Fortinet 50A/50B Setting up the FortiWiFi-50B as an Access Point, Changing the operating mode

Page 63

 

 

Using a wireless network

Setting up the FortiWiFi-50B as an Access Point

Changing the operating mode

To change the wireless operating mode

1Go to System > Wireless > Settings.

2For the Operation mode, select Change

3Select the desired operation mode and select OK.

Setting up the FortiWiFi-50B as an Access Point

This section describes how to quickly configure the FortiWiFi-50B unit as an AP to allow network access for wireless workstations located on the same wireless LAN as the unit. It also describes how to configure firewall policies and wireless security features to provide a secure wireless environment. For initial setup, use a desktop computer on the internal network with TCP/IP set as a DHCP client

This section contains the following steps:

Set the DHCP settings

Set the security options

Configure the firewall policies

Set the DHCP settings

Configure a DHCP server for the FortiWiFi-50B WLAN interface. As a DHCP server, the interface dynamically assigns IP addresses to hosts on the network connected to the WLAN interface.

To configure the FortiWiFi-50B to be a DHCP server

1Go to System > DHCP > Service.

2Select the blue triangle to expand the WLAN options.

3Configure the DHCP server settings:

Name:

Enter a name of the DHCP sever. For example, DHCPSever_1.

Enable:

Select to enable the DHCP Server.

Type:

Select regular unless you are configuring for remote clients who

 

will have an IPSec VPN connection to the WLAN interface.

IP Range:

Enter the IP address of the WLAN to configure the IP address

 

range. For example, 10.10.80.1 to 10.10.80.20.

Network Mask:

Enter the network mask you created in Table 12 on page 36.

Domain:

Enter domain name, for example, www.fortinet.com.

Lease Time:

The expiry date of an IP address. This feature specifies either an

 

unlimited or limited timeframe of an IP address.

Advanced:

Use only to specify several DNS servers. This is the DNS that the

 

wireless clients will use when accessing the Internet.

4Select OK.

Note: The IP range must match the subnet address of the network where the DHCP request was received. Usually this would be the subnet connected to the WLAN interface.

FortiGate-50A/50B, FortiWiFi-50B and FortiGate-100 FortiOS 3.0 MR4 Install Guide

63

01-30004-0265-20070831

Image 63
Contents Install G U I D E Regulatory compliance TrademarksContents Configuring the FortiGate unit Factory defaultsConfiguring the modem interface Using a wireless networkFortiGate Firmware Index Reverting to a previous firmware versionFortiUSB key Introduction About the FortiGate unitFortiGate-50A Register your FortiGate unit FortiWiFi-50BFortiGate-50B FortiGate-100FortiMail FortiGuard Subscription ServicesFortinet Family Products FortiClientFortiBridge About this documentFortiAnalyzer FortiReporterTypographic conventions Document conventionsFortinet documentation Comments on Fortinet technical documentation Customer service and technical supportFortinet Tools and Documentation CD Fortinet Knowledge CenterCustomer service and technical support Package Contents Installing the FortiGate unitSpecifications Technical Specifications DimensionsWeight Power RequirementsFortiWiFi-50B package contents Back FortiGate-100 package contents FrontPowering on the FortiGate unit To power on the FortiGate unitMounting Power over Ethernet Connecting to the web-based manager Powering off the FortiGate unitConnecting to the FortiGate unit Command line interfaceTo connect to the web-based manager FortiGate loginStop bits Flow control Connecting to the CLITo connect to the CLI Bits per second 9600 Data bits ParityQuick configuration using default settings Quick installation using factory defaultsGo to System Network Options Quick installation using factory defaults Factory defaults Factory default NAT/Route mode network configuration Factory default Dhcp server configurationManagement IP Factory default Transparent mode network configurationFactory default firewall configuration Administrative accessFactory default protection profiles To reset the default settings Go to System Status Restoring the default settingsRestoring the default settings using the web-based manager Restoring the default settings using the CLIRestoring the default settings Configuring the FortiGate unit Planning the FortiGate configurationNAT/Route mode Internet Router NAT/Route mode with multiple external network connectionsTransparent mode Go to System Network Interface NAT/Route mode installationPreparing to configure the FortiGate unit in NAT/Route mode NAT/Route mode settingsDhcp or PPPoE configuration Using the web-based managerConfiguring basic settings Adding a default route To configure interfaces Go to System Network InterfaceTo add a default route Go to Router Static Verify the connection Verifying the web-based manager configurationUsing the command line interface Configuring the FortiGate unit to operate in NAT/Route modeTo set the external interface to use PPPoE, enter To configure DNS server settingsExample To set the external interface to use DHCP, enterTo add a default route Connecting the FortiGate unit to the networks Configuring the networksTo connect the FortiGate unit DNS Settings Transparent mode installationPreparing to configure Transparent mode Transparent mode settings Administrator PasswordTo verify the DNS server settings To change to Transparent mode using the CLIReconnecting to the web-based manager Connecting the FortiGate unit to your networkTo connect the FortiGate unit running in Transparent mode Set the date and time Next stepsUpdating antivirus and IPS signatures Updating the IPS signatures from the CLI Scheduling antivirus and IPS updatesTo update IPS signatures using the CLI To enable schedule updates from the CLIAdding an override server To add an override server using the CLINext steps Connecting a modem to the FortiGate-50A Configuring the modem interfaceSelecting a modem mode Redundant mode configurationStand alone mode configuration Mode must be standalone Interface name Configuring the modem for the FortiGate-50APhone-number CLI commands for the FortiGate-50ADead gateway detection Adding a Ping ServerAdding firewall policies for modem connections Setting up a wireless network Using a wireless networkRadio Frequency interface Positioning an Access PointUsing multiple APs to provide a constant strong signal Using multiple access pointsWireless Security Wireless Equivalent Privacy WEPWi-Fi Protected Access WPA Additional security measures FortiWiFi-50B operation modesService Set Identifier Access Point modeFortiWiFi in Access Point mode Client modeSetting up the FortiWiFi-50B as an Access Point Changing the operating modeSet the Dhcp settings Configure the firewall policies To set the data security Go to System Wireless SettingsSet the security options Upgrading to a new firmware version Upgrading the firmware using the web-based managerTo upgrade the firmware using the web-based manager FortiGate FirmwareTo upgrade the firmware using the CLI Upgrading the firmware using the CLIReverting to a previous firmware version For information, see the FortiGate Administration GuideTo revert to a previous firmware version using the CLI Reverting to a previous firmware version using the CLIExecute ping To install firmware from a system reboot Press Any Key To Download Boot Image Restoring the previous configuration Backup and Restore from the FortiUSB key To backup configuration using the CLIFortiUSB key Using the USB Auto-Install feature To restore configuration using the CLITo configure the USB Auto-Install using the CLI Testing a new firmware image before installing it Additional CLI commands for the FortiUSB keyTo test a new firmware image Testing a new firmware image before installing it Installing a backup firmware image Installing and using a backup firmware imagePress any key to enter configuration menu To install a backup firmware imageEnter File Name image.out Installing and using a backup firmware image CLI IndexWall mounting Web-based manager, connecting
Related manuals
Manual 272 pages 22.37 Kb