Fortinet 100 user manual Next steps

Page 41

Getting started

Configuration options

 

 

Next steps

Now that your FortiGate unit is operating, you can proceed to configure it to connect to networks:

If you are going to operate the FortiGate unit in NAT/Route mode, go to “NAT/Route mode installation” on page 43.

If you are going to operate the FortiGate unit in Transparent mode, go to “Transparent mode installation” on page 57.

FortiGate-100 Installation and Configuration Guide

41

Image 41
Contents August Installation and Configuration GuideRegulatory Compliance TrademarksTable of Contents NAT/Route mode installation System status Virus and attack definitions updates and registration RIP configuration 121 Users and authentication 173 IPSec VPN 181 Network Intrusion Detection System Nids 221 Glossary 259 Index 263 Contents Antivirus protection IntroductionEmail filtering Web content filteringFirewall NAT/Route modeNetwork intrusion detection Transparent modeWeb-based manager Secure installation, configuration, and managementFortiGate web-based manager and setup wizard Command line interfaceNetwork configuration System administrationWhat’s new in Version Logging and reportingUsers and authentication Replacement messagesDhcp server FirewallEmail filter AntivirusWeb Filter About this document Document conventions Comments on Fortinet technical documentation Fortinet documentationCustomer service and technical support Comments on Fortinet technical documentation Getting started Mounting Package contentsEnvironmental specifications Powering onConnecting to the web-based manager Connecting to the web-based managerFactory default FortiGate configuration settings Connecting to the command line interface CLIBits per second 9600 Data bits Parity Stop bits Flow controlAccount Factory default NAT/Route mode network configurationInternal interface External interfaceFactory default firewall configuration Factory default Transparent mode network configurationFactory default firewall configuration Traffic Shaping Factory default content profilesAuthentication Antivirus & Web FilterScan content profile Strict content profileStrict content profile Options Scan content profile OptionsUnfiltered content profile Web content profileWeb content profile Options Unfiltered content profile OptionsExample NAT/Route mode network configuration Planning your FortiGate configurationExample NAT/Route multiple internet connection configuration NAT/Route mode with multiple external network connectionsSetup Wizard Configuration optionsFortiGate model maximum values matrix Next steps Configuration options Getting started Internal servers NAT/Route mode installationPreparing to configure NAT/Route mode Advanced FortiGate NAT/Route mode settings Advanced NAT/Route mode settingsDMZ interface Dhcp serverUsing the command line interface Using the setup wizardSet system interface external mode static ip 204.23.1.5 FortiGate-100 NAT/Route mode connections Connecting the FortiGate unit to your networksCompleting the configuration Configuring your networksConfiguring the DMZ interface Setting the date and timeConfiguring virus and attack definition updates Configuration example Multiple connections to the InternetEnabling antivirus protection Registering your FortiGateExample multiple Internet connection configuration Primary and backup links to the Internet Configuring Ping serversUsing the CLI Destination based routing examplesLoad sharing and primary and secondary connections Load sharingRouting table should have routes arranged as shown in Table Adding the routes using the CLIPolicy routing examples Routing a service to an external networkFirewall policy example Adding a redundant default policyAdding more firewall policies Action AcceptRestricting access to a single Internet connection Preparing to configure Transparent mode Transparent mode installationTransparent mode settings Administrator Password DNS SettingsGo to System Status Changing to Transparent modeConfigure the Transparent mode default gateway Configuring the Transparent mode management IP addressFortiGate-100 Transparent mode connections Setting the date and time Default routes and static routes Transparent mode configuration examplesDefault route to an external network General configuration stepsCLI configuration steps Web-based manager