No part of this publication including text, examples, diagrams or illustrations may be reproduced,
transmitted, or translated in any form or by any means, electronic, mechanical, manual, optical or
otherwise, for any purpose, without prior written permission of Fortinet Inc.
FortiGate-1000 Installation Guide
Version 2.80 MR4
30 August 2004
01-28004-0025-20040830
Trademarks
Products mentioned in this document are trademarks or registered trademarks of their respective
holders.
Regulatory Compliance
FCC Class A Part 15 CSA/CUS
CAUTION: RISK OF EXPLOSION IF BATTERY IS REPLACED BY AN INCORRECT TYPE.
DISPOSE OF USED BATTERIES ACCORDING TO THE INSTRUCTIONS.
For technical support, please visit http://www.fortinet.com.
Send information about errors or omissions in this document or any Fortinet technical documentation to
techdoc@fortinet.com.
Preparing to configure Transparent mode ........................................................................ 37
Using the web-based manager ......................................................................................... 38
Reconnecting to the web-based manager .................................................................... 39
Using the front control buttons and LCD........................................................................... 39
Using the command line interface..................................................................................... 40
Using the setup wizard...................................................................................................... 42
Reconnecting to the web-based manager .................................................................... 42
Connecting the FortiGate unit to your network ................................................................. 42
Next steps ......................................................................................................................... 44
High availability installation................................................................................ 47
Priorities of heartbeat device and monitor priorities...................................................... 47
Configuring FortiGate units for HA operation.................................................................... 47
High availability configuration settings .......................................................................... 47
Configuring FortiGate units for HA using the web-based manager .............................. 49
Configuring FortiGate units for HA using the CLI.......................................................... 50
Connecting the cluster to your networks........................................................................... 51
Installing and configuring the cluster................................................................................. 53
Index ...................................................................................................................... 55
4 01-28004-0025-20040830Fortinet Inc.
Introduction
FortiGate Antivirus Firewalls improve network security, reduce network misuse and
abuse, and help you use communications resources more efficiently without
compromising the performance of your network. FortiGate Antivirus Firewalls are
ICSA-certified for firewall, IPSec, and antivirus services.
The FortiGate Antivirus Firewall is a dedicated easily managed security device that
delivers a full suite of capabilities that include:
•application-level services such as virus protection and content filtering,
•network-level services such as firewall, intrusion detection, VPN, and traffic
shaping.
The FortiGate Antivirus Firewall uses Fortinet’s Accelerated Behavior and Content
Analysis System (ABACAS™) technology, which leverages breakthroughs in chip
design, networking, security, and content analysis. The unique ASIC-based
architecture analyzes content and behavior in real-time, enabling key applications to
be deployed right at the network edge where they are most effective at protecting your
networks.
The FortiGate-1000 model provides the
carrier-class levels of performance and
reliability demanded by large enterprises
and service providers. The
FortiGate-1000 uses multiple CPUs and
FortiASIC chips to deliver throughput of 2Gbps, meeting the needs of the most
demanding applications. Each FortiGate-1000 unit includes redundant power supplies
to minimize single-point failures, and also supports load-balanced operation and
redundant failover with no interruption in service. The high capacity, reliability, and
easy management of the FortiGate-1000 makes it a natural choice for managed
service offerings.
FortiGate-1000 Installation Guide Version 2.80 MR4
Secure installation, configuration, and managementIntroduction
Secure installation, configuration, and management
The FortiGate unit default configuration includes default interface IP addresses and is
only a few steps away from protecting your network. There are several ways to
configure basic FortiGate settings:
•the web-based manager,
•the front panel control buttons and LCD,
•the command line interface (CLI), or
•the setup wizard.
The CLI or the web-based manager can then be used to complete configuration and
to perform maintenance and administration.
Web-based manager
Using HTTP or a secure HTTPS connection from any computer running Internet
Explorer, you can configure and manage the FortiGate unit. The web-based manager
supports multiple languages. You can configure the FortiGate unit for HTTP and
HTTPS administration from any FortiGate interface.
You can use the web-based manager to configure most FortiGate settings. You can
also use the web-based manager to monitor the status of the FortiGate unit.
Configuration changes made using the web-based manager are effective immediately
without resetting the firewall or interrupting service. Once you are satisfied with a
configuration, you can download and save it. The saved configuration can be restored
at any time.
Figure 1: FortiGate web-based manager and setup wizard
601-28004-0025-20040830Fortinet Inc.
