Fortinet Network Router, FORTIGATE, 500A, 127 manual To change the FortiGate unit host name

Page 47

High availability installation

Configuring FortiGate units for HA using the web-based manager

 

 

Table 9: High availability settings (Continued)

Schedule

The schedule controls load balancing among the FortiGate units in the active-active HA cluster. The schedule must be the same for all FortiGate units in the HA cluster.

None

No load balancing. Select None when the cluster interfaces

 

are connected to load balancing switches.

 

 

Hub

Load balancing for hubs. Select Hub if the cluster interfaces

 

are connected to a hub. Traffic is distributed to units in a

 

cluster based on the Source IP and Destination IP of the

 

packet.

 

 

Least

Least connection load balancing. If the FortiGate units are

Connection

connected using switches, select Least connection to

 

distribute traffic to the cluster unit with the fewest

 

concurrent connections.

 

 

Round Robin

Round robin load balancing. If the FortiGate units are

 

connected using switches, select round robin to distribute

 

traffic to the next available cluster unit.

 

 

Weighted

Weighted round robin load balancing. Similar to round

Round Robin

robin, but weighted values are assigned to each of the units

 

in a cluster based on their capacity and on how many

 

connections they are currently processing. For example,

 

the primary unit should have a lower weighted value

 

because it handles scheduling and forwards traffic.

 

Weighted round robin distributes traffic more evenly

 

because units that are not processing traffic will be more

 

likely to receive new connections than units that are very

 

busy.

 

 

Random

Random load balancing. If the FortiGate units are

 

connected using switches, select random to randomly

 

distribute traffic to cluster units.

 

 

IP

Load balancing according to IP address. If the FortiGate

 

units are connected using switches, select IP to distribute

 

traffic to units in a cluster based on the Source IP and

 

Destination IP of the packet.

 

 

IP Port

Load balancing according to IP address and port. If the

 

FortiGate units are connected using switches, select IP Port

 

to distribute traffic to units in a cluster based on the Source

 

IP, Source Port, Destination IP, and Destination port of the

 

packet.

 

 

Configuring FortiGate units for HA using the web-based manager

Use the following procedure to configure each FortiGate unit for HA operation.

To change the FortiGate unit host name

Changing the host name is optional, but you can use host names to identify individual cluster units.

1Power on the FortiGate unit to be configured.

2Connect to the web-based manager.

See “Connecting to the web-based manager” on page 14.

3Go to System > Status.

4In the Host Name field of the Unit Information section, select Change.

5Type a new host name and select OK.