example configuration stepsGo to System Network Management Go to System Network RoutingStatic route to an external destination Set system route number 1 dst 24.102.233.5 255.255.255.0 gw1 Example static route to an internal destination Set system route number 1 dst 172.16.1.11 255.255.255.0 gw1 System status System statusChanging the FortiGate firmware Firmware upgrade procedures Procedure DescriptionChanging the FortiGate host name Upgrading the firmware using the CLI Upgrade to a new firmware versionUpgrading the firmware using the web-based manager Revert to a previous firmware version Execute restore image namestr tftpipReverting to a previous firmware version using the CLI Execute ping To install firmware from a system reboot Install a firmware image from a system reboot using the CLIPress Any Key To Download Boot Image Restoring your previous configuration Test a new firmware image before installing itTest a new firmware image before installing it Installing a backup firmware image Installing and using a backup firmware imageInstalling and using a backup firmware image Switching to the backup firmware image Switching back to the default firmware image Manual virus definition updatesBacking up system settings Manual attack definition updatesDisplaying the FortiGate serial number Displaying the FortiGate up timeRestoring system settings to factory defaults Restoring system settingsRestarting the FortiGate unit Changing to Transparent modeChanging to NAT/Route mode Viewing CPU and memory status Shutting down the FortiGate unitSystem status Go to System Status Monitor Viewing sessions and network statusSessions and network status monitor Viewing virus and intrusions statusViewing the session list Go to System Status Session Session listTo IP Updating antivirus and attack definitions Virus and attack definitions updates and registrationVersion Expiry date Last update attempt Last update status Connecting to the FortiResponse Distribution NetworkGo to System Update Configuring scheduled updatesSuccessful Update FDN error Configuring update loggingGo to Log&Report Log Setting Manually updating antivirus and attack definitions Configuring push updatesAdding an override server About push updates To enable push updatesPush updates and external dynamic IP addresses Push updates through a NAT deviceExample network topology Push updates through a NAT device Example push updates through a NAT deviceGo to Firewall Virtual IP General procedureAdding a firewall policy for the port forwarding virtual IP Schedule Always Service ANY Action Accept100 Scheduled updates through a proxy server101 FortiCare Service ContractsRegistering FortiGate units 102 Registering the FortiGate unitRegistering a FortiGate unit product information 103Updating registration information Recovering a lost Fortinet support passwordViewing the list of registered FortiGate units 104105 Registering a new FortiGate unitAdding or changing a FortiCare Support Contract number Downloading virus and attack definitions updates Changing your Fortinet support passwordChanging your contact information or security question 106107 Registering a FortiGate unit after an RMA108 109 Network configurationConfiguring interfaces Bringing up an interface Viewing the interface listChanging an interface static IP address Adding a secondary IP address to an interface111 Controlling management access to an interfaceAdding a ping server to an interface Configuring the external interface for Dhcp Configuring traffic logging for connections to an interfaceConfiguring the external interface with a static IP address 113 Configuring the external interface for PPPoEConfiguring the management interface Transparent mode Adding DNS server IP addresses Configuring routing115 Go to System Network DNSAdding destination-based routes to the routing table Adding a default route117 Adding routes in Transparent modePolicy routing Configuring the routing tablePolicy routing command syntax Providing Dhcp services to your internal network119 Go to System Network Dhcp120 Viewing the dynamic IP list121 RIP configuration122 RIP settingsGo to System RIP Settings 123 UpdateInvalid HolddownPassword Configuring RIP for FortiGate interfaces124 ModeAdding RIP neighbors Go to System RIP Neighbor Adding RIP neighbors125 Adding a single RIP filter Adding RIP filters126 