Introduction Document conventions
Command line interface
You can access the FortiGate command line interface (CLI) by connecting a
management computer serial port to the FortiGate RS-232 serial console connector.
You can also use Telnet or a secure SSH connection to connect to the CLI from any
network that is connected to the FortiGate unit, including the Internet.
The CLI supports the same configuration and monitoring functionality as the
web-based manager. In addition, you can use the CLI for advanced configuration
options that are not available from the web-based manager.
This Installation Guide contains information about basic and advanced CLI
commands. For a more complete description about connecting to and using the
FortiGate CLI, see the FortiGate CLI Reference Guide.
Setup wizard
The FortiGate setup wizard provides an easy way to configure the basic initial settings
for the FortiGate unit. The wizard walks through the configuration of a new
administrator password, FortiGate interfaces, DHCP server settings, internal servers
(web, FTP, etc.), and basic antivirus settings.
Document conventions
This guide uses the following conventions to describe command syntax.
•Angle brackets < > to indicate variables.
For example:
execute restore config <filename_str>
You enter:
execute restore config myfile.bak
<xxx_str> indicates an ASCII string that does not contain new-lines or carriage
returns.
<xxx_integer> indicates an integer string that is a decimal (base 10) number.
<xxx_octet> indicates a hexadecimal string that uses the digits 0-9 and letters
A-F.
<xxx_ipv4> indicates a dotted decimal IPv4 address.
<xxx_v4mask> indicates a dotted decimal IPv4 netmask.
<xxx_ipv4mask> indicates a dotted decimal IPv4 address followed by a dotted
decimal IPv4 netmask.
<xxx_ipv6> indicates a dotted decimal IPv6 address.
<xxx_v6mask> indicates a dotted decimal IPv6 netmask.
<xxx_ipv6mask> indicates a dotted decimal IPv6 address followed by a dotted
•Vertical bar and curly brackets {|} to separate alternative, mutually exclusive
required keywords.
For example:
set opmode {nat | transparent}
You can enter set opmode nat or set opmode transparent.
•Square brackets [ ] to indicate that a keyword or variable is optional.
For example:
show system interface [<name_str>]
To show the settings for all interfaces, you can enter show system interface.
To show the settings for the internal interface, you can enter show system interface internal.
•A space to separate options that can be entered in any combination and must be
separated by spaces.
For example:
set allowaccess {ping https ssh snmp http telnet}
You can enter any of the following:
set allowaccess ping
set allowaccess ping https ssh
set allowaccess https ping ssh
set allowaccess snmp
In most cases to make changes to lists that contain options separated by spaces,
you need to retype the whole list including all the options you want to apply and
excluding all the options you want to remove.
801-28004-0025-20040830Fortinet Inc.
Introduction Fortinet documentation
Fortinet documentation
Information about FortiGate products is available from the following FortiGate User
Manual volumes:
•FortiGate QuickStart Guide
Each QuickStart Guide provides the basic information required to connect and
install a FortiGate model.
•FortiGate Installation Guide
Each Installation Guide provides detailed information required to install a FortiGate
model. Includes hardware reference, default configuration, installation procedures,
connection procedures, and basic configuration procedures.
•FortiGate Administration Guide
Each Administration Guide describes how to configure a FortiGate model.
Configuration information includes how to use FortiGate firewall policies to control
traffic flow through the FortiGate unit and how to configure VPN, IPS, antivirus,
web filtering, spam filtering. The administration guide also describes how to use
protection profiles to apply intrusion prevention, antivirus protection, web content
filtering, and spam filtering to traffic passing through the FortiGate unit.
•FortiGate CLI Reference Guide
Describes how to use the FortiGate CLI and contains a reference to all FortiGate
CLI commands.
•FortiGate Log Message Reference Guide
Describes the structure of FortiGate log messages and provides information on all
log messages generated by the FortiGate unit.
•FortiGate High Availability Guide
Contains in-depth information about FortiGate High Availability and the FortiGate
Clustering Protocol (FGCP).
The FortiGate online help also contains procedures for using the FortiGate web-based
manager to configure and manage the FortiGate unit. For a complete list of FortiGate
documentation visit Fortinet Technical Support at http://support.fortinet.com.
Comments on Fortinet technical documentation
You can send information about errors or omissions in this document, or any Fortinet
technical documentation, to techdoc@fortinet.com.
Customer service and technical supportIntroduction
Customer service and technical support
For antivirus and attack definition updates, firmware updates, updated product
documentation, technical support information, and other resources, please visit the
Fortinet technical support web site at http://support.fortinet.com.
