Fortinet 3016B manual Configuring NAT mode, Using the web-based manager, Configure the interfaces

Page 20

Configuring NAT mode

Configuring

Configuring NAT mode

Configuring NAT mode involves defining interface addresses and default routes, and simple firewall policies. You can use the web-based manager or the CLI to configure the FortiGate unit in NAT/Route mode.

Using the web-based manager

After connecting to the web-based manager, you can use the following procedures to complete the basic configuration of the FortiGate unit. Ensure you read the section “Connecting to the web-based manager” on page 18 before beginning.

Configure the interfaces

When shipped, the FortiGate unit has a default address of 192.168.1.99 and a netmask of 255.255.255.0. for either the Port 1 or Internal interface. You need to configure this and other ports for use on your network.

To configure interfaces

1Go to System > Network > Interface.

2Select the edit icon for an interface.

3Set the Addressing Mode for the interface.

For Manual addressing, enter the IP address and netmask for the interface.

For DHCP addressing, select DHCP and complete the following:

Distance

Enter the administrative distance, between 1 and 255 for the

 

default gateway retrieved from the DHCP server. The

 

administrative distance specifies the relative priority of a route

 

when there are multiple routes to the same destination. A

 

lower administrative distance indicates a more preferred route.

Retrieve default gateway from server

Override internal DNS

Enable to retrieve a default gateway IP address from the DHCP server. The default gateway is added to the static routing table.

Enable to use the DNS addresses retrieved from the DHCP server instead of the DNS server IP addresses on the DNS page on System > Network > Options. On FortiGate-100 units and lower, you should also enable Obtain DNS server address automatically in System > Network > Options.

For PPPoE addressing, select PPPoE, and complete the following:

Username

Enter the username for the PPPoE server. This may have

 

been provided by your ISP.

Password

Enter the password for the PPPoE server for the above user

 

name.

Unnumbered

Specify the IP address for the interface. If your ISP has

 

assigned you a block of IP addresses, use one of these IP

 

addresses. Alternatively, you can use, or borrow, the IP

 

address of a configured interface on the router. You may need

 

to do this to minimize the number of unique IP addresses

 

within your network.

 

If you are borrowing an IP address remember the interface

 

must be enabled, or up to function correctly.

Initial Disc Timeout

Initial discovery timeout in seconds. The time to wait before

 

starting to retry a PPPoE discovery. To disable the discovery

 

timeout, set the value to 0.

 

