|
|
Factory defaults | Factory default Transparent mode network configuration |
Table 4: Factory default NAT/Route mode network configuration (Continued)
WLAN | Netmask: | 255.255.255.0 |
| Administrative Access: | Ping |
|
|
|
| Default Gateway (for default route) | 192.168.100.1 |
|
|
|
| Default Route |
|
| A default route consists of a default gateway and the name of | |
Network Settings | the interface connected to the external network (usually the | |
Internet). The default gateway directs all | ||
| interface and to the external network. |
|
|
|
|
| Primary DNS Server | 65.39.139.53 |
|
|
|
| Secondary DNS Server | 65.39.139.63 |
|
|
|
Factory default Transparent mode network configuration
In Transparent mode, the FortiWiFi unit has the default network configuration listed in Table 5.
Table 5: Factory default Transparent mode network configuration
Administrator | User name: | admin | |
account | Password: | (none) | |
| |||
|
|
| |
Management IP | IP: | 0.0.0.0 | |
Netmask: | 0.0.0.0 | ||
| |||
|
|
| |
DNS | Primary DNS Server: | 65.39.139.53 | |
Secondary DNS Server: | 65.39.139.63 | ||
| |||
|
|
| |
| Internal | HTTPS, Ping | |
Administrative access | DMZ | HTTPS, Ping | |
| WAN1 | Ping | |
| WAN2 | Ping | |
| WLAN | HTTPS, Ping | |
|
|
|
Factory default firewall configuration
FortiWiFi firewall policies control how all traffic is processed by the FortiWiFi unit. Until firewall policies are added, no traffic can be accepted by or pass through the FortiWiFi unit. The factory default configuration contains one firewall policy that allows all traffic originating on the internal network to access the Internet. No other traffic is allowed through the FortiWiFi unit. To allow traffic through the FortiWiFi unit, you can add firewall policies. See the FortiGate Administration Guide for information about adding firewall policies.
The following firewall configuration settings are included in the default firewall configuration to make it easier to add firewall policies.
25 | |