Fortinet 500A, FORTIGATE, 127 manual NAT/Route mode with multiple external network connections

Page 21

Getting started

NAT/Route mode with multiple external network connections

 

 

You can add firewall policies to control whether communications through the FortiGate unit operate in NAT or Route mode. Firewall policies control the flow of traffic based on the source address, destination address, and service of each packet. In NAT mode, the FortiGate unit performs network address translation before it sends the packet to the destination network. In Route mode, there is no address translation.

You typically use NAT/Route mode when the FortiGate unit is operating as a gateway between private and public networks. In this configuration, you would create NAT mode firewall policies to control traffic flowing between the internal, private network and the external, public network (usually the Internet).

If you have multiple internal networks, such as a DMZ network in addition to the internal, private network, you could create route mode firewall policies for traffic flowing between them.

Figure 5: Example NAT/Route mode network configuration

Port 2

204.23.1.5

Internet

 

 

 

 

 

 

 

 

 

 

 

 

Internal network

 

FortiGate-500A Unit

 

 

 

 

 

 

 

192.168.1.3

 

 

 

 

Port 1

 

 

 

in NAT/Route mode

 

 

 

 

 

 

192.168.1.99

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Route mode policies

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

EscEnter

 

 

 

 

 

 

 

 

controlling traffic between

 

A

 

 

 

 

 

 

 

 

 

 

 

 

internal networks.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Port 4

 

 

 

 

 

 

 

 

 

 

DMZ network

NAT mode policies controlling

10.10.10.1

 

 

traffic between internal and

external networks. 10.10.10.2

NAT/Route mode with multiple external network connections

In NAT/Route mode, you can configure the FortiGate unit with multiple redundant connections to the external network (usually the Internet). For example, you could create the following configuration:

LAN is the interface to the internal network.

Port 1 is the default interface to the external network (usually the Internet).

Port 2 is the redundant interface to the external network.

You must configure routing to support redundant Internet connections. Routing can be used to automatically redirect connections from an interface if its connection to the external network fails.

Otherwise, security policy configuration is similar to a NAT/Route mode configuration with a single Internet connection. You would create NAT mode firewall policies to control traffic flowing between the internal, private network and the external, public network (usually the Internet).

FortiGate-500A Installation Guide

01-28005-0101-20041015

21

Image 21
Contents October 01-28005-0101-20041015 Installation GuideRegulatory Compliance TrademarksTable of Contents Index Reliability demanded by large enterprises IntroductionWeb-based manager Secure installation, configuration, and managementCommand line interface Setup wizardDocument conventions Set allowaccess ping https ssh snmp http telnet Comments on Fortinet technical documentation Fortinet documentationCustomer service and technical support Getting started Mounting Package contentsPower requirements Turning the FortiGate unit power on and offEnvironmental specifications Air flowConnecting to the web-based manager To power off the FortiGate unitTo connect to the web-based manager To connect to the CLI Connecting to the command line interface CLIFactory default FortiGate configuration settings Bits per second 9600 Data bits ParityStop bits Flow control Network Settings Factory default NAT/Route mode network configurationAccount PortFactory default firewall configuration Factory default Transparent mode network configurationStrict Factory default protection profilesScan WebNAT/Route mode Planning the FortiGate configurationExample NAT/Route mode network configuration NAT/Route mode with multiple external network connectionsTransparent mode Configuration optionsFortiGate-500A Unit Management IP in Transparent mode Next steps Web-based manager and setup wizardConfiguration options Getting started 01-28005-0101-20041015 Preparing to configure the FortiGate unit in NAT/Route mode NAT/Route mode installationPPPoE settings User name Password Dhcp or PPPoE configurationConfiguring basic settings Using the web-based managerTo configure interfaces Go to System Network Interface To configure DNS server settings Go to System Network DNSTo add a default route Using the front control buttons and LCDGo to System Router Static To change the IP address and netmask of an interfaceConfiguring the FortiGate unit to operate in NAT/Route mode Using the command line interfaceTo add a default gateway to an interface To add/change the administrator passwordExample To configure DNS server settings Using the setup wizard Setup wizard settings Antivirus Starting the setup wizardConnecting the FortiGate unit to the networks To connect the FortiGate unit running in NAT/Route modePort 1 Port Configuring the networks Go to System Config TimeTo set the date and time To configure virus, attack, and spam definition updates Go to System Maintenance Update CenterTo register the FortiGate unit Preparing to configure Transparent mode Transparent mode installationTransparent mode settings Administrator Password DNS SettingsTo change the Management IP Go to System Network Management Reconnecting to the web-based manager To add a default gatewayTo change the management IP address and netmask To configure the management IP address To change to Transparent mode using the CLIExample To configure the default gatewayTo start the setup wizard Connecting the FortiGate unit to your networkPort FortiGate-500ATo register your FortiGate unit Configuring FortiGate units for HA operation High availability installationHigh availability configuration settings Priorities of heartbeat device and monitor prioritiesGroup ID MAC Address To change the FortiGate unit host name Config system global Set hostname namestr end Configuring FortiGate units for HA using the CLITo configure the FortiGate unit for HA operation Connecting the cluster to your networksTo connect the cluster HA network configurationInstalling and configuring the cluster Configuring FortiGate units for HA using the CLI CLI IndexIndex 01-28005-0101-20041015

500A, Network Router, 127, FORTIGATE specifications

Fortinet FortiGate 127 is an advanced network security appliance designed to deliver comprehensive protection to organizations while ensuring seamless network performance. As a part of Fortinet's leading next-generation firewall (NGFW) offerings, the FortiGate 127 integrates various essential features and technologies that are critical for modern network security.

One of the standout features of the FortiGate 127 is its ability to perform deep packet inspection. This technology enables the device to analyze and filter network traffic, identifying and mitigating threats such as malware, viruses, and intrusions in real-time. With a robust Threat Intelligence system, FortiGate utilizes FortiGuard Labs to provide continuous updates on emerging threats, equipping organizations with the necessary defense against sophisticated cyberattacks.

Another key technology included in the FortiGate 127 is integrated secure SD-WAN functionality. This feature allows organizations to optimize their wide-area network (WAN) connections, enhancing performance and reducing costs through intelligent traffic routing and real-time application visibility. By leveraging software-defined capabilities, businesses can ensure efficient use of their bandwidth, prioritize critical applications, and maintain high levels of uptime.

The FortiGate 127 also excels in providing advanced VPN support. With multiple VPN protocols such as IPsec and SSL, users can establish secure remote connections, facilitating safe access to corporate resources from anywhere. This is particularly important in today's remote work environment, where secure connectivity is essential for maintaining productivity while protecting sensitive data.

In terms of performance, the FortiGate 127 is equipped with high throughput capabilities, ensuring it can handle extensive network traffic without compromising speed or efficiency. Its multi-core architecture allows for parallel processing, which enhances overall performance and responsiveness.

Additionally, the device features an intuitive and user-friendly interface, enabling IT teams to easily manage and configure network policies. With centralized management options, administrators can efficiently oversee multiple FortiGate devices within their network, ensuring optimal visibility and control.

Overall, the Fortinet FortiGate 127 Network Router is a powerful solution for organizations seeking to bolster their security posture. With its combination of deep packet inspection, integrated SD-WAN functionality, advanced VPN support, and high-performance capabilities, it stands out as a vital asset in the modern cybersecurity landscape. It is an ideal choice for businesses aiming to protect their networks from the ever-evolving threat landscape while maintaining operational efficiency.