FortiGate-3016B FortiOS 3.0 MR6 Install Guide

20

01-30006-0458-20080318

Image 20
Contents Install G U I D E Trademarks Regulatory complianceContents Advanced configuration AMC modulesUsing the web-based manager Installing firmware from a system reboot using the CLITesting new firmware before installing FortiGate FirmwarePage Introduction Register your FortiGate unitDocument conventions About the FortiGate-3016BAbout this document Further Reading Typographic conventionsComments on Fortinet technical documentation Customer service and technical supportFortinet Knowledge Center Installing Environmental specificationsMounting GroundingRack mount instructions To install the FortiGate unit into a rack Installed mounting bracketsTo power on the FortiGate unit Plugging in the FortiGateTurning off the FortiGate unit Connecting to the networkTo power off the FortiGate unit Turning off the FortiGate unit NAT mode ConfiguringNAT vs. Transparent mode Connecting to the FortiGate unit Transparent modeConnecting to the web-based manager To connect to the web-based managerConnecting to the CLI To connect to the CLIConfiguring NAT mode Using the web-based managerConfigure the interfaces To configure interfaces Go to System Network InterfaceConfigure a DNS server Adding a default route and gatewayTo modify the default gateway Go to Router Static Adding firewall policiesTo set an interface to use Dhcp addressing Using the CLITo set an interface to use a static address To configure DNS server settings To set an interface to use PPPoE addressingTo add an outgoing traffic firewall policy Configuring Transparent modeTo modify the default gateway Switching to Transparent mode To switch to Transparent mode Go to System StatusTo switch to Transparent mode To configure DNS server settings Verify the configuration Backing up the configurationRestoring a configuration Additional configurationSet the Administrator password Set the time and dateConfigure FortiGuard Updating antivirus and IPS signaturesAdditional configuration Advanced configuration Protection profilesFirewall policies Firewall policiesConfiguring firewall policies Antivirus optionsAntiSpam options Web filtering Logging Installing AMC filler units Installing modulesTo install the filler module AMC modulesUsing the AMC modules Removing modulesHard disk module To insert a module into a FortiGate chassisFormatting the hard disk Log configuration using the web-based managerTo format the ASM-S08 hard disk enter the following command Log configuration using the CLI Changing interfaces to operate in Sgmii or SerDes modeViewing logs ASM-FB4 and ADM-XB2 modulesAMC modules Configure the speed Config system interface edit AMC-SW1/1 Set speed auto EndUsing the web-based manager FortiGate FirmwareDownloading firmware Upgrading the firmwareTo revert to a previous firmware version To upgrade the firmwareReverting to a previous version Backup and Restore from a USB key Using the USB Auto-InstallUsing the CLI To upgrade the firmware using the CLITo revert to a previous firmware version using the CLI Execute restore image namestr tftpipv4Installing firmware from a system reboot using the CLI To install firmware from a system rebootEnter Tftp server address To restore configuration using the CLI Restoring the previous configurationTo backup configuration using the CLI To configure the USB Auto-Install using the CLI Testing new firmware before installingAdditional CLI Commands for a USB key To test the new firmware image FortiGate Firmware Testing new firmware before installing Index Web filtering 37 web-based manager Page Page
Related manuals
Manual 2 pages 28.98 Kb

3016B specifications

The Fortinet 3016B is a robust firewall solution designed to meet the dynamic security needs of modern enterprises. As part of the FortiGate product line, the 3016B combines advanced security features with high performance, catering to organizations that require reliability and efficiency in managing their network security.

One of the primary features of the Fortinet 3016B is its high throughput capabilities. It supports up to 40 Gbps of firewall throughput and an impressive 7.5 Gbps of intrusion prevention system (IPS) throughput. This ensures that even at peak network loads, the firewall can maintain strong performance without compromising security. This feature is particularly important for businesses that handle large volumes of data and require seamless connectivity for their operational efficiency.

The 3016B leverages Fortinet's proprietary FortiOS operating system, which is known for its user-friendly interface and comprehensive security functionalities. FortiOS includes a variety of tools such as a next-generation firewall (NGFW), antivirus protection, web filtering, and application control, all incorporated into a single platform. This consolidation helps in simplifying management while providing extensive security coverage against a wide array of cyber threats.

Moreover, the Fortinet 3016B incorporates advanced threat intelligence capabilities powered by FortiGuard Labs. This allows the firewall to stay updated with real-time threat feeds, enabling the organization to respond proactively to emerging threats and vulnerabilities. The integration of AI-driven analytics enhances anomaly detection and helps in identifying potential breaches before they can escalate.

Another notable characteristic of the 3016B is its scalability. Designed for medium to large enterprises, it can easily integrate into existing infrastructure and scale as business needs grow. With support for multiple virtual domains (VDOMs), organizations can create isolated environments for different departments or functions, maintaining policy separations while optimizing resource utilization.

In terms of connectivity, the Fortinet 3016B offers various interfaces, including multiple 1G and 10G Ethernet ports, ensuring flexible deployment options. The device also supports high availability (HA) configurations, which provide redundancy and minimize downtime.

Overall, the Fortinet 3016B is an exceptional solution that combines superior security features with high performance and scalability, making it a prime choice for organizations looking to strengthen their network security posture without sacrificing efficiency. With its comprehensive capabilities, it empowers businesses to tackle today’s cybersecurity challenges effectively.