USB
A2A1
CONSOLE
Front
1 to 10
Interface
LCD
Control
Buttons
Remote
Management
Modem Port
Fiber-optic
Ports A1 and A2
(FortiGate-1000AFA2 only)
Serial Port
USB (future)
Power Cable
Rack-Mount Brackets
Ethernet Cables:
Orange - Crossover
Grey - Straight-through
Documentation
FortiGate-1000A / 1000AFA2
QuickStart Guide
Copyright 2005 Fortinet Incorporated. All rights reserved.
Trademarks
Products mentioned in this document are trademarks.
RJ-45 to
DB-9 Serial Cable
x2 SFP Transceivers
(FortiGate-1000AFA2 only)
Back
Power
Supply
LEDs
Power
Connections
Alarm
Cancel
Button
USB
A2A1
CONSOLE
Straight-through Ethernet cables
connect to the Internet or
other networks
Fiber optic cable
connects
to internal network or Internet
Optional RJ-45 to DB-9 cable connects
to serial port on management computer
Power cables connect
to power outlets
USB
A2A1
CONSOLE
Connector Type Speed Protocol Description
Ports 1 to 10 RJ-45 1000Base-T Ethernet
Copper gigabit connection to 10/100/1000 copper
networks.
Ports
A1 and A2
(1000AFA2)
LC SFP 1000Base-SX Ethernet
Multimode fiber optic connections to gigabit optical
networks for small packet performance required for
voice, video and other multimedia streaming
applications.
CONSOLE RJ-45 9600 bps
RS-232
serial
Serial connection to the command line interface.
FortiGate-1000A / 1000AFA2
normal operating LED indicators
LED State Description
PWR Green The FortiGate unit is on.
Ports 1 to 10
Green
The correct cable is connected to the copper 10/100/1000
interface and the connected equipment has power.
Flashing Network activity at this interface.
Amber The interface is connected at 1000 Mbps.
Ports A1 and
A2 (1000AFA2)
Green
The correct optical fiber patch cable is connected to the
gigabit fiber interface.
Flashing Network activity at the gigabit fiber interface.
Connect the FortiGate-1000A / 1000AFA2 unit to a power outlet and to the internal and external
networks. The FortiGate-1000AFA2 is shown in the diagram.
NAT/Route mode
In NAT/Route mode, the FortiGate unit is visible to the networks that it is connected to.
All of its interfaces are on different subnets. Each interface that is connected to a
network must be configured with an IP address that is valid for that network.
You would typically use NAT/Route mode when the FortiGate unit is deployed as a
gateway between private and public networks. In its default NAT/Route mode
configuration, the unit functions as a firewall. Firewall policies control communications
through the FortiGate unit. No traffic can pass through the FortiGate unit until you add
firewall policies.
In NAT/Route mode, firewall policies can operate in NAT mode or in Route mode. In
NAT mode, the FortiGate unit performs network address translation before IP packets
are sent to the destination network. In route mode, no translation takes place.
Transparent mode
In Transparent mode, the FortiGate unit is invisible to the network. All of its interfaces
are on the same subnet. You only have to configure a management IP address so that
you can make configuration changes.
You would typically use the FortiGate unit in Transparent mode on a private network
behind an existing firewall or behind a router. In its default Transparent mode
configuration, the unit functions as a firewall. No traffic can pass through the FortiGate
unit until you add firewall policies.
You can connect up to eight network segments to the FortiGate unit to control traffic
between these network segments.
FortiGate-1000A Unit
in NAT/Route mode
Route mode policies
controlling traffic between
internal networks.
Internal network
DMZ network
Port 3
192.168.1.99
Port 4
10.10.10.1
192.168.1.3
10.10.10.2
Port 1
204.23.1.5
NAT mode policies controlling
traffic between internal and
external networks.
Internet
Internal network
10.10.10.3
FortiGate-1000A Unit
in Transparent mode
10.10.10.1
Management IP
10.10.10.2
Transparent mode policies
controlling traffic between
internal and external networks
204.23.1.5
(firewall, router)
Gateway to
public network
Internet
Before beginning to configure the FortiGate-1000A or FortiGate-1000AFA2, you need to plan how
to integrate the unit into your network. Your configuration plan is dependent upon the operating
mode that you select: NAT/Route mode (the default) or Transparent mode.
Web-based manager and
Setup Wizard
Using the Setup Wizard you can configure basic
configuration settings by stepping through the
wizard pages and filling in the information required.
The FortiGate web-based manager is an easy to
use management tool.
Use it to configure the administrator password,
interface addresses, the default gateway address,
and the DNS server addresses. To configure advanced settings, see the online help
and Documentation CD-ROM.
Requirements:
• An Ethernet connection between the FortiGate unit and a management computer.
• Internet Explorer version 6.0 or higher on the management computer.
Command Line Interface (CLI)
The CLI is a full-featured management tool.
Use it to configure the administrator password, the
interface addresses, the default gateway address,
and the DNS server addresses. To configure
advanced settings, see the FortiGate CLI
Reference Guide on the Documentation CD-ROM.
Requirements:
• The serial connection between the FortiGate
unit and a management computer.
• A terminal emulation application (HyperTerminal for Windows) on the management
computer.
Choose between two different tools to configure the FortiGate unit.
QuickStart Guide
FortiGate-1000A / 1000AFA2
Check that the package contents are complete. FortiGate-1000AFA2 shown.
• Mount the unit in a standard 19-inch rack. It requires 2 U of vertical space in the
rack.
• Make sure the power is not connected or off before connecting the power and
network cables.
• MAIN MENU appears when the unit is up and running.
If only one power supply is connected, an audible alarm sounds to indicate a failed
power supply. To stop this alarm, press the red alarm cancel button.
Checking the package contents
Checking the package contents
1
Connecting the FortiGate unit
2
Planning the configuration
3
Choosing a configuration tool
4
© Copyright 2005 Fortinet Incorporated. All rights reserved.
Trademarks
Products mentioned in this document are trademarks or registered trademarks of their respective holders.
Regulatory Compliance
FCC Class A Part 15 CSA/CUS
16 November 2005
For technical support please visit http://www.fortinet.com.
01-28011-0258-20051116
Refer to the Documentation CD-ROM for information on how to control traffic, and how to configure HA, antivirus protection, Web content filtering, Spam filtering, intrusion
prevention (IPS), and virtual private networking (VPN).