Fortinet 110C manual Using the CLI, To set an interface to use a static address

Page 23

 

 

 

Configuring

Configuring NAT mode

3Set the following and select OK.

Source Interface

Select the port connected to the Internet.

Source Address

All

Destination Interface Select the port connected to the network.

Destination Address All

Schedulealways

ServiceAny

ActionAccept

Firewall policy configuration is the same in NAT/Route mode and Transparent mode.

Note that these policies allow all traffic through. No protection profiles have been applied. Ensure you create additional firewall policies to accommodate your network requirements.

For details, see the FortiGate Administration Guide.

Using the CLI

After connecting to the CLI, you can use the following procedures to complete the basic configuration of the FortiGate unit. Ensure you read the section “Connecting to the CLI” on page 17 before beginning.

Configure the interfaces

When shipped, the FortiGate unit has a default address of 192.168.1.99 and a netmask of 255.255.255.0. for either the Port 1 or Internal interface. You need to configure this and other ports for use on your network.

To set an interface to use a static address

config system interface edit <interface_name>

set mode static

set ip <address_ip> <netmask>

end

To set an interface to use DHCP addressing

config system interface edit external

set mode dhcp

set distance <integer>

set defaultgw {enable disable}

set dns-server-override {enable disable}

end

FortiGate-110C FortiOS 3.0 MR6 Install Guide

 

01-30006-0481-20080728

21

Image 23
Contents Install G U I D E Regulatory compliance TrademarksContents FortiGate Firmware Advanced configurationIndex Installing firmware from a system reboot using the CLITesting new firmware before installing Page Register your FortiGate unit IntroductionDocument conventions About the FortiGate-110CAbout this document Typographic conventions Further ReadingComments on Fortinet technical documentation Customer service and technical supportFortinet Knowledge Center Environmental specifications InstallingMounting GroundingRack mount instructions Installed mounting brackets To install the FortiGate unit into a rackPlugging in the FortiGate Connecting to the networkTo power on the FortiGate unit Turning off the FortiGate unit To power off the FortiGate unitTurning off the FortiGate unit NAT mode ConfiguringNAT vs. Transparent mode To connect to the web-based manager Connecting to the FortiGate unitTransparent mode Connecting to the web-based managerTo connect to the CLI Connecting to the CLITo configure interfaces Go to System Network Interface Configuring NAT modeUsing the web-based manager Configure the interfacesAdding a default route and gateway Configure a DNS serverAdding firewall policies To modify the default gateway Go to Router StaticTo set an interface to use Dhcp addressing Using the CLITo set an interface to use a static address To set an interface to use PPPoE addressing To configure DNS server settingsTo add an outgoing traffic firewall policy Configuring Transparent modeTo modify the default gateway To switch to Transparent mode Go to System Status Switching to Transparent modeTo switch to Transparent mode To configure DNS server settings Backing up the configuration Verify the configurationSet the time and date Restoring a configurationAdditional configuration Set the Administrator passwordUpdating antivirus and IPS signatures Configure FortiGuardAdditional configuration Protection profiles Advanced configurationFirewall policies Firewall policiesAntivirus options Configuring firewall policiesAntiSpam options Web filtering Logging Downloading firmware FortiGate FirmwareReverting to a previous version Using the web-based managerUpgrading the firmware To revert to a previous firmware version Backup and Restore from a USB keyUsing the USB Auto-Install To upgrade the firmware using the CLI Using the CLITo revert to a previous firmware version using the CLI Execute restore image namestr tftpip4Execute restore image namestr tftpipv4 Installing firmware from a system reboot using the CLIPress any key to display configuration menu To install firmware from a system rebootTo backup configuration using the CLI Restoring the previous configurationTo configure the USB Auto-Install using the CLI Additional CLI Commands for a USB keyTo restore configuration using the CLI To test the new firmware image Testing new firmware before installingTesting new firmware before installing Testing new firmware before installing Index 01-30006-0481-20080728 Page Page

110C specifications

The Fortinet 110C is a robust security appliance designed to provide comprehensive protection for small to medium-sized enterprises. It offers advanced security features combined with high-performance networking capabilities, making it an ideal choice for businesses looking to safeguard their digital assets while maintaining efficient network operations.

One of the standout features of the Fortinet 110C is its FortiOS operating system, which provides a unified security platform that integrates various security functionalities. This operating system supports firewall, VPN, intrusion prevention system (IPS), antivirus, and web filtering features, all managed from a single interface. This integration simplifies security management while enhancing overall performance.

The Fortinet 110C is equipped with an impressive throughput capacity, capable of managing up to 5 Gbps of firewall traffic and 1.5 Gbps of VPN throughput. This high performance ensures that businesses experience minimal latency and interruption, even during peak usage periods. The device also supports up to 100,000 concurrent sessions, which is crucial for organizations experiencing increases in network traffic or user connections.

In terms of connectivity, the Fortinet 110C features multiple Ethernet ports, including both WAN and LAN options, allowing for flexible network setups. The appliance supports VLAN configurations, enabling businesses to segment their networks for better security and traffic management. Additionally, the Fortinet 110C offers advanced routing features such as static and dynamic routing, which further enhances its functionality.

Security is paramount, and the Fortinet 110C excels with its comprehensive threat detection and prevention capabilities. Its Intrusion Prevention System (IPS) is designed to detect and neutralize threats in real-time, ensuring that sensitive business data remains protected. Moreover, the integrated antivirus engine scans traffic for malicious content, effectively blocking threats before they reach the network.

For businesses concerned about compliance, the Fortinet 110C includes features that support various regulatory requirements, such as logging and reporting capabilities. This ensures that organizations can maintain records of their network activity and meet audit requirements.

The Fortinet 110C also supports FortiGuard services, providing continuous updates to the security landscape. This ensures that the appliance is equipped to handle emerging threats, reinforcing the organization's security posture.

In conclusion, the Fortinet 110C is a powerful network security appliance that combines advanced security features with high performance. Its integration capabilities, impressive throughput, and robust security measures make it an optimal choice for small to medium-sized businesses looking to enhance their network security while maintaining operational efficiency. With FortiOS at its core and support for a wide range of security functionalities, the 110C stands out as a reliable solution in the ever-evolving cybersecurity landscape.