Fortinet FORTIGATE, 500A, 127, Network Router manual Using the setup wizard

Page 32

Configuring the FortiGate unit to operate in NAT/Route mode

NAT/Route mode installation

 

 

Using the setup wizard

From the web-based manager, you can use the setup wizard to complete the initial configuration of the FortiGate unit. For information about connecting to the web-based manager, see “Connecting to the web-based manager” on page 14.

If you are configuring the FortiGate unit to operate in NAT/Route mode (the default), you can use the setup wizard to:

add the administration password

configure the internal interface address

choose either a manual (static) or a dynamic (DHCP or PPPoE) address for the external interface

add a default route for the external interface

add the DNS server IP addresses

add the DHCP server settings and IP addresses

add various internal server IP addresses including web, IMAP, POP3, SMTP, and FTP servers

set the antivirus protection to high, medium, or none

Table 7 lists the additional settings that you can configure with the setup wizard. See

Table 5 on page 26 and Table 6 on page 26 for other settings.

Table 7: Setup wizard settings

Password

Prepare an administrator password.

 

 

Internal Interface

Use the information you gathered in Table 5 on page 26.

The Internal interface in the setup wizard refers to Port 1 of the

 

FortiGate-500A unit.

 

 

 

External Interface

Use the information you gathered in Table 5 on page 26.

The External interface in the setup wizard refers to Port 2 of the

 

FortiGate-500A unit.

 

 

 

 

 

Starting IP:

_____._____._____._____

 

Ending IP:

_____._____._____._____

 

Netmask:

_____._____._____._____

DHCP server

Default

_____._____._____._____

 

Gateway:

 

 

DNS IP:

 

 

_____._____._____._____

 

Your FortiGate firewall contains a

DHCP server to automatically set up

 

the addresses of computers on your internal network

 

 

 

 

Web Server:

_____._____._____._____

 

SMTP Server:

_____._____._____._____

 

POP3 Server:

_____._____._____._____

Internal servers

IMAP Server:

_____._____._____._____

 

FTP Server:

_____._____._____._____

 

If you provide access from the Internet to a web server, SMTP server,

 

POP3 server IMAP server, or FTP server installed on an internal

 

network, add the IP addresses of the servers here.

 

 

 

32

01-28005-0101-20041015

Fortinet Inc.

Image 32
Contents Installation Guide October 01-28005-0101-20041015Trademarks Regulatory ComplianceTable of Contents Index Introduction Reliability demanded by large enterprisesSecure installation, configuration, and management Web-based managerDocument conventions Command line interfaceSetup wizard Set allowaccess ping https ssh snmp http telnet Fortinet documentation Comments on Fortinet technical documentationCustomer service and technical support Getting started Package contents MountingTurning the FortiGate unit power on and off Power requirementsEnvironmental specifications Air flowTo connect to the web-based manager Connecting to the web-based managerTo power off the FortiGate unit Connecting to the command line interface CLI To connect to the CLIStop bits Flow control Factory default FortiGate configuration settingsBits per second 9600 Data bits Parity Factory default NAT/Route mode network configuration Network SettingsAccount PortFactory default Transparent mode network configuration Factory default firewall configurationFactory default protection profiles StrictScan WebPlanning the FortiGate configuration NAT/Route modeNAT/Route mode with multiple external network connections Example NAT/Route mode network configurationFortiGate-500A Unit Management IP in Transparent mode Transparent modeConfiguration options Web-based manager and setup wizard Next stepsConfiguration options Getting started 01-28005-0101-20041015 NAT/Route mode installation Preparing to configure the FortiGate unit in NAT/Route modeDhcp or PPPoE configuration PPPoE settings User name PasswordUsing the web-based manager Configuring basic settingsTo configure interfaces Go to System Network Interface To configure DNS server settings Go to System Network DNSUsing the front control buttons and LCD To add a default routeGo to System Router Static To change the IP address and netmask of an interfaceUsing the command line interface Configuring the FortiGate unit to operate in NAT/Route modeTo add a default gateway to an interface To add/change the administrator passwordExample To configure DNS server settings Using the setup wizard Starting the setup wizard Setup wizard settings AntivirusPort 1 Port Connecting the FortiGate unit to the networksTo connect the FortiGate unit running in NAT/Route mode To set the date and time Configuring the networksGo to System Config Time To register the FortiGate unit To configure virus, attack, and spam definition updatesGo to System Maintenance Update Center Transparent mode installation Preparing to configure Transparent modeTo change the Management IP Go to System Network Management Transparent mode settings Administrator PasswordDNS Settings To change the management IP address and netmask Reconnecting to the web-based managerTo add a default gateway To change to Transparent mode using the CLI To configure the management IP addressTo configure the default gateway ExampleConnecting the FortiGate unit to your network To start the setup wizardFortiGate-500A PortTo register your FortiGate unit High availability installation Configuring FortiGate units for HA operationHigh availability configuration settings Priorities of heartbeat device and monitor prioritiesGroup ID MAC Address To change the FortiGate unit host name Configuring FortiGate units for HA using the CLI Config system global Set hostname namestr endConnecting the cluster to your networks To configure the FortiGate unit for HA operationHA network configuration To connect the clusterInstalling and configuring the cluster Configuring FortiGate units for HA using the CLI Index CLIIndex 01-28005-0101-20041015

500A, Network Router, 127, FORTIGATE specifications

Fortinet FortiGate 127 is an advanced network security appliance designed to deliver comprehensive protection to organizations while ensuring seamless network performance. As a part of Fortinet's leading next-generation firewall (NGFW) offerings, the FortiGate 127 integrates various essential features and technologies that are critical for modern network security.

One of the standout features of the FortiGate 127 is its ability to perform deep packet inspection. This technology enables the device to analyze and filter network traffic, identifying and mitigating threats such as malware, viruses, and intrusions in real-time. With a robust Threat Intelligence system, FortiGate utilizes FortiGuard Labs to provide continuous updates on emerging threats, equipping organizations with the necessary defense against sophisticated cyberattacks.

Another key technology included in the FortiGate 127 is integrated secure SD-WAN functionality. This feature allows organizations to optimize their wide-area network (WAN) connections, enhancing performance and reducing costs through intelligent traffic routing and real-time application visibility. By leveraging software-defined capabilities, businesses can ensure efficient use of their bandwidth, prioritize critical applications, and maintain high levels of uptime.

The FortiGate 127 also excels in providing advanced VPN support. With multiple VPN protocols such as IPsec and SSL, users can establish secure remote connections, facilitating safe access to corporate resources from anywhere. This is particularly important in today's remote work environment, where secure connectivity is essential for maintaining productivity while protecting sensitive data.

In terms of performance, the FortiGate 127 is equipped with high throughput capabilities, ensuring it can handle extensive network traffic without compromising speed or efficiency. Its multi-core architecture allows for parallel processing, which enhances overall performance and responsiveness.

Additionally, the device features an intuitive and user-friendly interface, enabling IT teams to easily manage and configure network policies. With centralized management options, administrators can efficiently oversee multiple FortiGate devices within their network, ensuring optimal visibility and control.

Overall, the Fortinet FortiGate 127 Network Router is a powerful solution for organizations seeking to bolster their security posture. With its combination of deep packet inspection, integrated SD-WAN functionality, advanced VPN support, and high-performance capabilities, it stands out as a vital asset in the modern cybersecurity landscape. It is an ideal choice for businesses aiming to protect their networks from the ever-evolving threat landscape while maintaining operational efficiency.