Fortinet 800F manual Factory default FortiGate configuration settings

Page 19

Getting started

Factory default NAT/Route mode network configuration

 

 

Factory default FortiGate configuration settings

The FortiGate unit is shipped with a factory default configuration. The default configuration allows you to connect to and use the FortiGate web-based manager to configure the FortiGate unit onto the network. To configure the FortiGate unit onto the network you add an administrator password, change network interface IP addresses, add DNS server IP addresses, and configure basic routing, if required.

If you plan to operate the FortiGate unit in Transparent mode, you can switch to Transparent mode from the factory default configuration and then configure the FortiGate unit onto the network in Transparent mode.

Once the network configuration is complete, you can perform additional configuration tasks such as setting system time, configuring virus and attack definition updates, and registering the FortiGate unit.

The factory default protection profiles can be used to apply different levels of antivirus protection, web content filtering, spam filtering, and IPS to the network traffic that is controlled by firewall policies.

Factory default NAT/Route mode network configuration

Factory default Transparent mode network configuration

Factory default firewall configuration

Factory default protection profiles

Factory default NAT/Route mode network configuration

When the FortiGate unit is first powered on, it is running in NAT/Route mode and has the basic network configuration listed in Table 3. This configuration allows you to connect to the FortiGate unit web-based manager and establish the configuration required to connect the FortiGate unit to the network. In Table 3, HTTPS administrative access means you can connect to the web-based manager using HTTPS protocol through this interface. Ping administrative access means this interface responds to ping requests.

Table 3: Factory default NAT/Route mode network configuration

Administrator

User name:

admin

account

Password:

(none)

 

 

 

 

IP:

192.168.1.99

Internal interface

Netmask:

255.255.255.0

 

Administrative Access:

HTTPS, Ping

 

 

 

 

IP:

192.168.100.99

External interface

Netmask:

255.255.255.0

 

Administrative Access:

Ping

 

 

 

 

IP:

10.10.10.1

DMZ interface

Netmask:

255.255.255.0

 

Administrative Access:

HTTPS, Ping

 

 

 

FortiGate-800/800F Installation Guide

01-28006-0024-20041026

19

Image 19
Contents October 01-28006-0024-20041026 Installation GuideRegulatory Compliance TrademarksTable of Contents Index Introduction Secure installation, configuration, and managementWeb-based manager Command line interfaceDocument conventions Setup wizardFortiGate documentation FortiGate Installation GuideFortiMail documentation Related documentationFortiManager documentation FortiClient documentationComments on Fortinet technical documentation FortiLog documentationCustomer service and technical support Comments on Fortinet technical documentation Getting started Package contents Mounting Connecting to the web-based manager Turning the FortiGate unit power on and offTo power off the FortiGate unit To connect to the web-based manager Connecting to the command line interface CLIWelcome To connect to the CLIFactory default NAT/Route mode network configuration Factory default FortiGate configuration settingsNetwork Settings Factory default Transparent mode network configurationFactory default protection profiles Factory default firewall configurationWeb protection profile settings NAT/Route mode Planning the FortiGate configurationTransparent mode NAT/Route mode with multiple external network connectionsWeb-based manager and setup wizard Configuration optionsFront control buttons and LCD Next steps Preparing to configure the FortiGate unit in NAT/Route mode NAT/Route mode installationDMZ Dhcp or PPPoE configurationConfiguring basic settings Using the web-based managerTo configure interfaces Go to System Network Interface Go to System Router Static Using the front control buttons and LCDTo configure DNS server settings Go to System Network DNS To add a default routeTo add/change the administrator password Using the command line interfaceConfiguring the FortiGate unit to operate in NAT/Route mode To add a default gateway to an interfaceExample To configure interfacesGet system interface To configure DNS server settingsOn page 28 and on page 29 for other settings Using the setup wizardDhcp server Starting the setup wizardFortiGate-800 Connecting the FortiGate unit to the networksFortiGate-800F To connect to FortiGate-800/800F user-defined interfaces To connect the FortiGate unit running in NAT/Route modeConfiguring the networks To set the date and time Go to System Config TimeTo register the FortiGate unit Go to System Maintenance Update Center To configure virus, attack, and spam definition updatesPreparing to configure Transparent mode Transparent mode installationTo change the Management IP Go to System Network Management To change the management IP address and netmask Reconnecting to the web-based managerTo change to Transparent mode using the CLI To add a default gatewayTo configure the management IP address End To configure the default gatewayTo start the setup wizard Connecting the FortiGate unit to your networkFortiGate-800F Internal Network Other Network To register your FortiGate unit Reconnecting to the web-based manager Priorities of heartbeat device and monitor priorities High availability installationConfiguring FortiGate units for HA operation High availability configuration settingsGroup ID MAC Address To change the FortiGate unit host name High availability settings ScheduleConfig system global Set hostname namestr end Configuring FortiGate units for HA using the CLITo configure the FortiGate unit for HA operation Connecting the cluster to your networksTo connect the cluster Internal Network Installing and configuring the clusterConfiguring FortiGate units for HA using the CLI CLI IndexIndex 01-28006-0024-20041026

800F, 800 specifications

Fortinet, a leader in cybersecurity solutions, has made significant strides in fortifying enterprise networks with its FortiGate 800 and 800F series. These next-generation firewalls are designed to deliver high performance and security for organizations seeking to protect their critical assets while ensuring optimal network efficiency.

The FortiGate 800 and 800F series are built on Fortinet's proprietary Security Fabric architecture, which provides a consolidated approach to security. This architecture allows organizations to leverage seamless integration across various security solutions and services, enhancing visibility and control. With a focus on scalability, these models support various deployment scenarios—from branch offices to data centers—making them versatile options for organizations of any size.

One of the standout features of the FortiGate 800 and 800F series is their robust threat intelligence capabilities. Powered by FortiGuard Labs, these firewalls provide real-time threat intelligence that enables proactive threat mitigation and incident response. This not only helps to defend against known threats but also enhances the firewall’s ability to identify emerging threats, ensuring comprehensive protection.

The series boasts impressive performance metrics. The FortiGate 800F can process up to 20 Gbps of firewall throughput and 1.5 million concurrent sessions, making it a suitable choice for high-performance environments. Additionally, the built-in SSL inspection capabilities allow organizations to decrypt and inspect encrypted traffic, which is crucial for detecting hidden threats.

The FortiGate 800 and 800F also feature advanced security technologies, including Intrusion Prevention System (IPS), antivirus, web filtering, and application control, all managed through a unified interface. This centralization simplifies management and reduces administrative overhead, allowing IT teams to focus on strategic initiatives.

Another significant characteristic of the FortiGate 800F is its energy efficiency. The design includes hardware optimizations that not only enhance performance but also reduce power consumption, aligning with the growing emphasis on sustainability practices.

In summary, the Fortinet FortiGate 800 and 800F series are comprehensive network security solutions that leverage advanced technologies to provide organizations with the security, performance, and flexibility necessary in today's threat landscape. With their robust threat intelligence and high throughput capabilities, these firewalls are well-suited for enterprises looking to fortify their defenses against an ever-evolving array of cyber threats.