No part of this publication including text, examples, diagrams or illustrations may be reproduced,
transmitted, or translated in any form or by any means, electronic, mechanical, manual, optical or
otherwise, for any purpose, without prior written permission of Fortinet Inc.
FortiGate-400 Installation and Configuration Guide
Version 2.50 MR2
18 August 2003
Trademarks
Products mentioned in this document are trademarks or registered trademarks of their respective
holders.
Regulatory Compliance
FCC Class A Part 15 CSA/CUS
CAUTION: RISK OF EXPLOSION IF BATTERY IS REPLACED BY AN INCORRECT TYPE.
DISPOSE OF USED BATTERIES ACCORDING TO THE INSTRUCTIONS.
For technical support, please visit http://www.fortinet.com.
Send information about errors or omissions in this document or any Fortinet technical documentation to
Index .................................................................................................................... 299
Contents
FortiGate-400 Installation and Configuration Guide13
Contents
14 Fortinet Inc.
FortiGate-400 Installation and Configuration Guide Version 2.50 MR2
Introduction
The FortiGate Antivirus Firewall supports network-based deployment of
application-level services—including antivirus protection and full-scan content filtering.
FortiGate Antivirus Firewalls improve network security, reduce network misuse and
abuse, and help you use communications resources more efficiently without
compromising the performance of your network. FortiGate Antivirus Firewalls are
ICSA-certified for firewall, IPSec and antivirus services.
Your FortiGate Antivirus Firewall is a dedicated easily managed security device that
delivers a full suite of capabilities that include:
•application-level services such as virus protection and content filtering,
•network-level services such as firewall, intrusion detection, VPN, and traffic
shaping.
Your FortiGate Antivirus Firewall employs Fortinet’s Accelerated Behavior and
Content Analysis System (ABACAS™) technology, which leverages breakthroughs in
chip design, networking, security, and content analysis. The unique ASIC-based
architecture analyzes content and behavior in real-time, enabling key applications to
be deployed right at the network edge where they are most effective at protecting your
networks. The FortiGate series complements existing solutions, such as host-based
antivirus protection, and enables new applications and services while greatly lowering
costs for equipment, administration and maintenance.
The FortiGate-400 model meets
enterprise-class requirements for
performance, availability, and reliability.
With throughput up to 500Mbps and
high-availability features including
automatic failover with no session loss, the FortiGate-400 is the choice for mission
critical applications.
Antivirus protection
FortiGate ICSA-certified antivirus protection virus scans web (HTTP), file transfer
(FTP), and email (SMTP, POP3, and IMAP) content as it passes through the
FortiGate. If a virus is found, antivirus protection removes the file containing the virus
from the content stream and forwards an replacement message to the intended
recipient.
FortiGate-400 Installation and Configuration Guide 15
Web content filteringIntroduction
For extra protection, you also configure antivirus protection to block files of specified
file types from passing through the FortiGate unit. You can use the feature to stop files
that may contain new viruses.
If the FortiGate unit contains a hard disk, infected or blocked files can be quarantined.
The FortiGate administrator can download quarantined files, so that they can be virus
scanned, cleaned, and forwarded to the intended recipient. You can also configure the
FortiGate unit to automatically delete quarantined files after a specified time period.
The FortiGate unit can send email alerts to system administrators when it detects and
removes a virus from a content stream. The web and email content can be in normal
network traffic or in encrypted IPSec VPN traffic.
ICSA Labs has certified that FortiGate Antivirus Firewalls:
•detect 100% of the viruses listed in the current In The Wild List (www.wildlist.org),
•detect viruses in compressed files using the PKZip format,
•detect viruses in e-mail that has been encoded using uuencode format,
•detect viruses in e-mail that has been encoded using MIME encoding,
•log all actions taken while scanning.
Web content filtering
FortiGate web content filtering can be configured to scan all HTTP content protocol
streams for URLs or for web page content. If a match is found between a URL on the
URL block list, or if a web page is found to contain a word or phrase in the content
block list, the FortiGate blocks the web page. The blocked web page is replaced with a
message that you can edit using the FortiGate web-based manager.
You can configure URL blocking to block all or just some of the pages on a web site.
Using this feature you can deny access to parts of a web site without denying access
to it completely.
To prevent unintentional blocking of legitimate web pages, you can add URLs to an
Exempt List that overrides the URL blocking and content blocking lists.
Web content filtering also includes a script filter feature that can be configured to block
unsecure web content such as Java Applets, Cookies, and ActiveX.
You can also use the Cerberian URL blocking to block unwanted URLs.
Email filtering
FortiGate Email filtering can be configured to scan all IMAP and POP3 email content
for unwanted senders or for unwanted content. If a match is found between a sender
address pattern on the Email block list, or if an email is found to contain a word or
phrase in the banned word list, the FortiGate adds a Email tag to subject line of the
email. Receivers can then use their mail client software to filter messages based on
the Email tag.
16Fortinet Inc.
Introduction Firewall
You can configure Email blocking to tag email from all or some senders within
organizations that are known to send spam email. To prevent unintentional tagging of
email from legitimate senders, you can add sender address patterns to an exempt list
that overrides the email block and banned word lists.
Firewall
The FortiGate ICSA-certified firewall protects your computer networks from the hostile
environment of the Internet. ICSA has granted FortiGate firewalls version 4.0 firewall
certification, providing assurance that FortiGate firewalls successfully screen for and
secure corporate networks against a wide range of threats from public or other
untrusted networks.
After basic installation of the FortiGate unit, the firewall allows users on the protected
network to access the Internet while blocking Internet access to internal networks. You
can modify this firewall configuration to place controls on access to the Internet from
the protected networks and to allow controlled access to internal networks.
