Choosing a Configuration Tool

Web-based manager

The FortiGate web-based manager is an easy to use management tool.

Use it to configure the administrator password, the interface and default gateway addresses, and the DNS server addresses.

Requirements:

An Ethernet connection between the FortiGate unit and management computer.

Internet Explorer 6.0 or higher on the management computer.

Collecting Information

NAT/Route Mode

MGMT 1

IP:

____.____.____.____

Port 8

IP:

____.____.____.____

 

 

 

 

 

 

 

Netmask:

____.____.____.____

 

Netmask:

____.____.____.____

 

 

 

 

 

 

MGMT 2

IP:

____.____.____.____

Port 9

IP:

____.____.____.____

 

 

 

 

 

 

 

Netmask:

____.____.____.____

 

Netmask:

____.____.____.____

 

 

 

 

 

 

Port 1

IP:

____.____.____.____

Port 10

IP:

____.____.____.____

 

 

 

 

 

 

 

Netmask:

____.____.____.____

 

Netmask:

____.____.____.____

 

 

 

 

 

 

Port 2

IP:

____.____.____.____

Port 11

IP:

____.____.____.____

 

 

 

 

 

 

 

Netmask:

____.____.____.____

 

Netmask:

____.____.____.____

 

 

 

 

 

 

Port 3

IP:

____.____.____.____

Port 12

IP:

____.____.____.____

 

 

 

 

 

 

 

Netmask:

____.____.____.____

 

Netmask:

____.____.____.____

 

 

 

 

 

 

Port 4

IP:

____.____.____.____

Port 13

IP:

____.____.____.____

 

 

 

 

 

 

 

Netmask:

____.____.____.____

 

Netmask:

____.____.____.____

 

 

 

 

 

 

Port 5

IP:

____.____.____.____

Port 14

IP:

____.____.____.____

 

 

 

 

 

 

 

Netmask:

____.____.____.____

 

Netmask:

____.____.____.____

 

 

 

 

 

 

Port 6

IP:

____.____.____.____

Port 15

IP:

____.____.____.____

 

 

 

 

 

 

 

Netmask:

____.____.____.____

 

Netmask:

____.____.____.____

 

 

 

 

 

 

Port 7

IP:

____.____.____.____

Port 16

IP:

____.____.____.____

 

 

 

 

 

 

 

Netmask:

____.____.____.____

 

Netmask:

____.____.____.____

 

 

 

 

 

 

Configuring the FortiGate Unit

Web-based Manager

1.Connect the FortiGate internal interface to a management computer Ethernet interface. Use a cross-over Ethernet cable to connect the devices directly. Use straight-through Ethernet cables to connect the devices through a hub or switch.

2.Configure the management computer to be on the same subnet as the internal interface of the FortiGate unit. To do this, change the IP address of the management computer to 192.168.1.2 and the netmask to 255.255.255.0.

3.To access the FortiGate web-based manager, start Internet Explorer and browse to https://192.168.1.99 (remember to include the “s” in https://).

4.Type admin in the Name field and select Login.

NAT/Route mode

To change the administrator password

1.Go to System > Admin > Administrators.

2.Select Change Password for the admin administrator and enter a new password.

To configure interfaces

1.Go to System > Network > Interface.

2.Select the edit icon for each interface to configure.

3.Set the addressing mode for the interface. (See the online help for information.)

For manual addressing, enter the IP address and netmask for the interface.

For DHCP addressing, select DHCP and any required settings.

For PPPoE addressing, select PPPoE, and enter the username and password

and any other required settings.

To configure the Primary and Secondary DNS server IP addresses

1.Go to System > Network > Options, enter the Primary and Secondary DNS IP ad-

dresses that you recorded above and select Apply.

To configure a Default Gateway

1.Go to Router > Static and select Edit icon for the static route.

2.Set Gateway to the Default Gateway IP address you recorded above and select OK.

Transparent mode

To switch from NAT/route mode to transparent mode

1.Go to System > Config > Operation Mode and select Transparent.

2.Set the Management IP/Netmask to 192.168.1.99/24.

3.Set a default Gateway and select Apply.

To change the administrator password

1.Go to System > Admin > Administrators.

2.Select Change Password for the admin administrator and enter a new password.

To change the management interface

1.Go to System > Config > Operation Mode.

2.Enter the Management IP address and netmask that you recorded above and select

Apply.

To configure the Primary and Secondary DNS server IP addresses

1. Go to System > Network > Options, enter the Primary and Secondary DNS IP ad- dresses that you recorded above and select Apply.

7Completing the Configuration

Congratulations!

You have finished configuring the basic settings. Your network is now protected from Internet- based threats. To explore the full range of configuration options, see the online help or the Tools and Documentation CD.

Command Line Interface (CLI)

The CLI is a full-featured management tool. Use it to configure the administrator password, the interface addresses, default gateway address, and DNS server addresses. To configure advanced settings, see the CLI Reference on the Tools and Documentation CD.

