Configuring

Configuring NAT mode

In the factory default configuration, entry number 1 in the Static Route list is associated with a destination address of 0.0.0.0/0.0.0.0, which means any/all destinations. This route is called the "static default route". If no other routes are present in the routing table and a packet needs to be forwarded beyond the FortiGate unit, the factory configured static default route causes the FortiGate unit to forward the packet to the default gateway.

For an initial configuration, you must edit the factory configured static default route to specify a different default gateway for the FortiGate unit. This will enable the flow of data through the FortiGate unit.

For details on adding additional static routes, see the FortiGate Administration Guide.

To modify the default gateway

config router static edit <seq_num>

set gateway <gateway_IP> set device <interface>

end

Adding firewall policies

Firewall policies enable traffic to flow through the FortiGate interfaces. Firewall policies to define the FortiGate unit process the packets in a communication session. You can configure the firewall policies to allow only specific traffic, users and specific times when traffic is allowed.

For the initial installation, a single firewall policy that enables all traffic through will enable you to verify your configuration is working. On lower-end units such a default firewall policy is already in place. For the higher end FortiGate units, you will need to add a firewall policy.

The following steps add two policies that allows all traffic through the FortiGate unit, to enable you to continue testing the configuration on the network.

To add an outgoing traffic firewall policy

config firewall profile

edit <seq_num>

set srcintf <source_interface> set srcaddr <source_IP>

set dstintf <destination_interface> set dstaddr <destination_IP>

set schedule always set service ANY set action accept

end

To create an incoming traffic firewall policy, use the same commands with the addresses reversed.

Note that these policies allow all traffic through. No protection profiles have been applied. Ensure you create additional firewall policies to accommodate your network requirements.

FortiGate-620B FortiOS 3.0 MR6 Install Guide

 

01-30006-83054-20081015

25

Page 25
Image 25
Fortinet 620B manual To modify the default gateway, To add an outgoing traffic firewall policy

620B specifications

The Fortinet 620B is a state-of-the-art security appliance designed to provide comprehensive cybersecurity solutions for medium to large enterprises. As part of Fortinet's FortiGate series, the 620B combines advanced security features with robust performance capabilities, ensuring that organizations can protect their networks against an evolving threat landscape.

One of the standout features of the Fortinet 620B is its exceptional threat protection capabilities. The device utilizes Fortinet's proprietary FortiOS operating system, which integrates multiple security functions, including firewall, intrusion prevention system (IPS), virtual private network (VPN), and antivirus. This unified approach enables organizations to enforce consistent security policies across their network without compromising performance.

The FortiGate 620B is powered by Fortinet's purpose-built security processing unit (SPU) architecture, which significantly accelerates threat detection and mitigation processes. With multi-core processing capabilities, the device can handle high volumes of traffic while maintaining low latency, making it suitable for environments with heavy data flows. This performance is critical for organizations requiring real-time inspection of encrypted traffic, as the 620B offers strong decryption capabilities without sacrificing throughput.

In addition to its security features, the Fortinet 620B includes advanced networking technologies. The device supports software-defined networking (SDN) and integrates with Fortinet’s Security Fabric, allowing for enhanced visibility and control across the entire network ecosystem. This fabric architecture enables seamless communication between multiple devices, streamlining the management of security policies and improving overall network efficiency.

Another key characteristic of the FortiGate 620B is its scalability. Organizations can easily scale their deployment to meet growing demands by utilizing additional Fortinet appliances and services. The device also provides extensive reporting and analytics features, offering insights into network usage and security incidents, empowering security teams to make informed decisions.

Overall, the Fortinet 620B is an exceptional solution for organizations looking to strengthen their network security posture. With its combination of powerful threat protection, high performance, and advanced networking capabilities, it stands out as a reliable choice for safeguarding critical business operations in today's digital landscape. Its comprehensive feature set, combined with Fortinet's commitment to innovation, makes the FortiGate 620B a formidable asset for any cybersecurity strategy.