FortiGate policies include a complete range of options that:
•control all incoming and outgoing network traffic,
•control encrypted VPN traffic,
•apply antivirus protection and web content filtering,
•block or allow access for all policy options,
•control when individual policies are in effect,
•accept or deny traffic to and from individual addresses,
•control standard and user defined network services individually or in groups,
•require users to authenticate before gaining access,
•include traffic shaping to set access priorities and guarantee or limit bandwidth for
each policy,
•include logging to track connections for individual policies,
•include Network address translation (NAT) mode and Route mode policies,
•include Mixed NAT and Route mode policies.
The FortiGate firewall can operate in NAT/Route mode or Transparent mode.
NAT/Route mode
In NAT/Route mode, you can create NAT mode policies and Route mode policies.
•NAT mode policies use network address translation to hide the addresses in a
more secure zone from users in a less secure zone.
•Route mode policies accept or deny connections between zones without
performing address translation.
FortiGate-400 Installation and Configuration Guide 17
VLANIntroduction
Transparent mode
Transparent mode provides the same basic firewall protection as NAT mode. Packets
received by the FortiGate unit are intelligently forwarded or blocked according to
firewall policies. The FortiGate unit can be inserted in your network at any point
without the need to make changes to your network or any of its components.
However, VPN, VLAN, multi-zone functionality, and some advanced firewall features
are only available in NAT/Route mode.
VLAN
Fortigate Antivirus Firewalls support IEEE 802.1Q-compliant virtual LAN (VLAN) tags.
Using VLAN technology a single FortiGate unit can provide security services to, and
control connections between multiple security domains according to the VLAN IDs
added to VLAN packets. The FortiGate unit can recognize VLAN IDs and apply
security policies to secure network and IPSec VPN traffic between each security
domain. It can also apply authentication, content filtering, and antivirus protection to
VLAN-tagged network and VPN traffic.
Network intrusion detection
The FortiGate Network Intrusion Detection System (NIDS) is a real-time network
intrusion detection sensor that detects and prevents a wide variety of suspicious
network activity. NIDS detection uses attack signatures to identify over 1000 attacks.
You can enable and disable the attacks that the NIDS detects. You can also write your
own user-defined detection attack signatures.
NIDS prevention detects and prevents many common denial of service and packetbased attacks. You can enable and disable prevention attack signatures and
customize attack signature thresholds and other parameters.
To notify system administrators of the attack, the NIDS records the attack and any
suspicious traffic to the attack log and can be configured to send alert emails.
Fortinet updates NIDS attack definitions periodically. You can download and install
updated attack definitions manually, or you can configure the FortiGate to
automatically check for and download attack definition updates.
18Fortinet Inc.
Introduction VPN
VPN
Using FortiGate virtual private networking (VPN), you can provide a secure
connection between widely separated office networks or securely link telecommuters
or travellers to an office network.
FortiGate VPN features include the following:
•Industry standard and ICSA-certified IPSec VPN including:
•IPSec, ESP security in tunnel mode,
•DES, 3DES (triple-DES), and AES hardware accelerated encryption,
•HMAC MD5 and HMAC SHA1 authentication and data integrity,
•AutoIKE key based on pre-shared key tunnels,
•IPSec VPN using local or CA certificates,
•Manual Keys tunnels,
•Diffie-Hellman groups 1, 2, and 5,
•Aggressive and Main Mode,
•Replay Detection,
•Perfect Forward Secrecy,
•XAuth authentication,
•Dead peer detection.
•PPTP for easy connectivity with the VPN standard supported by the most popular
operating systems.
•L2TP for easy connectivity with a more secure VPN standard also supported by
many popular operating systems.
•Firewall policy based control of IPSec VPN traffic.
•IPSec NAT traversal so that remote IPSec VPN gateways or clients behind a NAT
can connect to an IPSec VPN tunnel.
•VPN hub and spoke using a VPN concentrator to allow VPN traffic to pass from
one tunnel to another tunnel through the FortiGate unit.
•IPSec Redundancy to create a redundant AutoIKE key IPSec VPN connection to a
remote network.
High availability
High Availability (HA) provides fail-over between two or more FortiGate units. Fortinet
achieves HA through the use of redundant hardware: matching FortiGate models
running in NAT/Route mode. You can configure the FortiGate units for either
active-passive (A-P) or active-active (A-A) HA.
Both A-P and A-A HA use similar redundant high availability hardware configurations.
High availability software guarantees that if one of the FortiGate units in the HA group
fails, all functions, established firewall connections, and IPSec VPN sessions are
maintained.
FortiGate-400 Installation and Configuration Guide 19
Secure installation, configuration, and managementIntroduction
Secure installation, configuration, and management
Installation is quick and simple. The first time you turn on the FortiGate unit, it is
already configured with default IP addresses and security policies. Connect to the
web-based manager, set the operating mode, and use the setup wizard to customize
FortiGate IP addresses for your network, and the FortiGate unit is set to protect your
network. You can then use the web-based manager to customize advanced FortiGate
features to meet your needs.
You can also create a basic configuration using the FortiGate front panel control
buttons and LCD.
Web-based manager
Using HTTP or a secure HTTPS connection from any computer running Internet
Explorer, you can configure and manage the FortiGate unit. The web-based manager
supports multiple languages. You can configure the FortiGate unit for HTTP and
HTTPs administration from any FortiGate interface.
You can use the web-based manager for most FortiGate configuration settings. You
can also use the web-based manager to monitor the status of the FortiGate unit.
Configuration changes made with the web-based manager are effective immediately
without the need to reset the firewall or interrupt service. Once a satisfactory
configuration has been established, it can be downloaded and saved. The saved
configuration can be restored at any time.
Figure 1: The FortiGate web-based manager and setup wizard
20Fortinet Inc.
Introduction Secure installation, configuration, and management
Command line interface
You can access the FortiGate command line interface (CLI) by connecting a
management computer serial port to the FortiGate RS-232 serial Console connector.
You can also use Telnet or a secure SSH connection to connect to the CLI from any
network connected to the FortiGate, including the Internet.
