22 01-28005-0101-20041015 Fortinet Inc.
Transparent mode Getting started
Figure 6: Example NAT/Route multiple internet connection configuration
Transparent mode
In Transparent mode, the FortiGate unit is invisible to the network. Similar to a
network bridge, all FortiGate interfaces must be on the same subnet. You only have to
configure a management IP address so that you can make configuration changes.
The management IP address is also used for antivirus and attack definition updates.
You typically use the FortiGate unit in Transparent mode on a private network behind
an existing firewall or behind a router. The FortiGate unit performs firewall functions,
IPSec VPN, virus scanning, IPS, web content filtering, and Spam filtering.
Figure 7: Example Transparent mode network configuration
You can connect up to seven network segments to the FortiGate unit to control traffic
between these network segments.
LAN can connect to the internal firewall or router.
Ports 1 can connect to the external network.
Ports 2 to 6 can connect to other networks.
Port 4 can also connect to other FortiGate-500A units if you are installing an HA
cluster.
Configuration options
Once you have selected Transparent or NAT/Route mode operation, you can
complete the configuration plan and begin to configure the FortiGate unit. Choose
among three different tools to configure the FortiGate unit
FortiGate-500A Unit
in NAT/Route mode
Port 1
204.23.1.5
Port 2
64.83.32.45
NAT mode policies controlling
traffic between internal and
external networks.
Internet
LAN
192.168.1.1
Internal network
192.168.1.3
Esc Enter
A
CONSOLE
56
USB LAN
1234
L1 L2 L3 L4
10/100 10/100/1000
FortiGate-500A Unit
in Transparent mode
Internet
10.10.10.1
Management IP
10.10.10.3
Port 2 Port 1
10.10.10.2
Transparent mode policies
controlling traffic between
internal and external networks
204.23.1.5
(firewall, router)
Gateway to
public network
Internal network
Esc Enter
A
CONSOLE
56
USB LAN
1234
L1 L2 L3 L4
10/100 10/100/1000