmware image before installing itTo test a new firmware image Testing a new firmware image before installing it Type n FortiWiFi unit running v3.x Bios Testing a new firmware image before installing it Numerics Index01-30004-0283-20070215