Fortinet 50A/50B, 100 manual Factory default Dhcp server configuration

Page 28

Factory defaults

Factory default DHCP server configuration

50A

With the FortiGate-50 series, you can quickly configure the internal network and the FortiGate unit by using the factory default DHCP server settings. See “Quick installation using factory defaults” on page 24

Table 7: FortiGate DHCP Server default configuration

Name

internal_dhcp_server

 

 

Interface

Internal

 

 

Default Gateway

192.168.1.99

 

 

IP Range

192.168.1.110 – 192.168.1.210

 

 

Network Mask

255.255.255.0

 

 

Lease Time

7 days

 

 

DNS Server 1

192.168.1.99

 

 

Factory default NAT/Route mode network configuration

When the FortiGate unit is first powered on, it is running in NAT/Route mode and has the basic network configuration listed in Table 8 on page 28. This configuration enables you to connect to the FortiGate unit web-based manager and establish the configuration required to connect the FortiGate unit to the network. In Table 8 on page 28, HTTPS administrative access means you can connect to the web-based manager using HTTPS protocol through this interface. Ping administrative access means this interface responds to ping requests.

Table 8: Factory default NAT/Route mode network configuration

Administrator

User name:

admin

account

Password:

(none)

 

 

 

 

IP:

192.168.1.99

Internal interface

Netmask:

255.255.255.0

Administrative Access:

HTTP, HTTPS,

 

 

 

Ping

 

 

 

External interface

IP:

192.168.100.99

(FortiGate-50A/100)

Netmask:

255.255.255.0

 

WAN1 (FortiGate-50B/

Administrative Access:

Ping

WiFi-50B)

 

 

 

 

 

WAN2 (FortiGate-50B/

IP:

192.168.101.99

Netmask:

255.255.255.0

WiFi-50B)

Administrative Access:

Ping

 

 

 

 

DMZ interface

IP:

10.10.10.1

Netmask:

255.255.255.0

(FortiGate-50A/100)

Administrative Access:

HTTPS, Ping

 

 

 

 

WLAN interface

IP:

10.10.80.1

Netmask:

255.255.255.0

(FortiWiFi-50B)

Administrative Access:

Ping

 

 

 

 

28

FortiGate-50A/50B, FortiWiFi-50B and FortiGate-100 FortiOS 3.0 MR4 Install Guide

01-30004-0265-20070831

Image 28
Contents Install G U I D E Trademarks Regulatory complianceContents Factory defaults Configuring the FortiGate unitUsing a wireless network Configuring the modem interfaceFortiGate Firmware Reverting to a previous firmware version IndexFortiUSB key About the FortiGate unit IntroductionFortiGate-50A FortiWiFi-50B FortiGate-50BFortiGate-100 Register your FortiGate unitFortiGuard Subscription Services Fortinet Family ProductsFortiClient FortiMailAbout this document FortiAnalyzerFortiReporter FortiBridgeDocument conventions Typographic conventionsFortinet documentation Customer service and technical support Fortinet Tools and Documentation CDFortinet Knowledge Center Comments on Fortinet technical documentationCustomer service and technical support Installing the FortiGate unit Package ContentsTechnical Specifications Dimensions WeightPower Requirements SpecificationsFortiWiFi-50B package contents FortiGate-100 package contents Front BackTo power on the FortiGate unit Powering on the FortiGate unitMounting Power over Ethernet Powering off the FortiGate unit Connecting to the FortiGate unitCommand line interface Connecting to the web-based managerFortiGate login To connect to the web-based managerConnecting to the CLI To connect to the CLIBits per second 9600 Data bits Parity Stop bits Flow controlQuick installation using factory defaults Quick configuration using default settingsGo to System Network Options Quick installation using factory defaults Factory defaults Factory default Dhcp server configuration Factory default NAT/Route mode network configurationFactory default Transparent mode network configuration Factory default firewall configurationAdministrative access Management IPFactory default protection profiles Restoring the default settings Restoring the default settings using the web-based managerRestoring the default settings using the CLI To reset the default settings Go to System StatusRestoring the default settings Planning the FortiGate configuration Configuring the FortiGate unitNAT/Route mode NAT/Route mode with multiple external network connections Internet RouterTransparent mode NAT/Route mode installation Preparing to configure the FortiGate unit in NAT/Route modeNAT/Route mode settings Go to System Network InterfaceUsing the web-based manager Dhcp or PPPoE configurationConfiguring basic settings To configure interfaces Go to System Network Interface Adding a default routeTo add a default route Go to Router Static Verifying the web-based manager configuration Using the command line interfaceConfiguring the FortiGate unit to operate in NAT/Route mode Verify the connectionTo configure DNS server settings ExampleTo set the external interface to use DHCP, enter To set the external interface to use PPPoE, enterTo add a default route Configuring the networks Connecting the FortiGate unit to the networksTo connect the FortiGate unit Transparent mode installation Preparing to configure Transparent modeTransparent mode settings Administrator Password DNS SettingsTo change to Transparent mode using the CLI To verify the DNS server settingsConnecting the FortiGate unit to your network Reconnecting to the web-based managerTo connect the FortiGate unit running in Transparent mode Next steps Set the date and timeUpdating antivirus and IPS signatures Scheduling antivirus and IPS updates To update IPS signatures using the CLITo enable schedule updates from the CLI Updating the IPS signatures from the CLITo add an override server using the CLI Adding an override serverNext steps Configuring the modem interface Connecting a modem to the FortiGate-50ARedundant mode configuration Selecting a modem modeStand alone mode configuration Configuring the modem for the FortiGate-50A Mode must be standalone Interface nameCLI commands for the FortiGate-50A Phone-numberAdding a Ping Server Dead gateway detectionAdding firewall policies for modem connections Using a wireless network Setting up a wireless networkPositioning an Access Point Radio Frequency interfaceUsing multiple access points Using multiple APs to provide a constant strong signalWireless Equivalent Privacy WEP Wireless SecurityWi-Fi Protected Access WPA FortiWiFi-50B operation modes Service Set IdentifierAccess Point mode Additional security measuresClient mode FortiWiFi in Access Point modeChanging the operating mode Setting up the FortiWiFi-50B as an Access PointSet the Dhcp settings To set the data security Go to System Wireless Settings Configure the firewall policiesSet the security options Upgrading the firmware using the web-based manager To upgrade the firmware using the web-based managerFortiGate Firmware Upgrading to a new firmware versionUpgrading the firmware using the CLI To upgrade the firmware using the CLIFor information, see the FortiGate Administration Guide Reverting to a previous firmware versionReverting to a previous firmware version using the CLI To revert to a previous firmware version using the CLIExecute ping To install firmware from a system reboot Press Any Key To Download Boot Image Restoring the previous configuration To backup configuration using the CLI Backup and Restore from the FortiUSB keyFortiUSB key To restore configuration using the CLI Using the USB Auto-Install featureTo configure the USB Auto-Install using the CLI Additional CLI commands for the FortiUSB key Testing a new firmware image before installing itTo test a new firmware image Testing a new firmware image before installing it Installing and using a backup firmware image Installing a backup firmware imageTo install a backup firmware image Press any key to enter configuration menuEnter File Name image.out Installing and using a backup firmware image Index CLIWall mounting Web-based manager, connecting
Related manuals
Manual 272 pages 22.37 Kb