Fortinet FortiWiFi-50B operation modes, Additional security measures, MAC address filtering

Page 61

 

 

Using a wireless network

FortiWiFi-50B operation modes

Additional security measures

The FortiWiFi-50B includes other security measures you can use to block unwanted users from accessing your wireless network. By setting a few extra options, you can be assured your network and its information is secure.

MAC address filtering

To improve the security of your wireless network, consider enabling MAC address filtering on the FortiWiFi-50B unit. By enabling this feature, you define the wireless devices that can access the network based on their system MAC address. When a user attempts to access the wireless network, the FortiWiFi-60 unit checks the MAC address of the user to the list you created. If the MAC address is on the approved list, the user gains access to the network. If the user is not in the list, the user is rejected. Using MAC address filtering makes it more difficult for a hacker using random MAC addresses or spoofing a MAC address to gain access to your network.

Service Set Identifier

The Service Set Identifier (SSID) is the network name shared by all users on a wireless network. Wireless users should configure their computers to connect to the network that broadcasts this network name. For security reasons, do not leave the default name of “fortinet” as the network name.

Broadcasting enables wireless users to find a network. The FortiWiFi-50B models includes an option not to broadcast the SSID. This provides an extra layer of protection. If you configure all wireless users to the correct SSID, you do not need to enable the broadcasting of the SSID.

To disable SSID

1Go to System > Wireless > Settings.

2Select Disable for the SSID Broadcast.

3Select OK.

FortiWiFi-50B operation modes

The FortiWiFi-50B models each have two modes of operation for wireless networking: Access Point and Client.

Access Point mode

When using the FortiWiFi in Access Point mode, the device acts as an access point for wireless users to connect to, send and receive information over a wireless network. It enables multiple wireless network users access to the network without the need to connect to it physically. The FortiWiFi-50B can connect to the internal network and act as a firewall to the Internet. Access Point mode is the default mode.

FortiGate-50A/50B, FortiWiFi-50B and FortiGate-100 FortiOS 3.0 MR4 Install Guide

61

01-30004-0265-20070831

Image 61
Contents Install G U I D E Regulatory compliance TrademarksContents Configuring the FortiGate unit Factory defaultsUsing a wireless network Configuring the modem interfaceFortiGate Firmware Reverting to a previous firmware version IndexFortiUSB key About the FortiGate unit IntroductionFortiGate-50A FortiGate-50B FortiWiFi-50BFortiGate-100 Register your FortiGate unitFortinet Family Products FortiGuard Subscription ServicesFortiClient FortiMailFortiAnalyzer About this documentFortiReporter FortiBridgeTypographic conventions Document conventionsFortinet documentation Fortinet Tools and Documentation CD Customer service and technical supportFortinet Knowledge Center Comments on Fortinet technical documentationCustomer service and technical support Package Contents Installing the FortiGate unitWeight Technical Specifications DimensionsPower Requirements SpecificationsFortiWiFi-50B package contents Back FortiGate-100 package contents FrontTo power on the FortiGate unit Powering on the FortiGate unitMounting Power over Ethernet Connecting to the FortiGate unit Powering off the FortiGate unitCommand line interface Connecting to the web-based managerTo connect to the web-based manager FortiGate loginTo connect to the CLI Connecting to the CLIBits per second 9600 Data bits Parity Stop bits Flow controlQuick configuration using default settings Quick installation using factory defaultsGo to System Network Options Quick installation using factory defaults Factory defaults Factory default NAT/Route mode network configuration Factory default Dhcp server configurationFactory default firewall configuration Factory default Transparent mode network configurationAdministrative access Management IPFactory default protection profiles Restoring the default settings using the web-based manager Restoring the default settingsRestoring the default settings using the CLI To reset the default settings Go to System StatusRestoring the default settings Planning the FortiGate configuration Configuring the FortiGate unitNAT/Route mode Internet Router NAT/Route mode with multiple external network connectionsTransparent mode Preparing to configure the FortiGate unit in NAT/Route mode NAT/Route mode installationNAT/Route mode settings Go to System Network InterfaceUsing the web-based manager Dhcp or PPPoE configurationConfiguring basic settings To configure interfaces Go to System Network Interface Adding a default routeTo add a default route Go to Router Static Using the command line interface Verifying the web-based manager configurationConfiguring the FortiGate unit to operate in NAT/Route mode Verify the connectionExample To configure DNS server settingsTo set the external interface to use DHCP, enter To set the external interface to use PPPoE, enterTo add a default route Configuring the networks Connecting the FortiGate unit to the networksTo connect the FortiGate unit Preparing to configure Transparent mode Transparent mode installationTransparent mode settings Administrator Password DNS SettingsTo verify the DNS server settings To change to Transparent mode using the CLIConnecting the FortiGate unit to your network Reconnecting to the web-based managerTo connect the FortiGate unit running in Transparent mode Set the date and time Next stepsUpdating antivirus and IPS signatures To update IPS signatures using the CLI Scheduling antivirus and IPS updatesTo enable schedule updates from the CLI Updating the IPS signatures from the CLIAdding an override server To add an override server using the CLINext steps Connecting a modem to the FortiGate-50A Configuring the modem interfaceRedundant mode configuration Selecting a modem modeStand alone mode configuration Mode must be standalone Interface name Configuring the modem for the FortiGate-50APhone-number CLI commands for the FortiGate-50ADead gateway detection Adding a Ping ServerAdding firewall policies for modem connections Setting up a wireless network Using a wireless networkRadio Frequency interface Positioning an Access PointUsing multiple APs to provide a constant strong signal Using multiple access pointsWireless Equivalent Privacy WEP Wireless SecurityWi-Fi Protected Access WPA Service Set Identifier FortiWiFi-50B operation modesAccess Point mode Additional security measuresFortiWiFi in Access Point mode Client modeChanging the operating mode Setting up the FortiWiFi-50B as an Access PointSet the Dhcp settings To set the data security Go to System Wireless Settings Configure the firewall policiesSet the security options To upgrade the firmware using the web-based manager Upgrading the firmware using the web-based managerFortiGate Firmware Upgrading to a new firmware versionTo upgrade the firmware using the CLI Upgrading the firmware using the CLIReverting to a previous firmware version For information, see the FortiGate Administration GuideTo revert to a previous firmware version using the CLI Reverting to a previous firmware version using the CLIExecute ping To install firmware from a system reboot Press Any Key To Download Boot Image Restoring the previous configuration To backup configuration using the CLI Backup and Restore from the FortiUSB keyFortiUSB key To restore configuration using the CLI Using the USB Auto-Install featureTo configure the USB Auto-Install using the CLI Additional CLI commands for the FortiUSB key Testing a new firmware image before installing itTo test a new firmware image Testing a new firmware image before installing it Installing a backup firmware image Installing and using a backup firmware imagePress any key to enter configuration menu To install a backup firmware imageEnter File Name image.out Installing and using a backup firmware image CLI IndexWall mounting Web-based manager, connecting
Related manuals
Manual 272 pages 22.37 Kb