Fortinet 224B manual Configuring Transparent mode, Switching to Transparent mode

Page 24

Configuring Transparent mode

Configuring

Configuring Transparent mode

Configuring Transparent mode involves switching to Transparent mode, configuring the management IP address, default routes, and simple firewall policies. You can use the web-based manager or the CLI to configure the FortiGate unit in Transparent mode.

Using the web-based manager

After connecting to the web-based manager, you can use the following procedures to complete the basic configuration of the FortiGate unit. Ensure you read the section “Connecting to the web-based manager” on page 16 before beginning.

Switching to Transparent mode

The FortiGate unit comes preset to NAT mode. You need to switch to Transparent mode.

To switch to Transparent mode

1Go to System > Status.

2Select Change beside the Operation Mode.

3Select Transparent.

4Enter the Management IP/Netmask address and the Default Gateway address.

The default gateway IP address is required to tell the FortiGate unit where to send network traffic to other networks.

5Select Apply.

Configure a DNS server

A DNS server is a service that converts symbolic node names to IP addresses. A domain name server (DNS server) implements the protocol. In simple terms, it acts as a phone book for the Internet. A DNS server matches domain names with the computer IP address. This enables you to use readable locations, such as fortinet.com when browsing the Internet.

DNS server IP addresses are typically provided by your internet service provider.

To configure DNS server settings

1Go to System > Network > Options.

2Enter the IP address of the primary DNS server.

3Enter the IP address of the secondary DNS server. Select Apply.

Adding firewall policies

Firewall policies enable traffic to flow through the FortiGate interfaces. Firewall policies define the FortiGate unit process the packets in a communication session. You can configure the firewall policies to allow only specific traffic, users and specific times when traffic is allowed.

 

FortiGate-224B FortiOS 3.0 MR6 Install Guide

24

01-30006-0451-20080815

Image 24
Contents Install G U I D E Trademarks Regulatory complianceContents Advanced configuration FortiGate FirmwareInstalling firmware from a system reboot using the CLI Testing new firmware before installingIndex Page Introduction Register your FortiGate unitAbout the FortiGate-224B About this documentDocument conventions Further Reading Typographic conventionsCustomer service and technical support Fortinet Knowledge CenterComments on Fortinet technical documentation Installing Environmental specificationsGrounding Rack mount instructionsMounting To install the FortiGate unit into a rack Installed mounting bracketsConnecting to the network To power on the FortiGate unitTo power off the FortiGate unit Plugging in the FortiGateNAT vs. Transparent mode NAT modeConnecting to the FortiGate unit Transparent modeConnecting to the web-based manager To connect to the web-based managerConnecting to the CLI To connect to the CLIConfiguring NAT mode Using the web-based managerConfigure the interfaces To configure interfaces Go to System Network InterfaceConfigure a DNS server Adding a default route and gatewayTo modify the default gateway Go to Router Static Adding firewall policiesUsing the CLI To set an interface to use a static addressTo set an interface to use Dhcp addressing To configure DNS server settings To set an interface to use PPPoE addressingTo modify the default gateway To add an outgoing traffic firewall policyConfiguring Transparent mode Switching to Transparent modeTo switch to Transparent mode Go to System Status Source Address All Destination Interface To switch to Transparent mode Verify the configuration Backing up the configurationRestoring a configuration Additional configurationSet the Administrator password Set the time and dateConfigure FortiGuard Updating antivirus and IPS signaturesAdditional configuration Advanced configuration Protection profilesFirewall policies Firewall policiesConfiguring firewall policies Antivirus optionsAntiSpam options Web filtering Logging FortiGate Firmware Downloading firmwareUsing the web-based manager Upgrading the firmwareReverting to a previous version Backup and Restore from a USB key Using the USB Auto-InstallTo revert to a previous firmware version Using the CLI To upgrade the firmware using the CLIExecute restore image namestr tftpip4 To revert to a previous firmware version using the CLIInstalling firmware from a system reboot using the CLI Execute restore image namestr tftpipv4To install firmware from a system reboot Press any key to display configuration menuRestoring the previous configuration To backup configuration using the CLIAdditional CLI Commands for a USB key To restore configuration using the CLITo configure the USB Auto-Install using the CLI Testing new firmware before installing To test the new firmware imageTesting new firmware before installing Testing new firmware before installing Index Web filtering 35 web-based manager Page Page