Fortinet 100, 50A/50B manual Factory default Transparent mode network configuration, Management IP

Page 29

Factory defaults

Table 8: Factory default NAT/Route mode network configuration (Continued)

Network Settings

Default Gateway (for default route)

192.168.100.1

Interface connected to external network

external

(for default route)

 

 

 

Default Route

A default route consists of a default gateway and the name of the interface connected to the external network (usually the Internet). The default gateway directs all non-local traffic to this interface and to the external network.

Primary DNS Server

65.39.139.53

Secondary DNS Server

65.39.139.63

 

 

Factory default Transparent mode network configuration

In Transparent mode, the FortiGate unit has the default network configuration listed in Table 9.

Table 9: Factory default Transparent mode network configuration

Administrator account

User name:

admin

 

Password:

(none)

 

 

 

Management IP

IP:

0.0.0.0

Netmask:

0.0.0.0

 

 

 

 

DNS

Primary DNS Server:

65.39.139.53

Secondary DNS Server:

65.39.139.63

 

 

 

 

 

Internal

HTTPS, Ping

Administrative access

External

Ping

 

DMZ

HTTPS, Ping

 

 

 

Factory default firewall configuration

FortiGate firewall policies control how all traffic is processed by the FortiGate unit. Until firewall policies are added, no traffic can pass through the FortiGate unit. The factory default configuration contains one firewall policies to allows all traffic through the FortiGate unit. To allow specific traffic through the FortiGate unit, you can add firewall policies. See the FortiGate Administration Guide for information about adding firewall policies.

The following firewall configuration settings are included in the default firewall configuration to make it easier to add firewall policies.

FortiGate-50A/50B, FortiWiFi-50B and FortiGate-100 FortiOS 3.0 MR4 Install Guide

29

01-30004-0265-20070831

Image 29
Contents Install G U I D E Regulatory compliance TrademarksContents Configuring the FortiGate unit Factory defaultsFortiGate Firmware Configuring the modem interfaceUsing a wireless network FortiUSB key IndexReverting to a previous firmware version FortiGate-50A IntroductionAbout the FortiGate unit FortiGate-50B FortiWiFi-50BFortiGate-100 Register your FortiGate unitFortinet Family Products FortiGuard Subscription ServicesFortiClient FortiMailFortiAnalyzer About this documentFortiReporter FortiBridgeTypographic conventions Document conventionsFortinet documentation Fortinet Tools and Documentation CD Customer service and technical supportFortinet Knowledge Center Comments on Fortinet technical documentationCustomer service and technical support Package Contents Installing the FortiGate unitWeight Technical Specifications DimensionsPower Requirements SpecificationsFortiWiFi-50B package contents Back FortiGate-100 package contents FrontMounting Powering on the FortiGate unitTo power on the FortiGate unit Power over Ethernet Connecting to the FortiGate unit Powering off the FortiGate unitCommand line interface Connecting to the web-based managerTo connect to the web-based manager FortiGate loginTo connect to the CLI Connecting to the CLIBits per second 9600 Data bits Parity Stop bits Flow controlQuick configuration using default settings Quick installation using factory defaultsGo to System Network Options Quick installation using factory defaults Factory defaults Factory default NAT/Route mode network configuration Factory default Dhcp server configurationFactory default firewall configuration Factory default Transparent mode network configurationAdministrative access Management IPFactory default protection profiles Restoring the default settings using the web-based manager Restoring the default settingsRestoring the default settings using the CLI To reset the default settings Go to System StatusRestoring the default settings NAT/Route mode Configuring the FortiGate unitPlanning the FortiGate configuration Internet Router NAT/Route mode with multiple external network connectionsTransparent mode Preparing to configure the FortiGate unit in NAT/Route mode NAT/Route mode installationNAT/Route mode settings Go to System Network InterfaceConfiguring basic settings Dhcp or PPPoE configurationUsing the web-based manager To add a default route Go to Router Static Adding a default routeTo configure interfaces Go to System Network Interface Using the command line interface Verifying the web-based manager configurationConfiguring the FortiGate unit to operate in NAT/Route mode Verify the connectionExample To configure DNS server settingsTo set the external interface to use DHCP, enter To set the external interface to use PPPoE, enterTo add a default route To connect the FortiGate unit Connecting the FortiGate unit to the networksConfiguring the networks Preparing to configure Transparent mode Transparent mode installationTransparent mode settings Administrator Password DNS SettingsTo verify the DNS server settings To change to Transparent mode using the CLITo connect the FortiGate unit running in Transparent mode Reconnecting to the web-based managerConnecting the FortiGate unit to your network Set the date and time Next stepsUpdating antivirus and IPS signatures To update IPS signatures using the CLI Scheduling antivirus and IPS updatesTo enable schedule updates from the CLI Updating the IPS signatures from the CLIAdding an override server To add an override server using the CLINext steps Connecting a modem to the FortiGate-50A Configuring the modem interfaceStand alone mode configuration Selecting a modem modeRedundant mode configuration Mode must be standalone Interface name Configuring the modem for the FortiGate-50APhone-number CLI commands for the FortiGate-50ADead gateway detection Adding a Ping ServerAdding firewall policies for modem connections Setting up a wireless network Using a wireless networkRadio Frequency interface Positioning an Access PointUsing multiple APs to provide a constant strong signal Using multiple access pointsWi-Fi Protected Access WPA Wireless SecurityWireless Equivalent Privacy WEP Service Set Identifier FortiWiFi-50B operation modesAccess Point mode Additional security measuresFortiWiFi in Access Point mode Client modeSet the Dhcp settings Setting up the FortiWiFi-50B as an Access PointChanging the operating mode Set the security options Configure the firewall policiesTo set the data security Go to System Wireless Settings To upgrade the firmware using the web-based manager Upgrading the firmware using the web-based managerFortiGate Firmware Upgrading to a new firmware versionTo upgrade the firmware using the CLI Upgrading the firmware using the CLIReverting to a previous firmware version For information, see the FortiGate Administration GuideTo revert to a previous firmware version using the CLI Reverting to a previous firmware version using the CLIExecute ping To install firmware from a system reboot Press Any Key To Download Boot Image Restoring the previous configuration FortiUSB key Backup and Restore from the FortiUSB keyTo backup configuration using the CLI To configure the USB Auto-Install using the CLI Using the USB Auto-Install featureTo restore configuration using the CLI To test a new firmware image Testing a new firmware image before installing itAdditional CLI commands for the FortiUSB key Testing a new firmware image before installing it Installing a backup firmware image Installing and using a backup firmware imagePress any key to enter configuration menu To install a backup firmware imageEnter File Name image.out Installing and using a backup firmware image CLI IndexWall mounting Web-based manager, connecting
Related manuals
Manual 272 pages 22.37 Kb