Fortinet 800F To change the FortiGate unit host name, High availability settings Schedule

Page 53

High availability installation

Configuring FortiGate units for HA using the web-based manager

 

 

Table 10: High availability settings (Continued)

Schedule

The schedule controls load balancing among the FortiGate units in the active-active HA cluster. The schedule must be the same for all FortiGate units in the HA cluster.

None

No load balancing. Select None when the cluster interfaces

 

are connected to load balancing switches.

 

 

Hub

Load balancing for hubs. Select Hub if the cluster interfaces

 

are connected to a hub. Traffic is distributed to units in a

 

cluster based on the Source IP and Destination IP of the

 

packet.

 

 

Least

Least connection load balancing. If the FortiGate units are

Connection

connected using switches, select Least connection to

 

distribute traffic to the cluster unit with the fewest

 

concurrent connections.

 

 

Round Robin

Round robin load balancing. If the FortiGate units are

 

connected using switches, select round robin to distribute

 

traffic to the next available cluster unit.

 

 

Weighted

Weighted round robin load balancing. Similar to round

Round Robin

robin, but weighted values are assigned to each of the units

 

in a cluster based on their capacity and on how many

 

connections they are currently processing. For example,

 

the primary unit should have a lower weighted value

 

because it handles scheduling and forwards traffic.

 

Weighted round robin distributes traffic more evenly

 

because units that are not processing traffic will be more

 

likely to receive new connections than units that are very

 

busy.

 

 

Random

Random load balancing. If the FortiGate units are

 

connected using switches, select random to randomly

 

distribute traffic to cluster units.

 

 

IP

Load balancing according to IP address. If the FortiGate

 

units are connected using switches, select IP to distribute

 

traffic to units in a cluster based on the Source IP and

 

Destination IP of the packet.

 

 

IP Port

Load balancing according to IP address and port. If the

 

FortiGate units are connected using switches, select IP Port

 

to distribute traffic to units in a cluster based on the Source

 

IP, Source Port, Destination IP, and Destination port of the

 

packet.

 

 

Configuring FortiGate units for HA using the web-based manager

Use the following procedure to configure each FortiGate unit for HA operation.

To change the FortiGate unit host name

Changing the host name is optional, but you can use host names to identify individual cluster units.

1Power on the FortiGate unit to be configured.

2Connect to the web-based manager.

See “Connecting to the web-based manager” on page 16.

3Go to System > Status.

4In the Host Name field of the Unit Information section, select Change.

5Type a new host name and select OK.

FortiGate-800/800F Installation Guide

01-28006-0024-20041026

53

Image 53
Contents October 01-28006-0024-20041026 Installation GuideRegulatory Compliance TrademarksTable of Contents Index Introduction Secure installation, configuration, and managementWeb-based manager Command line interfaceDocument conventions Setup wizardFortiGate documentation FortiGate Installation GuideFortiManager documentation Related documentationFortiClient documentation FortiMail documentationComments on Fortinet technical documentation FortiLog documentationCustomer service and technical support Comments on Fortinet technical documentation Getting started Package contents Mounting To power off the FortiGate unit Turning the FortiGate unit power on and offConnecting to the web-based manager To connect to the web-based manager Connecting to the command line interface CLIWelcome To connect to the CLIFactory default NAT/Route mode network configuration Factory default FortiGate configuration settingsNetwork Settings Factory default Transparent mode network configurationFactory default protection profiles Factory default firewall configurationWeb protection profile settings NAT/Route mode Planning the FortiGate configurationTransparent mode NAT/Route mode with multiple external network connectionsFront control buttons and LCD Configuration optionsWeb-based manager and setup wizard Next steps Preparing to configure the FortiGate unit in NAT/Route mode NAT/Route mode installationDMZ Dhcp or PPPoE configurationTo configure interfaces Go to System Network Interface Using the web-based managerConfiguring basic settings To configure DNS server settings Go to System Network DNS Using the front control buttons and LCDTo add a default route Go to System Router StaticConfiguring the FortiGate unit to operate in NAT/Route mode Using the command line interfaceTo add a default gateway to an interface To add/change the administrator passwordExample To configure interfacesGet system interface To configure DNS server settingsOn page 28 and on page 29 for other settings Using the setup wizardDhcp server Starting the setup wizardFortiGate-800F Connecting the FortiGate unit to the networksFortiGate-800 To connect to FortiGate-800/800F user-defined interfaces To connect the FortiGate unit running in NAT/Route modeConfiguring the networks To register the FortiGate unit Go to System Config TimeTo set the date and time Go to System Maintenance Update Center To configure virus, attack, and spam definition updatesPreparing to configure Transparent mode Transparent mode installationTo change the Management IP Go to System Network Management To change the management IP address and netmask Reconnecting to the web-based managerTo configure the management IP address To add a default gatewayTo change to Transparent mode using the CLI End To configure the default gatewayTo start the setup wizard Connecting the FortiGate unit to your networkFortiGate-800F Internal Network Other Network To register your FortiGate unit Reconnecting to the web-based manager Configuring FortiGate units for HA operation High availability installationHigh availability configuration settings Priorities of heartbeat device and monitor prioritiesGroup ID MAC Address To change the FortiGate unit host name High availability settings ScheduleConfig system global Set hostname namestr end Configuring FortiGate units for HA using the CLITo configure the FortiGate unit for HA operation Connecting the cluster to your networksTo connect the cluster Internal Network Installing and configuring the clusterConfiguring FortiGate units for HA using the CLI CLI IndexIndex 01-28006-0024-20041026

800F, 800 specifications

Fortinet, a leader in cybersecurity solutions, has made significant strides in fortifying enterprise networks with its FortiGate 800 and 800F series. These next-generation firewalls are designed to deliver high performance and security for organizations seeking to protect their critical assets while ensuring optimal network efficiency.

The FortiGate 800 and 800F series are built on Fortinet's proprietary Security Fabric architecture, which provides a consolidated approach to security. This architecture allows organizations to leverage seamless integration across various security solutions and services, enhancing visibility and control. With a focus on scalability, these models support various deployment scenarios—from branch offices to data centers—making them versatile options for organizations of any size.

One of the standout features of the FortiGate 800 and 800F series is their robust threat intelligence capabilities. Powered by FortiGuard Labs, these firewalls provide real-time threat intelligence that enables proactive threat mitigation and incident response. This not only helps to defend against known threats but also enhances the firewall’s ability to identify emerging threats, ensuring comprehensive protection.

The series boasts impressive performance metrics. The FortiGate 800F can process up to 20 Gbps of firewall throughput and 1.5 million concurrent sessions, making it a suitable choice for high-performance environments. Additionally, the built-in SSL inspection capabilities allow organizations to decrypt and inspect encrypted traffic, which is crucial for detecting hidden threats.

The FortiGate 800 and 800F also feature advanced security technologies, including Intrusion Prevention System (IPS), antivirus, web filtering, and application control, all managed through a unified interface. This centralization simplifies management and reduces administrative overhead, allowing IT teams to focus on strategic initiatives.

Another significant characteristic of the FortiGate 800F is its energy efficiency. The design includes hardware optimizations that not only enhance performance but also reduce power consumption, aligning with the growing emphasis on sustainability practices.

In summary, the Fortinet FortiGate 800 and 800F series are comprehensive network security solutions that leverage advanced technologies to provide organizations with the security, performance, and flexibility necessary in today's threat landscape. With their robust threat intelligence and high throughput capabilities, these firewalls are well-suited for enterprises looking to fortify their defenses against an ever-evolving array of cyber threats.