Fortinet 50A/50B FortiGate-50B, FortiWiFi-50B, FortiGate-100, Register your FortiGate unit

Page 8
10/100
POWER STATUS

About the FortiGate unit

Introduction

FortiGate-50B

The FortiGate-50B is designed for telecommuters and small remote offices with

INTERNAL

10 to 50 employees. The

POWER STATUS

 

10/100

FortiGate-50B unit includes

 

 

1

2

3

WAN1 WAN2

LINK / ACT

two WAN ports for a

redundant connection to the Internet. It also features a 3-port switch for connecting additional network connections and supports HA configurations with additional FortiGate-50B units.

FortiWiFi-50B

The FortiWiFi-50B is designed for telecommuters and small remote offices with 10 to 50 employees. The FortiWiFi-50B unit includes two WAN ports for a redundant connection to the Internet. It also features a

3-port switch for connecting

 

WAN1

INTERNAL

 

WAN2

WLAN

(PoE)

additional network

 

LINK / ACT

 

 

1 2 3

connections and supports HA configurations with additional

FortiWiFi-50B units. The FortiWiFi-50B includes Power over Ethernet (PoE) capabilities as a Powered Device through the WAN1 port.

FortiGate-100

The FortiGate-100 unit is designed for SOHO, SMB and branch office applications.

INTERNAL EXTERNAL DMZ

POWER

STATUS

The FortiGate-100 supports

advanced features such as 802.1Q VLAN, virtual domains, high availability (HA), and the RIP and OSPF routing protocols.

Register your FortiGate unit

Register your FortiGate unit by visiting http://support.fortinet.com and selecting Product Registration.

To register, enter your contact information and the serial numbers of the FortiGate units that you or your organization have purchased. You can register multiple FortiGate units in a single session without re-entering your contact information.

By registering your FortiGate unit, you will receive updates to threat detection and prevention databases (Antivirus, Intrusion Detection, etc.) and will also ensure your access to technical support.

8

FortiGate-50A/50B, FortiWiFi-50B and FortiGate-100 FortiOS 3.0 MR4 Install Guide

01-30004-0265-20070831

Image 8
Contents Install G U I D E Trademarks Regulatory complianceContents Factory defaults Configuring the FortiGate unitFortiGate Firmware Configuring the modem interfaceUsing a wireless network FortiUSB key IndexReverting to a previous firmware version FortiGate-50A IntroductionAbout the FortiGate unit FortiWiFi-50B FortiGate-50BFortiGate-100 Register your FortiGate unitFortiGuard Subscription Services Fortinet Family ProductsFortiClient FortiMailAbout this document FortiAnalyzerFortiReporter FortiBridgeDocument conventions Typographic conventionsFortinet documentation Customer service and technical support Fortinet Tools and Documentation CDFortinet Knowledge Center Comments on Fortinet technical documentationCustomer service and technical support Installing the FortiGate unit Package ContentsTechnical Specifications Dimensions WeightPower Requirements SpecificationsFortiWiFi-50B package contents FortiGate-100 package contents Front BackMounting Powering on the FortiGate unitTo power on the FortiGate unit Power over Ethernet Powering off the FortiGate unit Connecting to the FortiGate unitCommand line interface Connecting to the web-based managerFortiGate login To connect to the web-based managerConnecting to the CLI To connect to the CLIBits per second 9600 Data bits Parity Stop bits Flow controlQuick installation using factory defaults Quick configuration using default settingsGo to System Network Options Quick installation using factory defaults Factory defaults Factory default Dhcp server configuration Factory default NAT/Route mode network configurationFactory default Transparent mode network configuration Factory default firewall configurationAdministrative access Management IPFactory default protection profiles Restoring the default settings Restoring the default settings using the web-based managerRestoring the default settings using the CLI To reset the default settings Go to System StatusRestoring the default settings NAT/Route mode Configuring the FortiGate unitPlanning the FortiGate configuration NAT/Route mode with multiple external network connections Internet RouterTransparent mode NAT/Route mode installation Preparing to configure the FortiGate unit in NAT/Route modeNAT/Route mode settings Go to System Network InterfaceConfiguring basic settings Dhcp or PPPoE configurationUsing the web-based manager To add a default route Go to Router Static Adding a default routeTo configure interfaces Go to System Network Interface Verifying the web-based manager configuration Using the command line interfaceConfiguring the FortiGate unit to operate in NAT/Route mode Verify the connectionTo configure DNS server settings ExampleTo set the external interface to use DHCP, enter To set the external interface to use PPPoE, enterTo add a default route To connect the FortiGate unit Connecting the FortiGate unit to the networksConfiguring the networks Transparent mode installation Preparing to configure Transparent modeTransparent mode settings Administrator Password DNS SettingsTo change to Transparent mode using the CLI To verify the DNS server settingsTo connect the FortiGate unit running in Transparent mode Reconnecting to the web-based managerConnecting the FortiGate unit to your network Next steps Set the date and timeUpdating antivirus and IPS signatures Scheduling antivirus and IPS updates To update IPS signatures using the CLITo enable schedule updates from the CLI Updating the IPS signatures from the CLITo add an override server using the CLI Adding an override serverNext steps Configuring the modem interface Connecting a modem to the FortiGate-50AStand alone mode configuration Selecting a modem modeRedundant mode configuration Configuring the modem for the FortiGate-50A Mode must be standalone Interface nameCLI commands for the FortiGate-50A Phone-numberAdding a Ping Server Dead gateway detectionAdding firewall policies for modem connections Using a wireless network Setting up a wireless networkPositioning an Access Point Radio Frequency interfaceUsing multiple access points Using multiple APs to provide a constant strong signalWi-Fi Protected Access WPA Wireless SecurityWireless Equivalent Privacy WEP FortiWiFi-50B operation modes Service Set IdentifierAccess Point mode Additional security measuresClient mode FortiWiFi in Access Point modeSet the Dhcp settings Setting up the FortiWiFi-50B as an Access PointChanging the operating mode Set the security options Configure the firewall policiesTo set the data security Go to System Wireless Settings Upgrading the firmware using the web-based manager To upgrade the firmware using the web-based managerFortiGate Firmware Upgrading to a new firmware versionUpgrading the firmware using the CLI To upgrade the firmware using the CLIFor information, see the FortiGate Administration Guide Reverting to a previous firmware versionReverting to a previous firmware version using the CLI To revert to a previous firmware version using the CLIExecute ping To install firmware from a system reboot Press Any Key To Download Boot Image Restoring the previous configuration FortiUSB key Backup and Restore from the FortiUSB keyTo backup configuration using the CLI To configure the USB Auto-Install using the CLI Using the USB Auto-Install featureTo restore configuration using the CLI To test a new firmware image Testing a new firmware image before installing itAdditional CLI commands for the FortiUSB key Testing a new firmware image before installing it Installing and using a backup firmware image Installing a backup firmware imageTo install a backup firmware image Press any key to enter configuration menuEnter File Name image.out Installing and using a backup firmware image Index CLIWall mounting Web-based manager, connecting
Related manuals
Manual 272 pages 22.37 Kb