Go to System RIP Filter127 Adding a RIP filter listAdd the IP address of the route Mask Add the netmask of the route Action128 Adding a neighbors filterAdding a routes filter Setting system date and time System configurationTo set the date and time Go to System Config Time 129130 To set the system idle timeoutChanging web-based manager options To modify the Dead Gateway Detection settings To set the Auth timeout131 To select a language for the web-based managerAdding new administrator accounts Adding and editing administrator accountsGo to System Config Admin 132133 Editing administrator accountsTo edit an administrator account Go to System Config Admin Configuring the FortiGate unit for Snmp monitoring Configuring SnmpConfiguring FortiGate Snmp support Go to System Config Snmp v1/v2c135 FortiGate MIBsTrap Community Trap Receiver IP Addresses FortiGate MIBs MIB file name Description EtherLike.mibFortiGate traps Customizing replacement messages136 FortiGate traps Trap message Description137 Customizing replacement messagesGo to System Config Replacement Messages Alert email message sections Customizing alert emails138 Alert email message sections 139140 141 Firewall configuration142 Default firewall configurationAddresses Content profiles ServicesSchedules 143Go to Firewall Policy Adding firewall policies144 145 Traffic Shaping VPN Tunnel146 Dynamic IP Pool Fixed Port147 AuthenticationAnti-Virus & Web filter 148 Log TrafficComments Policy matching in detail Configuring policy listsChanging the order of policies in a policy list 149Enabling and disabling policies AddressesDisabling a policy Enabling a policyGo to Firewall Address Adding addresses151 Deleting addresses Editing addressesOrganizing addresses into address groups 152153 ServicesPredefined services ANY 154IRC 155Grouping services Providing access to custom servicesGo to Firewall Service Custom Go to Firewall Service Group157 SchedulesCreating recurring schedules Creating one-time schedules158 Go to Firewall Schedule One-time159 Adding a schedule to a policy160 Virtual IPsAdding static NAT virtual IPs 161 Adding port forwarding virtual IPs162 163 Adding policies with virtual IPsAdding an IP pool IP pools164 Go to Firewall IP Pool165 IP Pools for firewall policies that use fixed portsIP pools and dynamic NAT IP/MAC binding Go to Firewall IP/MAC Binding Setting166 Go to Firewall IP/MAC Binding Static IP/MAC167 Adding IP/MAC addressesEnabling IP/MAC binding Viewing the dynamic IP/MAC list168 Go to Firewall IP/MAC Binding Dynamic IP/MAC169 Content profilesAdding a content profile Default content profilesGo to Firewall Content Profile 170Oversized File/Email Block Pass Fragmented Email Adding a content profile to a policy171 172 173 Users and authenticationAdding user names and configuring authentication Setting authentication timeoutAdding user names and configuring authentication 174175 Deleting user names from the internal databaseAdding Radius servers Configuring Radius supportDeleting Radius servers 176Adding Ldap servers Configuring Ldap support177 Go to User Ldap178 Deleting Ldap serversAdding user groups Configuring user groups179 Go to User User Group180 Deleting user groups181 IPSec VPNManual Keys Key managementAutoIKE with pre-shared keys AutoIKE with certificatesManual key IPSec VPNs General configuration steps for a manual key VPNAdding a manual key VPN tunnel 183184 Adding a phase 1 configuration for an AutoIKE VPN General configuration steps for an AutoIKE VPNGo to VPN Ipsec Phase AutoIKE IPSec VPNsRemote Gateway Dialup User 186Remote Gateway Static IP Address 187 Configuring advanced options188 189 Adding a phase 2 configuration for an AutoIKE VPN190 191 Managing digital certificatesObtaining a signed local certificate Go to VPN Local Certificates Generating the certificate request192 193 Downloading the certificate requestRequesting the signed local certificate 194 Retrieving the signed local certificateImporting the signed local certificate Retrieving a CA certificate Obtaining a CA certificateImporting a CA certificate 195196 Configuring encrypt policiesAdding a destination address Adding a source addressAdding an encrypt policy 197Adding an encrypt policy 198199 VPN concentrator hub general configuration stepsIPSec VPN concentrators Source InternalAll Destination VPN spoke address Action 200Go to