[PDF] [PDF] FortiGate-60 QuickStart Guide

1 mar 2007 · Before beginning to configure the FortiGate unit, you need to plan DHCP: to get an IP address from the ISP select DHCP and go to step 9



Previous PDF Next PDF





[PDF] FortiGate-60 Series and FortiGate-100A Install Guide

31 août 2007 · Provides step-by-step instructions for configuring IPSec VPNs using the web- based manager • FortiGate SSL VPN User Guide Compares 



[PDF] FortiGate-60 QuickStart Guide

1 mar 2007 · Before beginning to configure the FortiGate unit, you need to plan DHCP: to get an IP address from the ISP select DHCP and go to step 9



[PDF] FortiGate-60 Quickstart Guide

Before configuring the FortiGate-60, you need to plan how to integrate the unit into your DHCP: to get an IP address from the ISP select DHCP and go to step 9



[PDF] FortiGate Administration Guide - Fortinet Knowledge Base

26 nov 2010 · Configuring interface status detection for gateway load balancing 69 Changing interface MTU General configuration steps



[PDF] Fortinet Recommended Security Best Practices

2 fév 2018 · Initial security checks available with FortiOS 5 6 0 February 2018: V1 2 From a single pane, the entire Security Fabric configuration can be assessed 2 Identifies Multi-source log consolidation and normalization Level 4



[PDF] Fortinet Solutions for Transparent Mode (Layer-2)-Final

Enable VDOM, configure a Transparent mode VDOM for data traffic and a NAT/ Route mode VDOM for administrator access Steps and Related CLI / Configuration 



[PDF] FortiOS 40 - VPN Configuration Guide

Step 3 – Create a VPN User Group 10 Step 2 – Configure the VPN Connection 13 your Fortinet VPN gateway device using the web configuration interface



[PDF] FortiGate Administration Guide - adines

24 avr 2009 · FortiWiFi are trademarks of Fortinet, Inc in the United States and/or other countries The names of Creating a new phase 1 configuration



[PDF] HOW TO CONFIGURE A DMZ FOR SECURE COLLABORATION

STEP-BY-STEP GUIDE TO INSTALL A FORTINET FIREWALL configuration with a guest network connected to our VIA system within the DMZ You can add 

[PDF] fortigate 60e configuration wan

[PDF] fortigate 60e configure vlan

[PDF] fortigate 60e configure vpn

[PDF] fortigate 60e datasheet

[PDF] fortigate 60e end of support

[PDF] fortigate 60e factory reset

[PDF] fortigate 60e firewall

[PDF] fortigate 60e firmware 6.2.2

[PDF] fortigate 60e firmware upgrade cli

[PDF] fortigate 60e firmware upgrade path

[PDF] fortigate 60e firmware version

[PDF] fortigate 60e forticlient license

[PDF] fortigate 60e fortiguard license

[PDF] fortigate 60e installation manual

[PDF] fortigate 60e license activation

© Copyright 2007 Fortinet Incorporated. All rights reserved. Products mentioned in this document are trademarks or registered trade- marks of their respective holders.

Regulatory Compliance

FCC Class A Part 15 CSA/CUS

1 March 2007

Checking the Package Contents

Connecting

1234

USBWAN2WAN1DMZ

DC+12V

InternalModem Console

Optional connection to DMZ network

Straight-through Ethernet cable connects

to Internet (public switch, router or modem)

Straight-through Ethernet cables connect

to computers on internal network

Power cable connects to power supply

Optional redundant connection to Internet

Optional connection to a serial modem

(serial to USB adapter required) Optional RJ-45 to DB-9 serial cable connects to management computer

Planning the Configuration

ConnectorTypeSpeedProtocolDescription

Internal RJ-4510/100 Base-TEthernetA 4-port switch connection for up to four devices or the internal network.

WAN1 and

WAN2 RJ-4510/100 Base-TEthernetRedundant connections to the Internet. DMZRJ-4510/100 Base-TEthernetOptional connection to a DMZ network or to other FortiGate-60 units for high availability (HA). For details, see the Documentation CD-ROM. ConsoleRJ-45 9600 BpsRS-232Optional connection to the management computer.

Provides access to the command line interface

(CLI). USBUSBUSBOptional connection for the FortiUSB key, modem or backup operation. Place the unit on a stable surface. It requires 1.5 inches (3.75 cm) c learance above and on each side to allow for cooling. Plug in power cable to unit before connecting power. and running. Connect the FortiGate unit to a power outlet and to the internal and ext ernal networks. mode (the default) or Transparent mode.