Requirements:

The RJ-45 to DB-9 serial connection between the FortiGate unit and management computer.

A terminal emulation application (HyperTerminal for Windows) on the management computer.

Transparent mode

Management IP

IP:

____.____.____.____

 

 

 

 

Netmask:

____.____.____.____

 

 

 

General settings

Administrator password

 

 

 

 

 

Network Settings

Default Gateway:

____.____.____.____

 

 

 

 

Primary DNS Server:

____.____.____.____

 

 

 

 

Secondary DNS Server:

____.____.____.____

 

 

 

A default gateway is required for the FortiGate unit to route connections to the Internet.

Factory default settings

NAT/Route mode

 

Transparent mode

 

 

 

 

 

MGMT 1

192.168.1.99

Management IP

0.0.0.0

 

 

 

 

MGMT 2

192.168.2.99

Administrative account settings

 

 

 

 

Ports 1 to 16

0.0.0.0

User name

admin

 

 

 

 

 

 

Password

(none)

 

 

 

DHCP server on Internal

192.168.1.110 – 192.168.1.210

 

interface

 

 

 

 

 

 

 

Command Line Interface

1.Use the RJ-45 to DB9 serial cable to connect the FortiGate Console port to the man- agement computer serial port.

2.Start a terminal emulation program (HyperTerminal) on the management computer. Use these settings:

3.Baud Rate (bps) 9600, Data bits 8, Parity None, Stop bits 1, and Flow Control None.

4.At the Login: prompt, type admin and press Enter twice (no password required).

NAT/Route mode

1.Configure the FortiGate internal interface. config system interface

edit <port_num>

set ip <intf_ip>/<netmask_ip>

set allowaccess {httphttpssshpingsnmptelnet}

end

2.Configure the primary and secondary DNS server IP addresses. config system dns

set primary <dns-server_ip> set secondary <dns-server_ip>

end

3.Configure the default gateway. config router static

edit 1

set gateway <gateway_ip>

end

Transparent Mode

1.Change from NAT/Route mode to Transparent mode and configure the Management IP address.

config system settings

set opmode transparent

set manageip <mng_ip>/<netmask> set gateway <gateway_ip>

end

2.Configure the DNS server IP address. config system dns

set primary <dns-server_ip> set secondary <dns-server_ip>

end

Visit these links for more information and documentation for your Fortinet product.

Technical Documentation - http://docs.forticare.com

Fortinet Knowledge Center - http://kc.forticare.com

Fortinet Technical Support - http://support.fortinet.com

Page 2
Image 2
Fortinet 3016B user manual Choosing a Configuration Tool, Collecting Information, Configuring the FortiGate Unit

3016B specifications

The Fortinet 3016B is a robust firewall solution designed to meet the dynamic security needs of modern enterprises. As part of the FortiGate product line, the 3016B combines advanced security features with high performance, catering to organizations that require reliability and efficiency in managing their network security.

One of the primary features of the Fortinet 3016B is its high throughput capabilities. It supports up to 40 Gbps of firewall throughput and an impressive 7.5 Gbps of intrusion prevention system (IPS) throughput. This ensures that even at peak network loads, the firewall can maintain strong performance without compromising security. This feature is particularly important for businesses that handle large volumes of data and require seamless connectivity for their operational efficiency.

The 3016B leverages Fortinet's proprietary FortiOS operating system, which is known for its user-friendly interface and comprehensive security functionalities. FortiOS includes a variety of tools such as a next-generation firewall (NGFW), antivirus protection, web filtering, and application control, all incorporated into a single platform. This consolidation helps in simplifying management while providing extensive security coverage against a wide array of cyber threats.

Moreover, the Fortinet 3016B incorporates advanced threat intelligence capabilities powered by FortiGuard Labs. This allows the firewall to stay updated with real-time threat feeds, enabling the organization to respond proactively to emerging threats and vulnerabilities. The integration of AI-driven analytics enhances anomaly detection and helps in identifying potential breaches before they can escalate.

Another notable characteristic of the 3016B is its scalability. Designed for medium to large enterprises, it can easily integrate into existing infrastructure and scale as business needs grow. With support for multiple virtual domains (VDOMs), organizations can create isolated environments for different departments or functions, maintaining policy separations while optimizing resource utilization.

In terms of connectivity, the Fortinet 3016B offers various interfaces, including multiple 1G and 10G Ethernet ports, ensuring flexible deployment options. The device also supports high availability (HA) configurations, which provide redundancy and minimize downtime.

Overall, the Fortinet 3016B is an exceptional solution that combines superior security features with high performance and scalability, making it a prime choice for organizations looking to strengthen their network security posture without sacrificing efficiency. With its comprehensive capabilities, it empowers businesses to tackle today’s cybersecurity challenges effectively.