You can also register FortiGate Antivirus Firewalls from http://support.fortinet.com and
change your registration information at any time.
Fortinet email support is available from the following addresses:
amer_support@fortinet.com For customers in the United States, Canada, Mexico, Latin
apac_support@fortinet.com For customers in Japan, Korea, China, Hong Kong, Singapore,
eu_support@fortinet.comFor customers in the United Kingdom, Scandinavia, Mainland
America and South America.
Malaysia, all other Asian countries, and Australia.
Europe, Africa, and the Middle East.
For information on Fortinet telephone support, see http://support.fortinet.com.
When requesting technical support, please provide the following information:
•Your name
•Company name
•Location
•Email address
•Telephone number
•FortiGate unit serial number
•FortiGate model
•FortiGate FortiOS firmware version
•Detailed description of the problem
1001-28004-0025-20040830Fortinet Inc.
FortiGate-1000 Installation Guide Version 2.80 MR4
Getting started
This section describes unpacking, setting up, and powering on a FortiGate Antivirus
Firewall unit. This section includes:
The FortiGate-1000 package contains the following items:
•FortiGate-1000 Antivirus Firewall
•two orange crossover ethernet cables (Fortinet part number CC300248)
•two blue regular ethernet cables (Fortinet part number CC300249)
•one null modem cable (Fortinet part number CC300247)
•FortiGate-1000 QuickStart Guide
•power cable
•CD containing the FortiGate user documentation
•two 19-inch rack mount brackets
Figure 2: FortiGate-1000 package contents
Mounting
Ethernet Cables:
Orange - Crossover x 2
Grey - Straight-through x 2
Null-Modem Cable
(RS-232)
Power Cable
Esc
LCDControl
Buttons
Front View
Enter
Power
Light
1 2 3 4 / HA
1, 2, 3, 4/HA
Interface
INTERNAL
Internal
Interface
EXTERNAL
External
Interface
Back View
Rack-Mount Brackets
FortiGate-1000
1234 / HA
INTERNAL
EXTERNAL
Enter
RS-232 Serial
Connection
Power
Connection
Power
Switch
USER MANUAL
The FortiGate-1000 unit can be mounted in a standard 19-inch rack. It requires 2 U of
vertical space in the rack.
The FortiGate-1000 unit can also be installed as a free-standing appliance on any
stable surface.
Esc
QuickStart Guide
Copyright 2003 Fortinet Incorporated. All rights reserved.
Trademarks
Products mentioned in this document are trademarks.
Documentation
Dimensions
•16.75 x 12 x 1.75 in. (42.7 x 30.5 x 4.5 cm)
Weight
•17.5 lb. (8 kg)
1201-28004-0025-20040830Fortinet Inc.
Getting started Turning the FortiGate unit power on and off
Power requirements
•Power dissipation: 285 W (max)
•AC input voltage: 100 to 240 VAC
•AC input current: 6 A
•Frequency: 50 to 60 Hz
•The FortiGate-1000 unit may overload your supply circuit and impact your
overcurrent protection and supply wiring. Use appropriate equipment nameplate
ratings to address this concern.
•Make sure that the FortiGate-1000 unit has reliable earthing. Fortinet recommends
direct connections to the branch circuit.
Environmental specifications
•Operating temperature: 32 to 104°F (0 to 40°C)
•Storage temperature: -13 to 158°F (-25 to 70°C)
•Humidity: 5 to 95% non-condensing
•If you install the FortiGate-1000 unit in a closed or multi-unit rack assembly, the
operating ambient temperature of the rack environment may be greater than room
ambient. Make sure the operating ambient temperature does not exceed the
manufacturer's maximum rated ambient temperature.
Air flow
•For rack installation, make sure that the amount of air flow required for safe
operation of the FortiGate unit is not compromised.
•For free-standing installation, make sure that the FortiGate unit has at least 1.5 in.
(3.75 cm) of clearance on each side to allow for adequate air flow and cooling.
Mechanical loading
•For rack installation, make sure the mechanical loading of the FortiGate unit is
evenly distributed to avoid a hazardous condition.
Turning the FortiGate unit power on and off
To power on the FortiGate unit
1Make sure that the power switch on the back of the unit is turned off.
2Connect the power cables to the power connections on the back of the FortiGate unit.
Connecting to the web-based managerGetting started
3Connect the power cables to power outlets.
Connect each power cable to a different power source, if possible. If one power
source fails, the other source might still be operative.
After a few seconds, SYSTEM STARTING appears
on the LCD.
