Fortinet ORTIWIFI-60A /AM FortiMail, FortiAnalyzer, FortiReporter, FortiBridge, FortiManager

Page 9

 

 

Introduction

Fortinet Family Products

FortiMail

FortiMail™ Secure Messaging Platform provides powerful, flexible heuristic scanning and reporting capabilities to incoming and outgoing email traffic. The FortiMail unit has reliable, high performance features for detecting and blocking malicious attachments such as Distributed Checksum Clearinghouse (DCC) scanning and Bayesian scanning. Built on Fortinet’s award winning FortiOS and FortiASIC technology, FortiMail antivirus technology extends full content inspection capabilities to detect the most advanced email threats.

FortiAnalyzer

FortiAnalyzer™ provides network administrators with the information they need to enable the best protection and security for their networks against attacks and vulnerabilities. The FortiAnalyzer unit features include:

collects logs from FortiGate devices and syslog devices

creates hundreds of reports using collected log data

scans and reports vulnerabilities

stores files quarantined from a FortiGate unit

The FortiAnalyzer unit can also be configured as a network analyzer to capture real-time traffic on areas of your network where firewalls are not employed. You can also use the unit as a storage device where users can access and share files, including the reports and logs that are saved on the FortiAnalyzer hard disk.

FortiReporter

FortiReporter™ Security Analyzer software generates easy-to-understand reports and can collect logs from any FortiGate unit, as well as over 30 network and security devices from third-party vendors. FortiReporter reveals network abuse, manages bandwidth requirements, monitors web usage, and ensures employees are using the office network appropriately. FortiReporter allows IT administrators to identify and respond to attacks, including identifying ways to proactively secure their networks before security threats arise.

FortiBridge

FortiBridge™ products are designed to provide enterprise organizations with continuous network traffic flow in the event of a power outage or a FortiGate system failure. The FortiBridge unit bypasses the FortiGate unit to make sure that the network can continue processing traffic. FortiBridge products are easy to use and deploy, and you can customize the actions a FortiBridge unit takes when a power failure or a FortiGate system failure occurs.

FortiManager

The FortiManager™ system is designed to meet the needs of large enterprises (including managed security service providers) responsible for establishing and maintaining security policies across many dispersed FortiGate installations. With this system, you can configure multiple FortiGate devices and monitor their status. You can also view real-time and historical logs for the FortiGate devices, including updating firmware images of managed FortiGate devices. The FortiManager System emphasizes ease of use, including easy integration with third party systems.