VPN IPSec Concentrator Adding a VPN concentrator201 202 VPN spoke general configuration stepsVPN Tunnel Policies203 Configuring redundant IPSec VPNRedundant IPSec VPNs 204 See Adding a phase 1 configuration for an AutoIKE VPN onViewing VPN tunnel status Monitoring and Troubleshooting VPNsViewing dialup VPN connection status 205Go to VPN IPSec Dialup Testing a VPN206 207 Configuring PptpPptp and L2TP VPN Adding users and user groups Configuring the FortiGate unit as a Pptp gatewayEnabling Pptp and specifying an address range 208209 Adding an address groupInstalling Pptp support Configuring a Windows 98 client for PptpGo to Start Settings Control Panel Network Adding a firewall policyConnecting to the Pptp VPN Configuring a Pptp dialup connectionConfiguring a Windows 2000 client for Pptp 211Configuring the VPN connection Configuring a Windows XP client for Pptp212 Go to Start Control Panel213 Configuring L2TPEnabling L2TP and specifying an address range Configuring the FortiGate unit as a L2TP gateway214 Go to VPN L2TP L2TP Range215 Sample L2TP address range configuration216 Configuring an L2TP dialup connection Configuring a Windows 2000 client for L2TPDisabling IPSec 217Configuring a Windows XP client for L2TP Connecting to the L2TP VPNConfiguring an L2TP VPN dialup connection Go to Start Settings219 220 221 Network Intrusion Detection System NidsDetecting attacks Selecting the interfaces to monitor Configuring checksum verificationDisabling the Nids 222Viewing attack descriptions Viewing the signature list223 Go to Nids Detection Signature ListAdding user-defined signatures Enabling and disabling Nids attack signatures224 Go to Nids Detection User Defined Signature ListDownloading the user-defined signature list Preventing attacksEnabling Nids attack prevention 225226 Setting signature threshold valuesEnabling Nids attack prevention signatures 227 Value Description Minimum Maximum Default Configuring synflood signature valuesLogging attacks Logging attack messages to the attack logAutomatic message reduction Reducing the number of Nids attack log and email messagesManual message reduction 229230 231 General configuration stepsAntivirus protection To scan FortiGate firewall traffic for viruses Antivirus scanning232 Blocking files in firewall traffic File blockingAdding file patterns to block 233Blocking oversized files and emails Configuring limits for oversized files and emailExempting fragmented email from blocking Viewing the virus list235 Web filteringGo to Web Filter Content Block Content blockingAdding words and phrases to the banned word list 236URL blocking Using the FortiGate web filterAdding URLs or URL patterns to the block list 237238 Clearing the URL block list239 Downloading the URL block listUploading a URL block list Installing a Cerberian license key on the FortiGate unit Using the Cerberian web filterAdding a Cerberian user to the FortiGate unit 240About the default group and policy Configuring Cerberian web filterTo configure the Cerberian web filtering Enabling Cerberian URL filteringEnabling the script filter Script filteringSelecting script filter options 242Adding URLs to the exempt URL list Exempt URL list243 Go to Web Filter Exempt URL244 245 Email filter246 Go to Email Filter Content BlockEmail banned word list Email exempt list Email block listAdding address patterns to the email block list 247Adding a subject tag To add a subject tag Go to Email Filter ConfigAdding address patterns to the email exempt list 248249 Logging and reportingRecording logs 250 Recording logs on a remote computerRecording logs on a NetIQ WebTrends server 251 Filtering log messagesRecording logs in system memory 252 Example log filter configurationEnabling traffic logging Configuring traffic loggingEnabling traffic logging for an interface Enabling traffic logging for a firewall policyGo to Log&Report Log Setting Traffic Filter Configuring traffic filter settingsAdding traffic filter entries 254Viewing logs saved to memory Destination IP Address Destination Netmask ServiceViewing logs 255Searching logs Configuring alert emailAdding alert email addresses 256Enabling alert email Testing alert email257 Go to Log&Report Alert Mail Categories258 259 Glossary260 261 262 263 IndexIndex 264FDS 265Ldap 266MIB 267RMA 268TCP 269UDP 270271 272
Related manuals
Manual 84 pages 47.25 Kb