MAIN MENU appears on the LCD when the system
is running.
Table 1: FortiGate-1000 LED indicators
LEDStateDescription
PowerGreenThe FortiGate unit is powered on.
OffThe FortiGate unit is powered off.
1 to 4/HAAmberThe correct cable is in use, and the connected equipment has
Flashing
amber
GreenThe interface is connected at 100 Mbps.
OffNo link established.
Internal
External
AmberThe correct cable is in use, and the connected equipment has
Flashing
amber
GreenThe interface is connected at 1000 Mbps.
OffNo link established.
power.
Network activity at this interface.
power.
Network activity at this interface.
To power off the FortiGate unit
Always shut down the FortiGate operating system properly before turning off the
power switch.
1From the web-based manager, go to System > Maintenance > ShutDown, select
Shut Down and select Apply, or from the CLI, enter:
execute shutdown
2Turn off the power switch.
3Disconnect the power cable from the power supply.
Connecting to the web-based manager
Use the following procedure to connect to the web-based manager for the first time.
Configuration changes made with the web-based manager are effective immediately
without resetting the firewall or interrupting service.
1401-28004-0025-20040830Fortinet Inc.
Getting started Connecting to the command line interface (CLI)
To connect to the web-based manager, you need:
•a computer with an ethernet connection,
•Internet Explorer version 4.0 or higher,
•a crossover cable or an ethernet hub and two ethernet cables.
Note: You can use the web-based manager with recent versions of most popular web
browsers. The web-based manager is fully supported for Internet Explorer version 4.0 or higher.
To connect to the web-based manager
1Set the IP address of the computer with an ethernet connection to the static IP
address 192.168.1.2 with a netmask of 255.255.255.0.
2Start Internet Explorer and browse to the address https://192.168.1.99. (remember to
include the “s” in https://).
The FortiGate login is displayed.
Figure 3: FortiGate login
3Type admin in the Name field and select Login.
Connecting to the command line interface (CLI)
As an alternative to the web-based manager, you can install and configure the
FortiGate unit using the CLI. Configuration changes made with the CLI are effective
immediately without resetting the firewall or interrupting service.
To connect to the FortiGate CLI, you need:
•a computer with an available communications port,
•the null modem cable included in your FortiGate package,
•terminal emulation software such as HyperTerminal for Windows.
Note: The following procedure describes how to connect to the CLI using Windows
HyperTerminal software. You can use any terminal emulation program.
Connecting to the command line interface (CLI)Getting started
To connect to the CLI
1Connect the null modem cable to the communications port of your computer and to
the FortiGate Console port.
2Make sure that the FortiGate unit is powered on.
3Start HyperTerminal, enter a name for the connection, and select OK.
4Configure HyperTerminal to connect directly to the communications port on your
computer and select OK.
5Select the following port settings and select OK.
Bits per second 9600
Data bits8
ParityNone
Stop bits1
Flow controlNone
6Press Enter to connect to the FortiGate CLI.
The following prompt is displayed:
FortiGate-1000 login:
7Type admin and press Enter twice.
The following prompt is displayed:
Welcome !
Type ? to list available commands. For information about how to use the CLI, see the
FortiGate CLI Reference Guide.
1601-28004-0025-20040830Fortinet Inc.
Getting started Factory default FortiGate configuration settings
Factory default FortiGate configuration settings
The FortiGate unit is shipped with a factory default configuration. The default
configuration allows you to connect to and use the FortiGate web-based manager to
configure the FortiGate unit onto the network. To configure the FortiGate unit onto the
network you add an administrator password, change network interface IP addresses,
add DNS server IP addresses, and configure basic routing, if required.
If you plan to operate the FortiGate unit in Transparent mode, you can switch to
Transparent mode from the factory default configuration and then configure the
FortiGate unit onto the network in Transparent mode.
Once the network configuration is complete, you can perform additional configuration
tasks such as setting system time, configuring virus and attack definition updates, and
registering the FortiGate unit.
The factory default protection profiles can be used to apply different levels of antivirus
protection, web content filtering, spam filtering, and IPS to the network traffic that is
controlled by firewall policies.
When the FortiGate unit is first powered on, it is running in NAT/Route mode and has
the basic network configuration listed in Ta bl e 2. This configuration allows you to
connect to the FortiGate unit web-based manager and establish the configuration
required to connect the FortiGate unit to the network. In Ta b le 2 , HTTPS
administrative access means you can connect to the web-based manager using
HTTPS protocol through this interface. Ping administrative access means this
interface responds to ping requests.