Fortinet MR8 manual Transparent mode, Example NAT/Route multiple internet connection configuration

Page 25

Getting started

Planning the FortiGate configuration

 

 

Otherwise, security policy configuration is similar to a NAT/Route mode configuration with a single Internet connection. You would create NAT mode firewall policies to control traffic flowing between the internal, private network and the external, public network (usually the Internet). If you have multiple internal networks, such as one or more DMZ networks, in addition to the internal, private network, you can create route mode firewall policies for traffic flowing between them.

Figure 7: Example NAT/Route multiple internet connection configuration

 

FortiGate-60 Unit

 

WAN1

in NAT/Route mode

204.23.1.5

 

 

 

 

 

 

Internal network

Internet

 

INTERNAL

 

 

 

 

 

 

 

 

LINK 100

LINK 100

LINK 100

LINK 100

LINK 100

LINK 100

LINK 100

 

PWR STATUS 1

2

3

4

DMZ

WAN1

WAN2

 

 

 

 

 

 

 

192.168.1.3

WAN2

Internal

64.83.32.45

192.168.1.1

NAT mode policies controlling traffic between internal and external networks.

Transparent mode

In Transparent mode, the FortiGate unit is invisible to the network. Similar to a network bridge, all FortiGate interfaces must be on the same subnet. You only have to configure a management IP address so that you can make configuration changes. The management IP address is also used for antivirus and attack definition updates.

You typically use the FortiGate unit in Transparent mode on a private network behind an existing firewall or behind a router. The FortiGate unit performs firewall functions, IPSec VPN, virus scanning, IPS, web content filtering, and Spam filtering.

Figure 8: Example Transparent mode network configuration

Gateway to

public network

FortiGate-60 Unit

in Transparent mode

204.23.1.510.10.10.2 WAN1

 

 

 

INTERNAL

 

 

 

 

PWR

STATUS

1

2

3

4

DMZ

WAN1

WAN2

 

 

LINK 100

LINK 100

LINK 100

LINK 100

LINK 100

LINK 100

LINK 100

10.10.10.1 Management IP

(firewall, router)

 

Internal

Internal network

 

 

 

Transparent mode policies

10.10.10.3

Internet

controlling traffic between

 

internal and external networks

 

 

 

You can connect up to four network segments to the FortiGate unit to control traffic between these network segments.

A 4-port switch for connecting the FortiGate internal interface to your internal network segment,

WAN1 can connect to the external firewall or router,

DMZ and WAN2 can connect to other network segments,

Note: The modem interface is not available in Transparent mode.

FortiGate-60 Installation Guide

01-28008-0018-20050128

25

Image 25
Contents January 01-28008-0018-20050128 Installation GuideRegulatory Compliance TrademarksTable of Contents Index Introduction Secure installation, configuration, and managementWeb-based manager Command line interfaceDocument conventions Setup wizardFortiGate documentation FortiGate Installation GuideFortinet Knowledge Center Related documentationComments on Fortinet technical documentation FortiManager documentationFortiMail documentation Customer service and technical supportFortiLog documentation Customer service and technical support Customer service and technical support Getting started Mounting Package contentsPower requirements Turning the FortiGate unit power on and offEnvironmental specifications To power on the FortiGate unitTo connect to the web-based manager Connecting to the web-based managerTo connect to the CLI Connecting to the command line interface CLIBits per second 9600 Data bits Parity Stop bits Flow controlGo to System Network DNS Quick installation using factory defaultsFactory default Dhcp server configuration Factory default FortiGate configuration settingsFactory default NAT/Route mode network configuration Factory default firewall configuration Factory default Transparent mode network configurationAdministrative access Management IPStrict Factory default protection profilesScan NAT/Route mode Planning the FortiGate configurationExample NAT/Route mode network configuration NAT/Route mode with multiple external network connectionsExample NAT/Route multiple internet connection configuration Transparent modeWeb-based manager and setup wizard Configuration optionsNext steps Preparing to configure the FortiGate unit in NAT/Route mode NAT/Route mode installationDhcp or PPPoE configuration Using the web-based managerPPPoE settings User name Password To configure interfaces Go to System Network Interface Configuring basic settingsTo configure DNS server settings Go to System Network DNS To add a default routeConfiguring the FortiGate unit to operate in NAT/Route mode Using the command line interfaceTo add/change the administrator password To configure interfacesGet system interface ExampleTo configure DNS server settings Using the setup wizardExternal Interface Setup wizard settings PasswordDhcp server Internal serversStarting the setup wizard Connecting the FortiGate unit to the networksSetup wizard settings Antivirus FortiGate-60 FortiGate-60 NAT/Route mode connectionsConfiguring the Modem interface Configuring the networksTo configure virus, attack, and spam definition updates Go to System Config TimeTo set the date and time To register the FortiGate unitGo to System Maintenance Update Center Preparing to configure Transparent mode Transparent mode installationManagement IP To change the Management IP Go to System Network ManagementTo change to Transparent mode using the CLI Reconnecting to the web-based managerTo configure the default gateway To configure the management IP addressTo start the setup wizard Internal Connecting the FortiGate unit to your networkTo register your FortiGate unit Go to System Maintenance Update Center Configuring FortiGate units for HA operation High availability installationHigh availability configuration settings Priorities of heartbeat device and monitor prioritiesGroup ID MAC Address To change the FortiGate unit host name Config system global Set hostname namestr end Configuring FortiGate units for HA using the CLITo configure the FortiGate unit for HA operation Connecting the cluster to your networksTo connect the cluster HA network configurationInstalling and configuring the cluster Installing and configuring the cluster Selecting a modem mode Configuring the modem interfaceRedundant mode configuration To operate in standalone mode Go to System Network Modem Standalone mode configurationMode Configuring modem settingsAuto-dial Redundant forTo configure modem settings Go to System Network Modem Connecting and disconnecting the modem in Standalone modeTo connect to a dialup account Go to System Network Modem Dead gateway detection Defining a Ping ServerTo disconnect the modem ISPAdding firewall policies for modem connections CLI IndexIndex