Fortinet manual About the FortiGate-224B, About this document, Document conventions

Page 8

About the FortiGate-224B

Introduction

About the FortiGate-224B

The FortiGate-224B converges network and security products that uniquely integrate multiple layers of threat protection with granular network access controls. The FortiGate-224B delivers configurable port-level access control that combines traditional FortiOS security technologies with layer 2 switching hardware. The result is a complete and effective Local Area Network (LAN) security solution.

The FortiGate-224B integrates enhanced network security through the enforcement of security policy at the port level. The FortiGate-224B provides multi-layered protection against intrusion attempts, viruses, worms, denial of service attacks, spyware and blended threats.

The FortiGate-224B can operate in a initially trusted or initially un-trusted mode to adapt to the defined security policy.

Figure 1: FortiGate-224B

1

3

5

7

9

11

13

15

17

19

21

23

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

25

26

WAN1

WAN2

USB

CONSOLE

2

4

6

8

10

12

14

16

18

20

22

24

About this document

This document explains how to install and configure your FortiGate unit onto your network. This document also includes how to install and upgrade new firmware versions on your FortiGate unit.

This document contains the following chapters:

Installing – Describes setting up and powering on a FortiGate unit.

Configuring – Provides an overview of the operating modes of the FortiGate unit and how to integrate the FortiGate unit into your network.

Advanced configuration – Describes additional configuration you can perform on the FortiGate unit to enhance network protection, including antivirus, antispam, firewall configuration and logging.

FortiGate Firmware – Describes how to install, update, restore and test firmware for the FortiGate device.

Document conventions

The following document conventions are used in this guide:

In the examples, private IP addresses are used for both private and public IP addresses.

Notes and Cautions are used to provide important information:

Note: Highlights useful additional information.

 

FortiGate-224B FortiOS 3.0 MR6 Install Guide

8

01-30006-0451-20080815

Image 8
Contents Install G U I D E Trademarks Regulatory complianceContents Advanced configuration FortiGate FirmwareIndex Installing firmware from a system reboot using the CLITesting new firmware before installing Page Introduction Register your FortiGate unitDocument conventions About the FortiGate-224BAbout this document Further Reading Typographic conventionsComments on Fortinet technical documentation Customer service and technical supportFortinet Knowledge Center Installing Environmental specificationsMounting GroundingRack mount instructions To install the FortiGate unit into a rack Installed mounting bracketsConnecting to the network To power on the FortiGate unitTo power off the FortiGate unit Plugging in the FortiGateNAT vs. Transparent mode NAT modeConnecting to the FortiGate unit Transparent modeConnecting to the web-based manager To connect to the web-based managerConnecting to the CLI To connect to the CLIConfiguring NAT mode Using the web-based managerConfigure the interfaces To configure interfaces Go to System Network InterfaceConfigure a DNS server Adding a default route and gatewayTo modify the default gateway Go to Router Static Adding firewall policiesTo set an interface to use Dhcp addressing Using the CLITo set an interface to use a static address To configure DNS server settings To set an interface to use PPPoE addressingTo modify the default gateway To add an outgoing traffic firewall policyTo switch to Transparent mode Go to System Status Configuring Transparent modeSwitching to Transparent mode Source Address All Destination Interface To switch to Transparent mode Verify the configuration Backing up the configurationRestoring a configuration Additional configurationSet the Administrator password Set the time and dateConfigure FortiGuard Updating antivirus and IPS signaturesAdditional configuration Advanced configuration Protection profilesFirewall policies Firewall policiesConfiguring firewall policies Antivirus optionsAntiSpam options Web filtering Logging FortiGate Firmware Downloading firmwareReverting to a previous version Using the web-based managerUpgrading the firmware To revert to a previous firmware version Backup and Restore from a USB keyUsing the USB Auto-Install Using the CLI To upgrade the firmware using the CLIExecute restore image namestr tftpip4 To revert to a previous firmware version using the CLIInstalling firmware from a system reboot using the CLI Execute restore image namestr tftpipv4To install firmware from a system reboot Press any key to display configuration menuRestoring the previous configuration To backup configuration using the CLITo configure the USB Auto-Install using the CLI Additional CLI Commands for a USB keyTo restore configuration using the CLI Testing new firmware before installing To test the new firmware imageTesting new firmware before installing Testing new firmware before installing Index Web filtering 35 web-based manager Page Page