Fortinet 30B manual To set an interface to use PPPoE addressing, To configure DNS server settings

Page 24

Configuring NAT mode

Configuring

To set an interface to use PPPoE addressing

config system interface edit external

set mode pppoe

set username <name_str> set password <psswrd>

set ipunnumbered <ip_address>

set disc-retry-timeout <integer_seconds> set padt-retry-timeout <integer_seconds> set distance <integer>

set defaultgw {enable disable}

set dns-server-override {enable disable}

end

The CLI lists the IP address, netmask, and other settings for each of the FortiGate interfaces.

Note: If you change the IP address of the interface you are connecting to, you must connect through a web browser again using the new address. Browse to https:// followed by the new IP address of the interface. If the new IP address of the interface is on a different subnet, you may have to change the IP address of your computer to the same subnet.

Configure a DNS server

A DNS server is a service that converts symbolic node names to IP addresses. A domain name server (DNS server) implements the protocol. In simple terms, it acts as a phone book for the Internet. A DNS server matches domain names with the computer IP address. This enables you to use readable locations, such as fortinet.com when browsing the Internet.

DNS server IP addresses are typically provided by your internet service provider.

To configure DNS server settings

config system dns

set autosvr {enable disable} set primary <address_ip>

set secondary <address_ip> end

Note if you set the autosvr to enable, you do not have to configure the primary or secondary DNS server IP addresses.

Adding a default route and gateway

A route provides the FortiGate unit with the information it needs to forward a packet to a particular destination. A static route causes packets to be forwarded to a destination other than the default gateway. You define static routes manually. Static routes control traffic exiting the FortiGate unit-you can specify through which interface the packet will leave and to which device the packet should be routed.

In the factory default configuration, entry number 1 in the Static Route list is associated with a destination address of 0.0.0.0/0.0.0.0, which means any/all destinations. This route is called the "static default route". If no other routes are present in the routing table and a packet needs to be forwarded beyond the FortiGate unit, the factory configured static default route causes the FortiGate unit to forward the packet to the default gateway.

 

FortiGate-30B FortiOS 3.0 MR6 Install Guide

24

01-30006-0459-20080505

Image 24
Contents Install G U I D E Trademarks Regulatory complianceInstalling ConfiguringConents Introduction Advanced configuration FortiGate FirmwareInstalling firmware from a system reboot using the CLI Testing new firmware before installingIndex Page Introduction Register your FortiGate unitAbout the FortiGate-30B About this documentFurther Reading Document conventionsTypographic conventions Fortinet Knowledge Center Comments on Fortinet technical documentationCustomer service and technical support Customer service and technical support Installing Environmental specificationsGrounding Rack mount instructionsMounting Connecting to the network To power on the FortiGate unitTo power off the FortiGate unit Plugging in the FortiGateTurning off the FortiGate unit NAT vs. Transparent mode NAT modeConnecting to the FortiGate unit Transparent modeConnecting to the web-based manager To connect to the web-based managerConnecting to the CLI To connect to the CLIConfiguring NAT mode Using the web-based managerConfigure the interfaces To configure interfaces Go to System Network InterfaceConfigure a DNS server Adding a default route and gatewayTo modify the default gateway Go to Router Static Adding firewall policiesUsing the CLI To set an interface to use a static addressTo set an interface to use Dhcp addressing To configure DNS server settings To set an interface to use PPPoE addressingConfiguring Transparent mode To modify the default gatewayTo add an outgoing traffic firewall policy Switching to Transparent mode To switch to Transparent mode Go to System StatusTo switch to Transparent mode To configure DNS server settings Verify the configuration Backing up the configurationRestoring a configuration Additional configurationSet the Administrator password Set the time and dateConfigure FortiGuard Updating antivirus and IPS signaturesAdditional configuration Advanced configuration Protection profilesFirewall policies Firewall policiesConfiguring firewall policies Antivirus optionsAntiSpam options Web filtering Logging FortiGate Firmware Downloading firmwareUsing the web-based manager Upgrading the firmwareReverting to a previous version Backup and Restore from a USB key Using the USB Auto-InstallTo revert to a previous firmware version Using the CLI To upgrade the firmware using the CLIExecute restore image namestr tftpip4 To revert to a previous firmware version using the CLIInstalling firmware from a system reboot using the CLI Execute restore image namestr tftpipv4To install firmware from a system reboot Press any key to display configuration menuRestoring the previous configuration To backup configuration using the CLIAdditional CLI Commands for a USB key To restore configuration using the CLITo configure the USB Auto-Install using the CLI Testing new firmware before installing To test the new firmware imageTesting new firmware before installing Testing new firmware before installing Index Web filtering 37 web-based manager Page Page

30B specifications

Fortinet's FortiGate 30B is a compact yet powerful security appliance designed for small to medium-sized businesses and branch offices. This next-generation firewall (NGFW) integrates various security functions, helping organizations safeguard their networks without compromising on performance or ease of use.

One of the standout features of the FortiGate 30B is its robust security capabilities. It offers firewall protection, intrusion prevention systems (IPS), antivirus, web filtering, and application control, all in one device. This consolidated approach simplifies security management, enabling companies to deploy a range of protections without the need for multiple products.

The FortiGate 30B utilizes Fortinet's proprietary FortiOS operating system, which allows for centralized management and visibility into network traffic. With features like FortiView, administrators can gain insights into application usage, user activities, and security events, helping them make informed decisions to enhance their security posture.

Performance is another critical aspect of the FortiGate 30B. Equipped with Fortinet's purpose-built security processing units (SPUs), the device is designed to handle high throughput while maintaining low latency. This ensures that businesses can operate smoothly without facing interruptions caused by security measures.

Additionally, the FortiGate 30B supports advanced technologies such as VPN (Virtual Private Network) for secure remote access and SD-WAN (Software-Defined Wide Area Network) capabilities. This combination enables organizations to optimize their network performance and enhance connectivity between branch offices or remote workers, making it an ideal solution for today's flexible work environments.

A highlight of the FortiGate 30B is its ease of deployment. With a user-friendly interface and guided setup wizards, even those with limited IT experience can configure the device quickly. The included FortiCloud service allows for easy management and monitoring, further simplifying the administrative overhead.

Scalability is yet another critical characteristic of the FortiGate 30B. As businesses grow, they can easily expand their security infrastructure by integrating additional Fortinet solutions into their network, maintaining a cohesive security strategy without disrupting operations.

In summary, the FortiGate 30B offers a comprehensive, high-performance security solution for small and medium-sized organizations. With its integrated features, advanced technologies, and user-friendly management capabilities, it empowers businesses to protect their networks effectively while ensuring optimal performance and scalability for future growth.