diagrams or illustrations may be reproduced, transmitted, or translated in any form or by any means,
electronic, mechanical, manual, optical or otherwise, for any purpose, without prior written permission of
Fortinet, Inc.
Trademarks
Dynamic Threat Prevention System (DTPS), APSecure, FortiASIC, FortiBIOS, FortiBridge, FortiClient,
FortiGate®, FortiGate Unified Threat Management System, FortiGuard®, FortiGuard-Antispam,
FortiGuard-Antivirus, FortiGuard-Intrusion, FortiGuard-Web, FortiLog, FortiAnalyzer, FortiManager,
Fortinet®, FortiOS, FortiPartner, FortiProtect, FortiReporter, FortiResponse, FortiShield , Fo rtiVoIP, and
FortiWiFi are trademarks of Fortinet, Inc. in the United States and/or other countries. The names of actual
companies and products mentioned herein may be the trademarks of their respective owners.
Regulatory compliance
FCC Class A/Class B Part 15 CSA/CUS
Caution: Risk of Explosion if Battery is replaced by an Incorrect Type. Dispose of Used Batteries According
to the Instructions
Version 4.0 MR2 Rack and Hardware Install Guide
05-420-126194-20100608i
http://docs.fortinet.com/ • Feedback
Contents
Version 4.0 MR2 Rack and Hardware Install Guide
ii05-420-126194-20100608
http://docs.fortinet.com/ • Feedback
Introduction
Welcome and thank you for selecting Fortinet products for your network protection.
Fortinet
network misuse and abuse, and help you use communications resources more efficiently
without compromising the performance of your network. Fortinet systems are ICSAcertified for Antivirus, Firewall, IPSec, SSL- TLS, IPS, Intrusion detection, an d AntiS pyware
services.
Fortinet systems are dedicated, easily managed security devices that deliver a full suite of
capabilities including:
•Application-level services such as virus protection, intrusion protection, spam filtering,
•Network-level services such as firewall, intrusion detection, IPSec and SSL VPN, and
•Management services such as user authentication, logging, reporting with
The Fortinet security system uses Fortinet’s Dynamic Threat Prevention System
(DTPS™) technology, which leverages breakthroughs in chip design, networking, security
and content analysis. The unique ASIC-accelerated architecture analyzes content and
behavior in real-time, enabling key applications to be deployed right at the network edge
where they are most effective at protecting your networks.
This chapter contains the following topics:
•Registering your Fortinet product
•Customer service and technical support
•Fortinet documentation
•Conventions
®
ASIC-accelerated multi-threat security systems improve network security, reduce
web content filtering, IM, P2P, and VoIP filtering
traffic shaping
FortiAnalyzer, administration profiles, secure web and CLI administrative access, and
SNMP.
Registering your Fortinet product
Before you begin, take a moment to registe r your Fortinet product at the Fortinet Technical
Support web site, https://support.fortinet.com.
Many Fortinet customer services, such as firmware updates, technical support, and
FortiGuard Antivirus and other FortiGuard services, require product registration.
For more information, see the Fortinet Knowledge Center article Registration Frequently
Asked Questions.
Customer service and technical support
Fortinet Technical Support provides services designed to make sure that your Fortinet
products install quickly, configure easily, and operate reliably in your network.
To learn about the technical support services that Fortinet provides, visit the Fortinet
Technical Support web site at https://support.fortinet.com.
FortiAnalyzer-4000B Version 4.0 MR2 Rack and Hardware Install Guide
05-420-126194-201006081
http://docs.fortinet.com/ • Feedback
Fortinet documentationIntroduction
You can dramatically improve the time that it takes to resolve your technical support ticket
by providing your configuration file, a network diagram, and other spec ific information. For
a list of required information, see the Fortinet Knowledge Center article Wh at doe s
Fortinet Technical Support require in order to best assist the customer?
Fortinet documentation
The Fortinet Technical Documentation web site, http://docs.fortinet.com, provides the
most up-to-date versions of Fortinet publications, as well as additional technical
documentation such as technical notes.
In addition to the Fortinet Technical Documentation web site, you can find Fortinet
technical documentation on the Fortin et Tools and Documentation CD, and on the Fortinet
Knowledge Center.
Fortinet Tools and Documentation CD
Many Fortinet publications are available on the Fortinet Tools and Documentation CD
shipped with your Fortinet product. The documents on this CD are current at shipping
time. For current versions of Fortinet documentation, visit the F ortin et Technical
Documentation web site, http://docs.fortinet.com.
Fortinet Knowledge Center
Comments on Fortinet technical documentation
Conventions
IP addresses
CLI constraints
The Fortinet Knowledge Center provides additional Fortinet technical documentation,
such as troubleshooting and how-to-articles, examples, FAQs, technical notes, a glossar y,
and more. Visit the Fortinet Knowledge Center at http://kb.fortinet.com.
Please send information about any errors or omissions in this or any Fortinet technica l
document to techdoc@fortinet.com.
Fortinet technical documentation uses the conventions described below.
To avoid publication of public IP addresses that belong to Fortinet or any other
organization, the IP addresses used in Fortinet technical documentation are fictional and
follow the documentation guidelines specific to Fortinet. The addresses used ar e from the
private IP address ranges defined in RFC 1918: Address Allocation for Private Internets,
available at http://ietf.org/rfc/rfc1918.txt?number-1918.
CLI constraints, such as <address_ipv4>, indicate which data types or string patterns
are acceptable input for a given parameter or variable value. CLI constraint conventions
are described in the CLI Reference document for each product.
Notes, Tips and Cautions
Fortinet technical documentation uses the following guidance and styles for notes, tips
and cautions.
FortiAnalyzer-4000B Version 4.0 MR2 Rack and Hardware Install Guide
205-420-126194-20100608
http://docs.fortinet.com/ • Feedback
Introduction Conventions
Tip: Highl ights useful additional information, often tailored to your workplace activity.
Note: Also presents useful information, but usually focused on an alternative, optional
method, such as a shortcut, to perform a step.
Caution: Warns you about commands or procedures that could have unexpected or
undesirable results including loss of data or damage to equipment.
Typographical conventions
Fortinet documentation uses the following typographical conventions:
Table 1: Typographical conventions in Fortinet technical documentation
ConventionExample
Button, menu, text box,
field, or check box label
CLI inputconfig system dns
CLI outputFGT-602803030703 # get system settings
EmphasisHTTP connections are not secure and can be intercepted by
File content<HTML><HEAD><TITLE>Firewall
HyperlinkVisit the Fortinet Technical Support web site,
Keyboard entryType a name for the remote VPN peer or client, such as
NavigationGo to VPN > IPSEC > Auto Key (IKE).
PublicationFor details, see the
From Minimum log level, select Notification.
set primary <address_ipv4>
end
comments : (null)
opmode : nat
a third party.
Authentication</TITLE></HEAD>
<BODY><H4>You must authenticate to use this
service.</H4>
https://support.fortinet.com.
Central_Office_1.
FortiGate Administration Guide.
FortiAnalyzer-4000B Version 4.0 MR2 Rack and Hardware Install Guide
05-420-126194-201006083
http://docs.fortinet.com/ • Feedback
Loading...
+ 15 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.