QuickStart Guide
(Front)
Off No link established.
Green The correct cable is in use, and the connected equipment
Internal has power.
External
Flashing Amber Network activity at this interface. © Copyright 2004 Fortinet Incorporated. All rights reserved.
(Back) Trademarks
Off No link established.
Products mentioned in this document are trademarks or registered trademarks of their respective holders.
06 December 2004
Regulatory Compliance
For technical support please visit http://www.fortinet.com.
FCC Class A Part 15 CSA/CUS
01-28005-0031-20041206
1 Checking the
Checking the package
package contents
contents Check that the package contents are complete.
Front
Ethernet Cables:
Orange - Crossover
Grey - Straight-through
Connector Type Speed Protocol Description
PWR STATUS
PWR STATUS
INTERNAL EXTERNAL
USB USB — USB Optional connection to a modem for standalone or backup USER MANUAL
PWR STATUS External Internal
QuickStart Guide
USB Internal
operation. Power
External
Copyright 2004 Fortinet Incorporated. All rights reserved.
Trademarks
Products mentioned in this document are trademarks.
Documentation
Modem RJ-11 Inactive port for this model (blocked). RJ-45 Serial
Connection
2
•
Connecting the FortiGate-50A
MANAGEMENT IP 10.10.10.1
EXTERNAL DHCP
• The Status light flashes while the unit is starting up and turns off when the Modem Console USB External Internal
system is up and running. Optional connection to a serial modem Crossover Ethernet cable connects to
or management computer on internal network
Straight-through Ethernet cable connects Straight-through Ethernet cable connects to
to Internet (public switch, router or modem) LAN or switch on internal network
EXTERNAL
5. Select one of the following Addressing modes A LINK 100 LINK 100
EXTERNAL
204.23.1.5 10.10.10.2
Internal network
A LINK 100 LINK 100
10.10.10.3
NAT mode policies controlling (firewall, router) External 10.10.10.1 Internal
traffic between internal and Management IP
external networks.
are sent to the destination network. In Route mode, no translation takes place. By You can connect two network segments to the FortiGate-50A unit to control traffic
default, the unit has a single NAT mode policy that allows users on the internal network between these network segments.
to securely access and download content from the Internet. No other traffic is possible
until you have configured more policies.
Refer to the Documentation CD-ROM for information on how to control traffic, and how to configure HA, antivirus protection, Web content filtering, Spam filtering, intrusion
prevention (IPS), and virtual private networking (VPN).
4 Choosing a configuration tool
Web-based manager and Setup Wizard
Choose among two different tools to configure the FortiGate-50A.
5 Collecting information
NAT/Route mode
Use these tables to record your FortiGate-50A configuration settings.
Transparent mode
Internal Interface: IP: ____.____.____.____ Management IP: IP: ____.____.____.____
Netmask: ____.____.____.____ Netmask: ____.____.____.____
External Interface: IP: ____.____.____.____
The management IP address and netmask must be valid for the network from which
Netmask: ____.____.____.____ you will manage the FortiGate-50A.
The internal interface IP address and netmask must be valid for the internal network.
Factory default settings
General settings NAT/Route mode Transparent mode
Network Settings: Default Gateway: ____.____.____.____ External interface 192.168.100.99 Administrative account settings
Primary DNS Server: ____.____.____.____ DHCP server on Internal 192.168.1.110 – User name admin
Secondary DNS Server: ____.____.____.____ interface 192.168.1.210
Password (none)
A default gateway is required for the FortiGate unit to route connections to the Internet.
Using the 1. Use the serial cable to connect the FortiGate Console port to the management computer serial port.
2. Start a terminal emulation program (HyperTerminal) on the management computer. Use these settings:
Command Line Interface Baud Rate (bps) 9600, Data bits 8, Parity None, Stop bits 1, and Flow Control None.
3. At the Login: prompt, type admin and press Enter twice (no password required).
NAT/Route mode Transparent mode
1. Configure the FortiGate-50A internal interface. 1. Change from NAT/Route mode to Transparent mode.
config system interface config system global
edit internal set opmode transparent
set mode static end
set ip <intf_ip> <netmask_ip>
end 2. Wait a moment and then log in again at the prompt.
2. Repeat to configure each interface, for example, to configure the external interface 3. Configure the Management IP address.
config system interface config system manageip
edit external set ip <mng_ip> <netmask>
... end
3. Configure the primary and secondary DNS server IP addresses. Configure the DNS server IP address.
config system dns config system dns
set primary <dns-server_ip> set primary <dns-server_ip>
set secondary <dns-server_ip> set secondary <dns-server_ip>
end end
4. Configure the default gateway. 4. Configure the default route.
config router static config router static
edit 1 edit 1
set gateway <gateway_ip> set gateway <gateway_ip>
end end
Restarting the FortiGate-50A • To restart the unit, go to System > Maintenance >
ShutDown and select Reboot.
CLI: execute reboot
Should you mistakenly change a network setting and cannot connect to the
unit, reboot the unit and try again or to set the unit back to factory defaults and • To reset the unit, go to System > Maintenance > CLI: execute factoryreset
start over again. Shutdown and select Reset to factory default.