使用安装

 

NAT/ 路由 模式安装

 

 

 

 

 

表 10: NAT/ 路由 模式配置 ( 续 )

 

 

 

 

 

 

 

IP:

_____._____._____._____

 

 

网络掩码 :

_____._____._____._____

 

外部接口

默认网关 :

_____._____._____._____

 

 

主 DNS 服务器 :

_____._____._____._____

 

 

辅助 DNS 服务器 :

_____._____._____._____

 

 

Web 服务器 :

_____._____._____._____

 

 

SMTP 服务器 :

_____._____._____._____

 

 

POP3 服务器 :

_____._____._____._____

 

内部服务器

IMAP 服务器 :

_____._____._____._____

 

 

 

 

FTP 服务器 :

_____._____._____._____

 

 

如果从 Internet 访问内部网中的 WEB 服务器、邮件服务器、IMAP 服

 

 

务器,或 FTP 服务器,请在添加服务器的 IP 地址。

 

 

 

 

DMZ 和用户定义的接口

如果您希望在安装时进行配置,可使用 表 11 记录 FortiGate DMZ 接口的 IP 地 址和子网码。 HA 接口的配置工作在 HA 安装过程中完成。

.

 

 

 

 

 

表 11: DMZ

和用户定义的接口 (可选)

 

 

 

 

 

 

 

 

DMZ

IP:

 

_____._____._____._____

网络掩码 :

_____._____._____._____

1

IP:

 

_____._____._____._____

网络掩码 :

_____._____._____._____

2

IP:

 

_____._____._____._____

网络掩码 :

_____._____._____._____

3

IP:

 

_____._____._____._____

网络掩码 :

_____._____._____._____

4

IP:

 

_____._____._____._____

网络掩码 :

_____._____._____._____

5

IP:

 

_____._____._____._____

网络掩码 :

_____._____._____._____

6

IP:

 

_____._____._____._____

网络掩码 :

_____._____._____._____

7

IP:

 

_____._____._____._____

网络掩码 :

_____._____._____._____

8

IP:

 

_____._____._____._____

网络掩码 :

_____._____._____._____

使用安装

您可以从基于 Web 的管理程序中使用安装向导来建立 FortiGate 初始配置。连接

到基于 Web 的管理程序,请参阅

第 18 页 连接到基于 Web 的管理程序

启动安装向导

为启动安装向导 :

1 选择简易安装向导 ( 基于 Web 的管理程序页面上方中间的按钮 )。

32

美国飞塔有限公司

Page 44
Image 44
Fortinet 500 manual 使用安装向导, Dmz 和用户定义的接口, 18 页 连接到基于 Web 的管理程序 。, 为启动安装向导 选择简易安装向导 基于 Web 的管理程序页面右上方中间的按钮 。

500 specifications

Fortinet 500 is a next-generation firewall (NGFW) that is part of Fortinet's acclaimed FortiGate family, designed to provide advanced security for medium to large enterprises. This appliance is known for its high performance, flexibility, and ability to protect networks from a variety of cyber threats through its robust features and technologies.

One of the main features of the Fortinet 500 is its integrated security capabilities. It combines multiple security functions into a single device, allowing organizations to manage everything from intrusion prevention and antivirus to web filtering and application control. This integration leads to simplified management and increased efficiency, as users can address multiple security needs without deploying multiple devices.

The Fortinet 500 runs on the FortiOS operating system, which is known for its simplicity and user-friendliness. FortiOS provides a centralized management interface that allows for the easy configuration and monitoring of security policies across the entire network. Additionally, the Fortinet management tools, such as FortiManager and FortiAnalyzer, enable detailed insights and reporting capabilities, helping organizations stay compliant with their security mandates.

Another characteristic that sets Fortinet 500 apart is its advanced threat intelligence, powered by the FortiGuard Labs. This global threat intelligence system continuously updates the firewall with the latest threat signatures and attack vectors, ensuring that organizations stay ahead of emerging threats. The firewall also employs machine learning and artificial intelligence to detect and mitigate sophisticated attacks in real-time.

Performance is crucial in any security appliance, and the Fortinet 500 does not disappoint. With hardware acceleration and purpose-built security processors, it delivers high throughput levels, enabling organizations to maintain productivity without sacrificing security. This level of performance is particularly beneficial in environments with heavy traffic and bandwidth demands.

In addition to these core features, the Fortinet 500 supports seamless integration with other security solutions within the Fortinet Security Fabric. This comprehensive approach allows for greater visibility and control over the entire security posture of an organization.

Overall, the Fortinet 500 is a powerful NGFW that offers a blend of advanced security features, ease of management, top-notch performance, and robust threat intelligence. Its ability to adapt to the ever-evolving landscape of cybersecurity makes it a valuable asset for businesses seeking to safeguard their digital assets and ensure seamless network operation.