The CLI supports the same configuration and monitoring functionality as the
web-based manager. In addition, you can use the CLI for advanced configuration
options not available from the web-based manager. This Installation and Configuration Guide contains information about basic and advanced CLI commands.
You can find a more complete description of connecting to and using the FortiGate CLI
in the FortiGate CLI Reference Guide.
Logging and reporting
The FortiGate supports logging of various categories of traffic and of configuration
changes. You can configure logging to:
•report traffic that connects to the firewall,
•report network services used,
•report traffic permitted by firewall policies,
•report traffic that was denied by firewall policies,
•report events such as configuration changes and other management events, IPSec
tunnel negotiation, virus detection, attacks, and web page blocking,
•report attacks detected by the NIDS,
•send alert email to system administrators to report virus incidents, intrusions, and
firewall or VPN events or violations.
Logs can be sent to a remote syslog server or to a WebTrends NetIQ Security
Reporting Center and Firewall Suite server using the WebTrends enhanced log
format. Some models can also save logs to an optional internal hard drive. If a hard
drive is not installed, you can configure most FortiGates to log the most recent events
and attacks detected by the NIDS to shared system memory.
FortiGate-400 Installation and Configuration Guide 21
What’s new in Version 2.50Introduction
What’s new in Version 2.50
This section presents a brief summary of some of the new features in FortiOS v2.50:
System administration
•Improved graphical FortiGate system health monitoring that includes CPU and
memory usage, session number and network bandwidth usage, and the number of
viruses and intrusions detected. See “System status” on page 110.
•Revised antivirus and attack definition update functionality that connects to a new
version of the FortiResponse Distribution network. Updates can now be scheduled
hourly and the System > Update page displays more information about the current
update status. See “Updating antivirus and attack definitions” on page 115.
•Direct connection to the Fortinet tech support web page from the web-based
manager. You can register your FortiGate unit and get access to other technical
support resources. See “Registering FortiGate units” on page 125.
Network configuration
•Changes have been made to how zones are added and used. See “Configuring
zones” on page 133.
•Changes have been made to how VLANs are added and used. See “Configuring
VLANs” on page 139.
•New interface configuration options. See “Configuring interfaces” on page 135.
•Ping server and dead gateway detection for all interfaces.
•HTTP and Telnet administrative access to any interface.
•Secondary IP addresses for all FortiGate interfaces.
•Reserve IP/MAC pair combinations for DHCP servers (CLI only).
Routing Information Protocol (RIP)
•New RIP v1 and v2 functionality. See “RIP configuration” on page 149.
SNMP
•SNMP v1 and v2 support.
•Support for RFC 1213 and RFC 2665
•Monitoring of all FortiGate configuration and functionality
•See “Configuring SNMP” on page 162
22Fortinet Inc.
Introduction What’s new in Version 2.50
HA
•Active-active HA using switches and with the ability to select the schedule
•Transparent mode HA
•A/V update for HA clusters
•Configuration synchronizing for HA
See “High availability” on page 75.
Replacement messages
You can customize messages sent by the FortiGate unit:
•When a virus is detected,
•When a file is blocked,
•When a fragmented email is blocked
•When an alert email is sent
See “Customizing replacement messages” on page 164.
Firewall
•The firewall default configuration has changed. See “Default firewall configuration”
on page 170.
•Add virtual IPs to all interfaces. See “Virtual IPs” on page 188.
•Add content profiles to firewall policies to configure blocking, scanning, quarantine,
web content blocking, and email filtering. See “Content profiles” on page 197.
Users and authentication
•LDAP authentication. See “Configuring LDAP support” on page 205.
VPN
See the FortiGate VPN Guide for a complete description of FortiGate VPN
functionality. New features include:
•Phase 1
•AES encryption
•Certificates
•Advanced options including Dialup Group, Peer, XAUTH, NAT Traversal, DPD
•Phase 2
•AES encryption
•Encryption policies select service
•Generate and import local certificates
•Import CA certificates
FortiGate-400 Installation and Configuration Guide 23
What’s new in Version 2.50Introduction
NIDS
See the FortiGate NIDS Guide for a complete description of FortiGate NIDS
functionality. New features include:
•Attack detection signature groups
•User-configuration attack prevention
•Monitor multiple interfaces for attacks
•Monitor VLAN subinterfaces for attacks
•User-defined attack detection signatures
Antivirus
See the FortiGate Content Protection Guide for a complete description of FortiGate
antivirus functionality. New features include:
•Content profiles
•Quarantine for files containing viruses or files that are blocked
•Blocking oversized files
Web Filter
See the FortiGate Content Protection Guide for a complete description of FortiGate
web filtering functionality. New features include:
•Cerberian URL Filtering
Email filter
See the FortiGate Content Protection Guide for a complete description of FortiGate
email filtering functionality.
Logging and Reporting
See the FortiGate Logging and Message Reference Guide for a complete description
of FortiGate logging.
•Log to remote host CSV format
•Log message levels: Emergency, Alert, critical, error, Warning, notification,
information
•Log level policies
•Traffic log filter
•New antivirus, web filter, and email filter logs
•Alert email supports authentication
•Suppress email flooding
•Extended WebTrends support for graphing activity
24Fortinet Inc.
Introduction About this document
About this document
This installation and configuration guide describes how to install and configure the
FortiGate-400. This document contains the following information:
•Getting started describes unpacking, mounting, and powering on the FortiGate.
•NAT/Route mode installation describes how to install the FortiGate if you are
planning on running it in NAT/Route mode.
•Transparent mode installation describes how to install the FortiGate if you are
planning on running it in Transparent mode.
•High availability describes how to install and configure the FortiGate in a high
availability configuration.
•System status describes how to view the current status of your FortiGate unit and
related status procedures including installing updated FortiGate firmware, backing
up and restoring system settings, and switching between Transparent and
NAT/Route mode.
