Fortinet 50A/50B, 100 manual Introduction, About the FortiGate unit, FortiGate-50A

Page 7
PWR STATUS
INTERNAL

 

 

Introduction

About the FortiGate unit

Introduction

Welcome and thank you for selecting Fortinet products for your real-time network protection.

FortiGate™ Unified Threat Management System improves network security, reduces network misuse and abuse, and helps you use communications resources more efficiently without compromising the performance of your network. FortiGate Unified Threat Management Systems are ICSA-certified for firewall, IPSec, and antivirus services.

The FortiGate Unified Threat Management System is a dedicated, easily managed security device that delivers a full suite of capabilities, which include:

application-level services such as virus protection and content filtering

network-level services such as firewall, intrusion detection, VPN and traffic shaping

The FortiGate Unified Threat Management System uses Fortinet’s Dynamic Threat Prevention System (DTPS™) technology, which leverages breakthroughs in chip design, networking, security and content analysis. The unique ASIC-based architecture analyzes content and behavior in real-time, enabling key applications to be deployed right at the network edge where they are most effective at protecting your networks.

About the FortiGate unit

The FortiGate-50A/50B, FortiWiFi-50B and FortiGate-100 appliances are designed for SOHO and SMB offices, to deliver the same enterprise-class network-based antivirus, content filtering, firewall, VPN, and network-based intrusion detection/prevention featured in all FortiGate units.

FortiGate-50A

The FortiGate-50A is designed for telecommuters and small remote offices with 10 or fewer employees. The

FortiGate-50A unit includes

AM

LINK 100

 

 

an external modem port that

 

 

can be used as a backup or stand alone connection to the Internet.

EXTERNAL

LINK 100

FortiGate-50A/50B, FortiWiFi-50B and FortiGate-100 FortiOS 3.0 MR4 Install Guide

7

01-30004-0265-20070831

Image 7
Contents Install G U I D E Regulatory compliance TrademarksContents Configuring the FortiGate unit Factory defaultsUsing a wireless network Configuring the modem interfaceFortiGate Firmware Reverting to a previous firmware version IndexFortiUSB key About the FortiGate unit IntroductionFortiGate-50A Register your FortiGate unit FortiWiFi-50BFortiGate-50B FortiGate-100FortiMail FortiGuard Subscription ServicesFortinet Family Products FortiClientFortiBridge About this documentFortiAnalyzer FortiReporterTypographic conventions Document conventionsFortinet documentation Comments on Fortinet technical documentation Customer service and technical supportFortinet Tools and Documentation CD Fortinet Knowledge CenterCustomer service and technical support Package Contents Installing the FortiGate unitSpecifications Technical Specifications DimensionsWeight Power RequirementsFortiWiFi-50B package contents Back FortiGate-100 package contents FrontTo power on the FortiGate unit Powering on the FortiGate unitMounting Power over Ethernet Connecting to the web-based manager Powering off the FortiGate unitConnecting to the FortiGate unit Command line interfaceTo connect to the web-based manager FortiGate loginStop bits Flow control Connecting to the CLITo connect to the CLI Bits per second 9600 Data bits ParityQuick configuration using default settings Quick installation using factory defaultsGo to System Network Options Quick installation using factory defaults Factory defaults Factory default NAT/Route mode network configuration Factory default Dhcp server configurationManagement IP Factory default Transparent mode network configurationFactory default firewall configuration Administrative accessFactory default protection profiles To reset the default settings Go to System Status Restoring the default settingsRestoring the default settings using the web-based manager Restoring the default settings using the CLIRestoring the default settings Planning the FortiGate configuration Configuring the FortiGate unitNAT/Route mode Internet Router NAT/Route mode with multiple external network connectionsTransparent mode Go to System Network Interface NAT/Route mode installationPreparing to configure the FortiGate unit in NAT/Route mode NAT/Route mode settingsUsing the web-based manager Dhcp or PPPoE configurationConfiguring basic settings To configure interfaces Go to System Network Interface Adding a default routeTo add a default route Go to Router Static Verify the connection Verifying the web-based manager configurationUsing the command line interface Configuring the FortiGate unit to operate in NAT/Route modeTo set the external interface to use PPPoE, enter To configure DNS server settingsExample To set the external interface to use DHCP, enterTo add a default route Configuring the networks Connecting the FortiGate unit to the networksTo connect the FortiGate unit DNS Settings Transparent mode installationPreparing to configure Transparent mode Transparent mode settings Administrator PasswordTo verify the DNS server settings To change to Transparent mode using the CLIConnecting the FortiGate unit to your network Reconnecting to the web-based managerTo connect the FortiGate unit running in Transparent mode Set the date and time Next stepsUpdating antivirus and IPS signatures Updating the IPS signatures from the CLI Scheduling antivirus and IPS updatesTo update IPS signatures using the CLI To enable schedule updates from the CLIAdding an override server To add an override server using the CLINext steps Connecting a modem to the FortiGate-50A Configuring the modem interfaceRedundant mode configuration Selecting a modem modeStand alone mode configuration Mode must be standalone Interface name Configuring the modem for the FortiGate-50APhone-number CLI commands for the FortiGate-50ADead gateway detection Adding a Ping ServerAdding firewall policies for modem connections Setting up a wireless network Using a wireless networkRadio Frequency interface Positioning an Access PointUsing multiple APs to provide a constant strong signal Using multiple access pointsWireless Equivalent Privacy WEP Wireless SecurityWi-Fi Protected Access WPA Additional security measures FortiWiFi-50B operation modesService Set Identifier Access Point modeFortiWiFi in Access Point mode Client modeChanging the operating mode Setting up the FortiWiFi-50B as an Access PointSet the Dhcp settings To set the data security Go to System Wireless Settings Configure the firewall policiesSet the security options Upgrading to a new firmware version Upgrading the firmware using the web-based managerTo upgrade the firmware using the web-based manager FortiGate FirmwareTo upgrade the firmware using the CLI Upgrading the firmware using the CLIReverting to a previous firmware version For information, see the FortiGate Administration GuideTo revert to a previous firmware version using the CLI Reverting to a previous firmware version using the CLIExecute ping To install firmware from a system reboot Press Any Key To Download Boot Image Restoring the previous configuration To backup configuration using the CLI Backup and Restore from the FortiUSB keyFortiUSB key To restore configuration using the CLI Using the USB Auto-Install featureTo configure the USB Auto-Install using the CLI Additional CLI commands for the FortiUSB key Testing a new firmware image before installing itTo test a new firmware image Testing a new firmware image before installing it Installing a backup firmware image Installing and using a backup firmware imagePress any key to enter configuration menu To install a backup firmware imageEnter File Name image.out Installing and using a backup firmware image CLI IndexWall mounting Web-based manager, connecting
Related manuals
Manual 272 pages 22.37 Kb