FortiWiFi-60A/AM FortiOS 3.0 MR4 Install Guide

9

01-30004-0283-20070215

Image 9
Contents Install G U I D E Regulatory compliance TrademarksContents Configuring the modem interface Configuring the FortiWiFiUsing a wireless network FortiWiFi FirmwareIndex Page FortiWiFi-60A/AM About the FortiWiFi unitFortiGuard Subscription Services Register your FortiWiFi unitFortinet Family Products FortiClientFortiAnalyzer FortiMailFortiReporter FortiBridgeDocument conventions About this documentAddressipv4 Typographic conventionsFortinet documentation FortiGate Install GuideCustomer service and technical support Fortinet Knowledge CenterComments on Fortinet technical documentation Customer service and technical support Package Contents Installing the FortiWiFi unitTo power on the FortiWiFi unit Powering on the FortiWiFi unitSpecifications MountingPowering off the FortiWiFi unit Connecting to the FortiWiFi unitCommand line interface To power off the FortiWiFi unitTo connect to the web-based manager Connecting to the web-based managerSystem Dashboard Connecting to the CLITo connect to the CLI Quick installation using factory defaultsWelcome Bits per second 9600 Data bits ParityGo to System Network Options Quick installation using factory defaults Factory defaults Factory default NAT/Route mode network configuration Factory default Dhcp server configurationFactory default firewall configuration Factory default Transparent mode network configurationFactory default protection profiles Restoring the default settings using the web-based manager Restoring the default settingsRestoring the default settings using the CLI To reset the default settings Go to System StatusRestoring the default settings NAT/Route mode Planning the FortiWiFi configurationExample NAT/Route mode network configuration NAT/Route mode with multiple external network connectionsExample NAT/Route multiple internet connection Transparent modePreparing to configure the FortiWiFi unit in NAT/Route mode NAT/Route mode installationUsing the web-based manager Dhcp or PPPoE configurationNAT/Route mode settings Administrator Password Internal PPPoE setting User name PasswordTo configure interfaces Go to System Network Interface Configuring basic settingsVerifying the web-based manager configuration Adding a default routeUsing the command line interface Configuring the FortiWiFi unit to operate in NAT/Route modeTo configure interfaces To add/change the administrator passwordExample To set the WAN1 interface to use DHCP, enterTo add a default route To configure DNS server settingsTo set the WAN1 interface to use PPPoE, enter Get system interfaceTo connect the FortiWiFi unit Connecting the FortiWiFi unit to the networksNAT/Route mode connections Configuring the networksPreparing to configure Transparent mode Transparent mode installationTransparent mode settings Administrator Password DNS SettingsTo verify the DNS server settings To change to Transparent mode using the CLIReconnecting to the web-based manager Connecting the FortiWiFi unit to your networkTo connect the FortiWiFi unit running in Transparent mode Set the date and time Next stepsUpdating antivirus and IPS signatures To update IPS signatures using the CLI Scheduling antivirus and IPS updatesUpdating the IPS signatures from the CLI EveryAdding an override server To enable schedule updates from the CLIDaily WeeklyConfig system autoupdate override set address Set status End To add an override server using the CLINext steps Configuring the modem interface Redundant mode configuration Selecting a modem modeStand alone mode configuration To configure the FortiWiFi-60A using the CLIEnter the following to configure the dialup account Configuring modem settings To configure modem settings Go to System Network Modem Connecting and disconnecting the modem in Stand alone modeTo connect to a dial-up account Go to System Network Modem To disconnect the modemKeywords and variables Description Default Configuring the modem using the CLIPeermodem1 Adding a Ping Server Adding firewall policies for modem connectionsDead gateway detection FortiWiFi unit as an Access Point Setting up a wireless networkPositioning an Access Point Using multiple access pointsRadio Frequency interface Wireless Equivalent Privacy WEP Wireless SecurityWi-Fi Protected Access WPA Additional security measuresMAC address filtering Service Set Identifier FortiWiFi operation modesAccess Point mode To disable Ssid Go to System Wireless SettingsSetting up the FortiWiFi unit as an Access Point Client modeChanging the operating mode Set the Dhcp settings To set the data security Go to System Wireless SettingsSet the security options Configure the firewall policies Upgrading the firmware using the web-based manager To upgrade the firmware using the web-based managerUpgrading to a new firmware version To upgrade the firmware using the CLI Upgrading the firmware using the CLIExecute restore image Tftp namestr tftpipv4 Execute restore image image.outReverting to a previous firmware version Execute update-nowTo revert to a previous firmware version using the CLI Reverting to a previous firmware version using the CLIExecute restore image Tftp image.out To install firmware from a system reboot Press any key to display configuration menu Press Any Key To Download Boot ImageEnter Tftp Server Address Enter Local AddressSave as Default firmware/Run image without savingD/R Restoring the previous configurationFortiUSB key Do You Want To Save The Image? y/nBackup and Restore from the FortiUSB key To backup configuration using the CLITo restore configuration using the CLI To configure the USB Auto-Install using the CLI Using the USB Auto-Install featureTesting a new firmware image before installing it Additional CLI Commands for the FortiUSB keyTo test a new firmware image Testing a new firmware image before installing it Type n FortiWiFi unit running v3.x Bios Testing a new firmware image before installing it Numerics Index01-30004-0283-20070215