•Virus and attack definitions updates and registration describes configuring
automatic virus and attack definition updates. This chapter also contains
procedures for connecting to the FortiGate tech support webs site and for
registering your FortiGate unit.
•Network configuration describes configuring interfaces, zones, and VLANs and
configuring routing.
•RIP configuration describes the FortiGate RIP2 implementation and how to
configure RIP settings.
•System configuration describes system administration tasks available from the
System > Config web-based manager pages. This chapter describes setting
system time, adding and changed administrative users, configuring SNMP, and
editing replacement messages.
•Firewall configuration describes how to configure firewall policies to control traffic
through the FortiGate unit and apply content protection profiles to content traffic.
•Users and authentication describes how to add user names to the FortiGate user
database and how to configure the FortiGate to connect to a RADIUS server to
authenticate users.
•IPSec VPN describes how to configure FortiGate IPSec VPN.
•PPTP and L2TP VPN describes how to configure PPTP and L2TP VPNs between
the FortiGate and a windows client.
•Network Intrusion Detection System (NIDS) describes how to configure the
FortiGate NIDS to detect and prevent network attacks.
•Antivirus protection describes how use the FortiGate to protect your network from
viruses and worms.
•Web filtering describes how to configure web content filtering to prevent unwanted
Web content from passing through the FortiGate.
•Email filter describes how to configure email filtering to screen unwanted email
content.
•Logging and reporting describes how to configure logging and alert email to track
activity through the FortiGate.
•The Glossary defines many of the terms used in this document.
FortiGate-400 Installation and Configuration Guide 25
Document conventionsIntroduction
Document conventions
This guide uses the following conventions to describe CLI command syntax.
•angle brackets < > to indicate variable keywords
For example:
execute restore config <filename_str>
You enter restore config myfile.bak
<xxx_str> indicates an ASCII string variable keyword.
<xxx_integer> indicates an integer variable keyword.
<xxx_ip> indicates an IP address variable keyword.
•vertical bar and curly brackets {|} to separate alternative, mutually exclusive
required keywords
For example:
set system opmode {nat | transparent}
You can enter set system opmode nat or set system opmode
transparent
•square brackets [ ] to indicate that a keyword is optional
For example:
get firewall ipmacbinding [dhcpipmac]
You can enter get firewall ipmacbinding or
get firewall ipmacbinding dhcpipmac
26Fortinet Inc.
Introduction Fortinet documentation
Fortinet documentation
Information about FortiGate products is available from the following FortiGate User
Manual volumes:
•Volume 1: FortiGate Installation and Configuration Guide
Describes installation and basic configuration for the FortiGate unit. Also describes
how to use FortiGate firewall policies to control traffic flow through the FortiGate
unit and how to use firewall policies to apply antivirus protection, web content
filtering, and email filtering to HTTP, FTP and email content passing through the
FortiGate unit.
•Volume 2: FortiGate VPN Guide
Contains in-depth information about FortiGate IPSec VPN using certificates, preshared keys and manual keys for encryption. Also contains basic configuration
information for the Fortinet Remote VPN Client, detailed configuration information
for FortiGate PPTP and L2TP VPN, and VPN configuration examples.
•Volume 3: FortiGate Content Protection Guide
Describes how to configure antivirus protection, web content filtering, and email
filtering to protect content as it passes through the FortiGate unit.
•Volume 4: FortiGate NIDS Guide
Describes how to configure the FortiGate NIDS to detect and protect the FortiGate
unit from network-based attacks.
•Volume 5: FortiGate Logging and Message Reference Guide
Describes how to configure FortiGate logging and alert email. Also contains the
FortiGate log message reference.
•Volume 6: FortiGate CLI Reference Guide
Describes the FortiGate CLI and contains a reference to all FortiGate CLI
commands.
The FortiGate online help also contains procedures for using the FortiGate web-based
manager to configure and manage your FortiGate unit.
Comments on Fortinet technical documentation
You can send information about errors or omissions in this document or any Fortinet
technical documentation to techdoc@fortinet.com.
FortiGate-400 Installation and Configuration Guide 27
Customer service and technical supportIntroduction
Customer service and technical support
For antivirus and attack definition updates, firmware updates, updated product
documentation, technical support information, and other resources, please visit the
Fortinet technical support web site at http://support.fortinet.com.
You can also register FortiGate Antivirus Firewalls from http://support.fortinet.com and
modify your registration information at any time.
Fortinet email support is available from the following addresses:
amer_support@fortinet.com For customers in the United States, Canada, Mexico, Latin
apac_support@fortinet.com For customers in Japan, Korea, China, Hong Kong, Singapore,
eu_support@fortinet.comFor customers in the United Kingdom, Scandinavia, Mainland
For information on Fortinet telephone support, see http://support.fortinet.com.
When requesting technical support, please provide the following information:
•Your name
•Company name
•Location
•Email address
•Telephone number
•FortiGate unit serial number
•FortiGate model
•FortiGate FortiOS firmware version
•Detailed description of the problem
America and South America.
Malaysia, all other Asian countries, and Australia.
Europe, Africa, and the Middle East.
28Fortinet Inc.
FortiGate-400 Installation and Configuration Guide Version 2.50 MR2
Getting started
This chapter describes unpacking, setting up, and powering on your FortiGate
Antivirus Firewall. When you have completed the procedures in this chapter, you can
proceed to one of the following:
•If you are going to operate the FortiGate unit in NAT/Route mode, go to
“NAT/Route mode installation” on page 45.
•If you are going to operate the FortiGate unit in Transparent mode, go to
“Transparent mode installation” on page 61.
•If you are going to operate two or more FortiGate units in HA mode, go to “High
availability” on page 75.