FortiGate-500A Installation Guide

01-28005-0101-20041015

47

Image 47
Contents October 01-28005-0101-20041015 Installation GuideRegulatory Compliance TrademarksTable of Contents Index Reliability demanded by large enterprises IntroductionWeb-based manager Secure installation, configuration, and managementDocument conventions Command line interfaceSetup wizard Set allowaccess ping https ssh snmp http telnet Comments on Fortinet technical documentation Fortinet documentationCustomer service and technical support Getting started Mounting Package contentsAir flow Turning the FortiGate unit power on and offPower requirements Environmental specificationsTo connect to the web-based manager Connecting to the web-based managerTo power off the FortiGate unit To connect to the CLI Connecting to the command line interface CLIStop bits Flow control Factory default FortiGate configuration settingsBits per second 9600 Data bits Parity Port Factory default NAT/Route mode network configurationNetwork Settings AccountFactory default firewall configuration Factory default Transparent mode network configurationWeb Factory default protection profilesStrict ScanNAT/Route mode Planning the FortiGate configurationExample NAT/Route mode network configuration NAT/Route mode with multiple external network connectionsFortiGate-500A Unit Management IP in Transparent mode Transparent modeConfiguration options Next steps Web-based manager and setup wizardConfiguration options Getting started 01-28005-0101-20041015 Preparing to configure the FortiGate unit in NAT/Route mode NAT/Route mode installationPPPoE settings User name Password Dhcp or PPPoE configurationTo configure DNS server settings Go to System Network DNS Using the web-based managerConfiguring basic settings To configure interfaces Go to System Network InterfaceTo change the IP address and netmask of an interface Using the front control buttons and LCDTo add a default route Go to System Router StaticTo add/change the administrator password Using the command line interfaceConfiguring the FortiGate unit to operate in NAT/Route mode To add a default gateway to an interfaceExample To configure DNS server settings Using the setup wizard Setup wizard settings Antivirus Starting the setup wizardPort 1 Port Connecting the FortiGate unit to the networksTo connect the FortiGate unit running in NAT/Route mode To set the date and time Configuring the networksGo to System Config Time To register the FortiGate unit To configure virus, attack, and spam definition updatesGo to System Maintenance Update Center Preparing to configure Transparent mode Transparent mode installationTo change the Management IP Go to System Network Management Transparent mode settings Administrator PasswordDNS Settings To change the management IP address and netmask Reconnecting to the web-based managerTo add a default gateway To configure the management IP address To change to Transparent mode using the CLIExample To configure the default gatewayTo start the setup wizard Connecting the FortiGate unit to your networkPort FortiGate-500ATo register your FortiGate unit Priorities of heartbeat device and monitor priorities High availability installationConfiguring FortiGate units for HA operation High availability configuration settingsGroup ID MAC Address To change the FortiGate unit host name Config system global Set hostname namestr end Configuring FortiGate units for HA using the CLITo configure the FortiGate unit for HA operation Connecting the cluster to your networksTo connect the cluster HA network configurationInstalling and configuring the cluster Configuring FortiGate units for HA using the CLI CLI IndexIndex 01-28005-0101-20041015

500A, Network Router, 127, FORTIGATE specifications

Fortinet FortiGate 127 is an advanced network security appliance designed to deliver comprehensive protection to organizations while ensuring seamless network performance. As a part of Fortinet's leading next-generation firewall (NGFW) offerings, the FortiGate 127 integrates various essential features and technologies that are critical for modern network security.

One of the standout features of the FortiGate 127 is its ability to perform deep packet inspection. This technology enables the device to analyze and filter network traffic, identifying and mitigating threats such as malware, viruses, and intrusions in real-time. With a robust Threat Intelligence system, FortiGate utilizes FortiGuard Labs to provide continuous updates on emerging threats, equipping organizations with the necessary defense against sophisticated cyberattacks.

Another key technology included in the FortiGate 127 is integrated secure SD-WAN functionality. This feature allows organizations to optimize their wide-area network (WAN) connections, enhancing performance and reducing costs through intelligent traffic routing and real-time application visibility. By leveraging software-defined capabilities, businesses can ensure efficient use of their bandwidth, prioritize critical applications, and maintain high levels of uptime.

The FortiGate 127 also excels in providing advanced VPN support. With multiple VPN protocols such as IPsec and SSL, users can establish secure remote connections, facilitating safe access to corporate resources from anywhere. This is particularly important in today's remote work environment, where secure connectivity is essential for maintaining productivity while protecting sensitive data.

In terms of performance, the FortiGate 127 is equipped with high throughput capabilities, ensuring it can handle extensive network traffic without compromising speed or efficiency. Its multi-core architecture allows for parallel processing, which enhances overall performance and responsiveness.

Additionally, the device features an intuitive and user-friendly interface, enabling IT teams to easily manage and configure network policies. With centralized management options, administrators can efficiently oversee multiple FortiGate devices within their network, ensuring optimal visibility and control.

Overall, the Fortinet FortiGate 127 Network Router is a powerful solution for organizations seeking to bolster their security posture. With its combination of deep packet inspection, integrated SD-WAN functionality, advanced VPN support, and high-performance capabilities, it stands out as a vital asset in the modern cybersecurity landscape. It is an ideal choice for businesses aiming to protect their networks from the ever-evolving threat landscape while maintaining operational efficiency.