NAT/Route mode

In NAT/Route mode, each FortiGate unit is visible to the network that it is c onnected to. All of its interfaces are on different subnets. Each interface that is connected to a network must be address that is valid for that network.

NAT/Route mode when the

FortiGate unit is deployed

as a gateway between pri- vate and public networks.

In its default NAT/Route

Firewall policies control

communications through the FortiGate unit. No operate in NAT mode or in Route mode. In NAT mode, the FortiGate unit performs network address translation before IP packets are sent to the destination network. In Route mode, no translation takes place.

Transparent mode

In Transparent mode, the FortiGate unit is invisible to the network. All of its interfaces are on

FortiGate unit in Transparent

mode on a private network behind a router. In its default tion, the unit functions as a through the FortiGate unit until these network segments.

Router

Internet

Internal

network Hub or switch

10.10.10.3

InternalWAN1

Gateway to public network

204.23.1.5 10.10.10.2

intrusion prevention (IPS), and virtual private networking (VPN).

FortiGate-60

01-30002-0032-20070301

manager and the default settings in NAT/Route mode. All you need to do is set your network computers to use DHCP, access the web-based addresses for up to 100 computers in the internal network.

Connect the FortiGate unit to the network.

Set the all the network computers to use DHCP to automatically obtain an IP address. The FortiGate internal interface acts as a DHCP server for the internal network and assigns IP addresses to all computers in the range 192.168.1.110 -192.168.1.210. web-based manager appears. Go to System > Network > and select Edit for the External interface. 1. 2. 3. 4.

Select one of the following Addressing modes

Go to System > Network > DNS.

Select one of the following DNS settings

ISP, select Apply

addresses given to you by the ISP, select Apply Go to Router > Static, select Create New, enter the default gateway address and select

Quick Start Guide.

Select Retrieve default gateway from server and Override internal DNS op tions if your

Quick Start Guide.

Go to step 6 if you are not selecting these options. 5. 6. 7. 8. 9.

LEDStateDescription

Power

GreenThe FortiGate unit is on.

OffThe FortiGate unit is off.

Status

Green/Flashing

Green

The FortiGate unit is starting up.

OffThe FortiGate unit is running normally.

Link (Internal, DMZ,

WAN1, WAN2)

GreenThe correct cable is in use and the connected equipment has power.

Flashing GreenNetwork activity at this interface.

OffNo link established.

100
(Internal, DMZ,

WAN1, WAN2)

GreenThe interface is connected at 100Mbps.

Internet

Router

Internal

network DMZ

10.10.10.1

10.10.10.2

Internal Network192.168.1.3

Internal

192.168.1.99

Routing policies controlling

traffic between internal networks. WAN1

204.23.1.5

NAT mode policies controlling

traffic between internal and external networks.

INTERNAL

DMZ4321

LINK 100LINK 100LINK 100LINK 100LINK 100LINK 100LINK 100

WAN1WAN2PWRSTATUS

INTERNALDMZ4321

LINK 100LINK 100LINK 100LINK 100LINK 100LINK 100LINK 100

WAN1WAN2PWRSTATUS

Power LED

Status

LED

Internal Interface,

switch connectors

1,2,3,4

WAN 1,2

Interface

DMZ

Interface

Internal

Interface

Ethernet Cables:

Orange - Crossover

Grey - Straight-throughPower CablePower SupplyRJ-45 to

DB-9 Serial CableDocumentation

FortiGate-60

Copyright 2006 Fortinet Incorporated. All rights reserved.Trademarks Products mentioned in this document are trademarks.

QuickStart Guide

INTERNAL

DMZ4321

LINK 100LINK 100LINK 100 LINK 100 LINK 100 LINK 100 LINK 100

WAN1WAN2PWR STATUS

1234

USBWAN2WAN1DMZ

DC+12V

InternalModem Console

Back Power

Connection

RJ-45 Serial

Connection

USB WAN2 DMZ Front WAN1

Completing the Configuration

7

Congratulations!

Documentation CD-ROM.

Visit these links for more information and documentation for your Fortine t product.

Technical Documentation - m

m

Fortinet Technical Support - m

NAT/Route Mode

____.____.____.____ ____.____.____.____ ____.____.____.____ ____.____.____.____ ____.____.____.____ ____.____.____.____

DMZ____.____.____.____

____.____.____.____quotesdbs_dbs21.pdfusesText_27