This chapter describes:
•Package contents
•Mounting
•Powering on
•Connecting to the web-based manager
•Connecting to the command line interface (CLI)
•Factory default FortiGate configuration settings
•Planning your FortiGate configuration
•FortiGate model maximum values matrix
•Next steps
FortiGate-400 Installation and Configuration Guide 29
Package contentsGetting started
Package contents
The FortiGate-400 package contains the following items:
•FortiGate-400 Antivirus Firewall
•one orange crossover ethernet cable
•one gray regular ethernet cable
•one null modem cable
•FortiGate-400 QuickStart Guide
•one power cable
•CD containing the FortiGate user documentation
•two 19-inch rack mount brackets
Figure 2: FortiGate-400 package contents
Ethernet Cables:
Orange - Crossover
Grey - Straight-through
Null-Modem Cable
(RS-232)
EscEnter
Front
1
CONSOLE
4 / HA3
2
Mounting
LCDControl
Buttons
RS-232 Serial
Connection
Interface
1, 2, 3, 4/HA
Power
Light
Power Cable
Back
Rack-Mount Brackets
FortiGate-400
4 / HA3
1
CONSOLE
2
Esc Enter
QuickStart Guide
Copyright 2003 Fortinet Incorporated. All rights reserved.
Trademarks
Products mentioned in this document are trademarks.
Documentation
Removable
Hard Drive
Power
Switch
Power
Connection
USER MANUAL
The FortiGate-400 unit can be mounted in a standard 19-inch rack. It requires 1 U of
vertical space in the rack.
The FortiGate-400 unit can also be installed as a free-standing appliance on any
stable surface. For free-standing installation, make sure that the appliance has at least
1.5 in. (3.75 cm) of clearance on each side to allow for adequate air flow and cooling.
Dimensions
•16.75 x 12 x 1.75 in. 42.7 x 30.5 x 4.5 cm
Weight
•11 lb. (5 kg)
30Fortinet Inc.
Getting started Powering on
Power requirements
•Power dissipation: 180 W (max)
•AC input voltage: 100 to 240 VAC
•AC input current: 4 A
•Frequency: 47 to 63 Hz
Environmental specifications
•Operating temperature: 32 to 104°F (0 to 40°C)
•Storage temperature: -13 to 158°F (-25 to 70°C)
•Humidity: 5 to 95% non-condensing
Powering on
To power on the FortiGate-400 unit:
1Make sure that the power switch on the back is turned off.
2Connect the power cable to the power connection on the back of the FortiGate unit.
3Connect the power cable to a power outlet.
4Turn on the power switch.
After a few seconds, SYSTEM STARTING appears
on the LCD.
MAIN MENU appears on the LCD when the system
is up and running.
Table 1: FortiGate-400 LED indicators
LEDStateDescription
PowerGreenThe FortiGate unit is powered on.
OffThe FortiGate unit is powered off.
1
2
3
4/HA
AmberThe correct cable is in use, and the connected equipment has
Flashing
amber
GreenThe interface is connected at 100 Mbps.
OffNo link established.
power.
Network activity at this interface.
FortiGate-400 Installation and Configuration Guide 31
Connecting to the web-based managerGetting started
Connecting to the web-based manager
Use the following procedure to connect to the web-based manager for the first time.
Configuration changes made with the web-based manager are effective immediately
without the need to reset the firewall or interrupt service.
To connect to the web-based manager, you need:
•a computer with an ethernet connection,
•Internet Explorer version 4.0 or higher,
•a crossover cable or an ethernet hub and two ethernet cables.
Note: You can use the web-based manager with recent versions of most popular web browsers.
The web-based manager is fully supported for Internet Explorer version 4.0 or higher.
Connecting to the web-based manager
1Set the IP address of the computer with an ethernet connection to the static IP
address 192.168.1.2 and a netmask of 255.255.255.0.
2Using the crossover cable or the ethernet hub and cables, connect interface 1 of the
FortiGate unit to the computer ethernet connection.
3Start Internet Explorer and browse to the address https://192.168.1.99 (remember to
include the “s” in https://).
The FortiGate login is displayed.
4Type admin in the Name field and select Login.
The Register Now window is displayed. Use the information on this window to register
your FortiGate unit so that Fortinet can contact you for firmware updates. You must
also register to receive updates to the FortiGate virus and attack definitions.
Figure 3: FortiGate login
32Fortinet Inc.
Getting started Connecting to the command line interface (CLI)
Connecting to the command line interface (CLI)
As an alternative to the web-based manager, you can install and configure the
FortiGate unit using the CLI. Configuration changes made with the CLI are effective
immediately without the need to reset the firewall or interrupt service.
To connect to the FortiGate CLI, you need:
•a computer with an available communications port,
•the null modem cable included in your FortiGate package,
•terminal emulation software such as HyperTerminal for Windows.
Note: The following procedure describes how to connect to the CLI using Windows
HyperTerminal software. You can use any terminal emulation program.
To connect to the CLI:
1Connect the null modem cable to the communications port of your computer and to
the FortiGate Console port.
2Make sure that the FortiGate unit is powered on.
3Start HyperTerminal, enter a name for the connection, and select OK.
4Configure HyperTerminal to connect directly to the communications port on the
computer to which you have connected the null modem cable and select OK.
5Select the following port settings and select OK.
Bits per second 9600
Data bits8
ParityNone
Stop bits1
Flow controlNone
6Press Enter to connect to the FortiGate CLI.
The following prompt appears:
FortiGate-400 login:
7Type admin and press Enter twice.
The following prompt appears:
Type ? for a list of commands.
For information on how to use the CLI, see the FortiGate CLI Reference Guide.
Factory default FortiGate configuration settings
The FortiGate unit is shipped with a factory default configuration. This default
configuration allows you to connect to and use the FortiGate web-based manager to
configure the FortiGate unit onto your network. To configure the FortiGate unit onto
your network you add an administrator password, change network interface IP
addresses, add DNS server IP addresses, and configuring routing if required.
FortiGate-400 Installation and Configuration Guide 33
Factory default FortiGate configuration settingsGetting started
If you are planning on operating the FortiGate unit in Transparent mode, you can
switch to transparent mode from the factory default configuration and then configure
the FortiGate unit onto your network in Transparent mode.
Once the network configuration is complete, you can perform additional configuration
tasks such as setting system time, configuring virus and attack definition updates, and
registering the FortiGate unit.
The factory default firewall configuration includes a single network address translation
(NAT) policy that allows users on your internal network to connect to the external
network, and stops users on the external network from connecting to the internal
network. You can add more policies to provide more control of the network traffic
passing through the FortiGate unit.
The factory default content profiles can be used to quickly apply different levels of
antivirus protection, web content filtering, and email filtering to the network traffic
controlled by firewall policies.
When the FortiGate unit is first powered on, it is running in NAT/Route mode and has
the basic network configuration listed in Ta bl e 2. This configuration allows you to
connect to the FortiGate unit web-based manager and establish the configuration
required to connect the FortiGate unit to your network. In Table 2 HTTPS
management access means you can connect to the web-based manager using this
interface. Ping management access means this interface responds to ping requests.
ActionACCEPTThe policy action. ACCEPT means that the policy
; NATNAT is selected for the NAT/Route mode default
Traffic ShapingTraffic shaping is not selected. The policy does not
AuthenticationAuthentication is not selected. Users do not have to
Antivirus & Web FilterAntivirus & Web Filter is not selected. This policy
Log TrafficLog Traffic is not selected. This policy does not
allows connections.
policy so that the policy applies network address
translation to the traffic processed by the policy.
NAT is not available for Transparent mode policies.
apply traffic shaping to the traffic controlled by the
policy. You can select this option to control the
maximum or minimum amount of bandwidth
available to traffic processed by the policy.
authenticate with the firewall before connecting to
their destination address. You can configure user
groups and select this option to require users to
authenticate with the firewall before they can
connect through the firewall.
does not include a content profile that applies
antivirus protection, web content filtering, or email
filtering to content traffic processed by this policy.
You can select this option and select a content
profile to apply different levels of content protection
to traffic processed by this policy.
record messages to the traffic log for the traffic
processed by this policy. You can configure
FortiGate logging and select Log Traffic to record all
connections through the firewall that are accepted
by this policy.
Factory default content profiles
You can use content profiles to apply different protection settings for content traffic
controlled by firewall policies. You can use content profiles for:
•Antivirus protection of HTTP, FTP, IMAP, POP3, and SMTP network traffic
•Web content filtering for HTTP network traffic
•Email filtering for IMAP and POP3 network traffic
•Oversized file and email blocking for HTTP, FTP, POP3, SMTP, and IMAP network
traffic
•Passing fragmented emails in IMAP, POP3, and SMTP email traffic
Using content profiles you can build up protection configurations that can be easily
applied to different types of Firewall policies. This allows you to customize different
types and different levels of protection for different firewall policies.
For example, while traffic between internal and external addresses might need strict
protection, traffic between trusted internal addresses might need moderate protection.
You can configure policies for different traffic services to use the same or different
content profiles.
Content profiles can be added to NAT/Route mode and Transparent mode policies.
36Fortinet Inc.
Getting started Factory default FortiGate configuration settings
Strict content profile
Use the strict content profile to apply maximum content protection to HTTP, FTP,
IMAP, POP3, and SMTP content traffic. You would not use the strict content profile
under normal circumstances, but it is available if you are having extreme problems
with viruses and require maximum content screening protection.
Use the scan content profile to apply antivirus scanning to HTTP, FTP, IMAP, POP3,
and SMTP content traffic. Quarantine is also selected for all content services. On
FortiGate models with a hard drive, if antivirus scanning finds a virus in a file, the file is
quarantined on the FortiGate hard disk. If required, system administrators can recover
quarantined files.
Table 6: Scan content profile
OptionsHTTPFTPIMAPPOP3SMTP
Antivirus Scan;;;;;
File Block
Quarantine;;;;;
Web URL Block
Web Content Block
Web Script Filter
Web Exempt List
Email Block List
Email Exempt List
Email Content Block
Oversized File/Email Blockpasspasspasspasspass
Pass Fragmented Emails
FortiGate-400 Installation and Configuration Guide 37
Factory default FortiGate configuration settingsGetting started
Web content profile
Use the web content profile to apply antivirus scanning and Web content blocking to
HTTP content traffic. You can add this content profile to firewall policies that control
HTTP traffic.
Table 7: Web content profile
OptionsHTTPFTPIMAPPOP3SMTP
Antivirus Scan;
File Block
Quarantine;
Web URL Block;
Web Content Block;
Web Script Filter
Web Exempt List
Email Block List
Email Exempt List
Email Content Block
Oversized File/Email Blockpasspasspasspasspass
Pass Fragmented Emails
Unfiltered content profile
Use the unfiltered content profile if you do not want to apply any content protection to
content traffic. You can add this content profile to firewall policies for connections
between highly trusted or highly secure networks where content does not need to be
protected.
Table 8: Unfiltered content profile
OptionsHTTPFTPIMAPPOP3SMTP
Antivirus Scan
File Block
Quarantine
Web URL Block
Web Content Block
Web Script Filter
Web Exempt List;
Email Block List
Email Exempt List;;
Email Content Block
Oversized File/Email Blockpasspasspasspasspass
Pass Fragmented Emails;;;
38Fortinet Inc.
Getting started Planning your FortiGate configuration
Planning your FortiGate configuration
Before beginning to configure the FortiGate unit, you need to plan how to integrate the
unit into your network. Among other things, you have to decide whether or not the unit
will be visible to the network, which firewall functions it will provide, and how it will
control the traffic flowing between its interfaces.
Your configuration plan is dependent upon the operating mode that you select. The
FortiGate unit can be configured in either of two modes: NAT/Route mode (the default)
or Transparent mode.
NAT/Route mode
In NAT/Route mode, the unit is visible to the network. Like a router, all of its interfaces
are on different subnets. The following interfaces are available in NAT/Route mode:
•Interfaces 1, 2, 3, and 4/HA can be connected to any networks. By default, the
FortiGate-400 interfaces have the following configuration
•Interface 1 is the default interface to the internal network (usually the Internet).
•Interface 2 is the default interface to the external network.
•Interface 3 can be connected to another network such as a DMZ network.
•Interface 4/HA can be connected to another network. Interface 4/HA can also
be connected to other FortiGate-400s if you are installing an HA cluster.
You can add security policies to control whether communications through the
FortiGate unit operate in NAT mode or in route mode. Security policies control the flow
of traffic based on each packet’s source address, destination address and service. In
NAT mode, the FortiGate performs network address translation before the packet is
sent to the destination network. In route mode, no translation takes place.
By default, the FortiGate unit has a NAT mode security policy that allows users on the
internal network to securely download content from the external network. No other
traffic is possible until you have configured more security policies.
You would typically use NAT/Route mode when the FortiGate unit is used as a
gateway between private and public networks. In this configuration, you would create
NAT mode policies to control traffic flowing between the internal, private network and
the external, public network (usually the Internet).
If you have multiple internal networks, such as a DMZ network in addition to the
internal, private network, you could create route mode policies for traffic flowing
between them.
FortiGate-400 Installation and Configuration Guide 39
Planning your FortiGate configurationGetting started
Figure 4: Example NAT/Route mode network configuration
NAT/Route mode with multiple external network connections
In NAT/Route mode, you can configure the FortiGate unit with multiple redundant
connections to the external network (usually the Internet). For example, you could
create the following configuration:
•Interface 1 is the interface to the internal network.
•Interface 2 is the default interface to the external network (usually the Internet).
•Interface 3 is the interface to the DMZ network.
•Interface 4/HA is the redundant interface to the external network.
You must configure routing to support redundant internet connections. Routing can be
used to automatically re-direct connections from an interface if its connection to the
external network fails.
Otherwise, security policy configuration is similar to a NAT/Route mode configuration
with a single Internet connection. You would create NAT mode policies to control traffic
flowing between the internal, private network and the external, public network (usually
the Internet).
If you have multiple internal networks, such as a DMZ network in addition to the
internal, private network, you could create route mode policies for traffic flowing
between them.
Figure 5: Example NAT/Route multiple internet connection configuration
40Fortinet Inc.
Getting started Planning your FortiGate configuration
Transparent mode
In Transparent mode, the FortiGate unit is invisible to the network. Similar to a
network bridge, all of FortiGate interfaces must be on the same subnet. You only have
to configure a management IP address so that you can make configuration changes.
The management IP address is also used for antivirus and attack definition updates.
You would typically use the FortiGate unit in Transparent mode on a private network
behind an existing firewall or behind a router. The FortiGate unit performs firewalling
as well as antivirus and content scanning but not VPN.
Figure 6: Example Transparent mode network configuration
You can connect up to four network segments to the FortiGate unit to control traffic
between these network segments.
•Interface 1 can connect to the internal firewall or router.
•Interface 2 can connect to the external network.
•Interface 3 can connect to another network.
•Interface 4/HA connect to another network. Interface 4/HA can also connect to
other FortiGate-400s if you are installing an HA cluster.
Configuration options
Once you have selected Transparent or NAT/Route mode operation, you can
complete your configuration plan, and begin configuring the FortiGate unit.
You can use the web-based manager setup wizard, the control buttons and LCD, or
the command line interface (CLI) for the basic configuration of the FortiGate unit.
Setup Wizard
If you are configuring the FortiGate unit to operate in NAT/Route mode (the default),
the Setup Wizard prompts you to add the administration password and the internal
and external interface addresses. Using the wizard, you can also add DNS server IP
addresses and a default route for the external interface.
In NAT/Route mode you can also configure the FortiGate to allow Internet access to
your internal Web, FTP, or email servers.
If you are configuring the FortiGate unit to operate in Transparent mode, you can
switch to Transparent mode from the web-based manager and then use the Setup
Wizard to add the administration password, the management IP address and
gateway, and the DNS server addresses.
FortiGate-400 Installation and Configuration Guide 41
FortiGate model maximum values matrixGetting started
CLI
If you are configuring the FortiGate unit to operate in NAT/Route mode, you can add
the administration password and all interface addresses. Using the CLI, you can also
add DNS server IP addresses and a default route for the external interface.
If you are configuring the FortiGate unit to operate in Transparent mode, you can use
the CLI to switch to Transparent mode, Then you can add the administration
password, the management IP address and gateway, and the DNS server addresses.
Front keypad and LCD
If you are configuring the FortiGate unit to operate in NAT/Route mode, you can use
the control buttons and LCD to add the IP address of the FortiGate interfaces as well
as the external default gateway.
If you are configuring the FortiGate unit to operate in Transparent mode, you can use
the control buttons and LCD to switch to Transparent mode. Then you can add the
management IP address and default gateway.
URL blockno limit no limit no limit no limit no limit no limit no limit no limit no limit no limit no limit
Content blockno limit no limit no limit no limit no limit no limit no limit no limit no limit no limit no limit
Exempt URLno limit no limit no limit no limit no limit no limit no limit no limit no limit no limit no limit
Next steps
Now that your FortiGate unit is operating, you can proceed to configure it to connect to
networks:
•If you are going to operate the FortiGate unit in NAT/Route mode, go to
“NAT/Route mode installation” on page 45.
•If you are going to operate the FortiGate unit in Transparent mode, go to
“Transparent mode installation” on page 61.
•If you are going to operate two or more FortiGate units in HA mode, go to “High
availability” on page 75.
FortiGate-400 Installation and Configuration Guide 43
Next stepsGetting started
44Fortinet Inc.
FortiGate-400 Installation and Configuration Guide Version 2.50 MR2
NAT/Route mode installation
This chapter describes how to install your FortiGate unit in NAT/Route mode. To install
your FortiGate unit in Transparent mode, see “Transparent mode installation” on
page 61. To install two or more FortiGate units in HA mode, see “High availability” on
page 75.
This chapter describes:
•Preparing to configure NAT/Route mode
•Using the setup wizard
•Using the front control buttons and LCD
•Using the command line interface
•Completing the configuration
•Connecting the FortiGate unit to your networks
•Configuring your network
•Completing the configuration
•Configuration example: Multiple connections to the Internet
Preparing to configure NAT/Route mode
Use Tab le 10 to gather the information that you need to customize NAT/Route mode
settings.
Table 10: NAT/Route mode settings
Administrator Password:
Interface 1
Interface 2
Interface 3
(optionally connect
to a DMZ network)
FortiGate-400 Installation and Configuration Guide 45
IP:_____._____._____._____
Netmask:_____._____._____._____
IP:_____._____._____._____
Netmask:_____._____._____._____
Default Gateway:_____._____._____._____
Primary DNS Server:_____._____._____._____
Secondary DNS Server:_____._____._____._____
IP:_____._____._____._____
Netmask:_____._____._____._____
Using the setup wizardNAT/Route mode installation
Table 10: NAT/Route mode settings (Continued)
Interface 4/HA
Internal servers
Using the setup wizard
From the web-based manager, you can use the setup wizard to create the initial
configuration of your FortiGate unit. To connect to the web-based manager, see
If you provide access from the Internet to a web server, mail server,
IMAP server, or FTP server installed on an internal network, add the IP
addresses of the servers here.
1Select Easy Setup Wizard (the middle button in the upper-right corner of the
web-based manager).
2Use the information that you gathered in Table 10 on page 45 to fill in the wizard fields.
Select the Next button to step through the wizard pages.
3Confirm your configuration settings and then select Finish and Close.
Note: If you use the setup wizard to configure internal server settings, the FortiGate unit adds
port forwarding virtual IPs and firewall policies for each server. For each server located in your
Internal zone the FortiGate unit adds an External->Internal policy. For each server located in
your DMZ zone, the FortiGate unit adds an External->DMZ policy.
Reconnecting to the web-based manager
If you changed the IP address of interface 1 while you were using the setup wizard,
you must reconnect to the web-based manager using a new IP address. Browse to
https:// followed by the new IP address of interface 1. Otherwise, you can reconnect to
the web-based manager by browsing to https://192.168.1.99.
You have now completed the initial configuration of your FortiGate unit, and can
proceed to “Completing the configuration” on page 50.
46Fortinet Inc.
NAT/Route mode installation Using the front control buttons and LCD
Using the front control buttons and LCD
As an alternative to the setup wizard, use the information that you recorded in
Table 10 on page 45 to complete the following procedure. Starting with Main Menu
displayed on the LCD, use the front control buttons and LCD:
1Press Enter three times to configure the PORT1 IP
address.
2Set the PORT1 IP address.
Use the up and down arrow keys to increase or decrease the value of each IP address
digit. Press Enter to move to the next digit. Press Esc to move to the previous digit.
Note: When you enter an IP address, the LCD display always shows three digits for each part
of the address. For example, the IP address 192.168.100.1 appears on the LCD display as
192.168.100.001. The IP address 192.168.23.45 appears as 192.168.023.045.
3When you have set the last digit of the IP address, press Enter.
4Use the down arrow to highlight Netmask.
5Press Enter and set the internal Netmask.
6When you have set the last digit of the Netmask, press Enter.
7Press Esc to return to the Main Menu.
8Repeat these steps to configure PORT2, the PORT2 default gateway, PORT3, and
PORT4/HA if required.
You have now completed the basic configuration of your FortiGate unit, and you can
proceed to “Completing the configuration” on page 50.
Using the command line interface
As an alternative to using the setup wizard, you can configure the FortiGate unit using
the command line interface (CLI). To connect to the CLI, see “Connecting to the
command line interface (CLI)” on page 33.
Configuring the FortiGate unit to operate in NAT/Route mode
Use the information that you gathered in Table 10 on page 45 to complete the
following procedures.
Configuring NAT/Route mode IP addresses
1Log into the CLI if you are not already logged in.
2Set the IP address and netmask of interface 1 to the internal IP address and netmask
that you recorded in Table 10 on page 45. Enter:
set system interface port1 mode static ip <IP_address>
<netmask>
Example
set system interface port1 mode static ip 192.168.1.1
255.255.255.0
FortiGate-400 Installation and Configuration Guide 47
Using the command line interfaceNAT/Route mode installation
3Set the IP address and netmask of interface 2 to the external IP address and netmask
that you recorded in Table 10 on page 45.
set system interface port2 mode static ip <IP_address>
<netmask>
Example
set system interface port2 mode
255.255.255.0
4Set the IP address and netmask of interface 3 or 4 to the IP addresses and netmasks
that you recorded in Table 10 on page 45.
set system interface <interface_name> mode static ip
<IP_address> <netmask>
Example
To set the IP address of interface 3 to 192.45.56.73 and netmask to 255.255.255.0,
enter
set system interface port3 mode
255.255.255.0
5Confirm that the addresses are correct. Enter:
get system interface
The CLI lists the IP address, netmask and other settings for each of the FortiGate
interfaces.
6Set the primary DNS server IP addresses. Enter
set system dns primary <IP address>
Example
set system dns primary 293.44.75.21
7Optionally, set the secondary DNS server IP addresses. Enter
set system dns secondary <IP address>
Example
set system dns secondary 293.44.75.22
static
static
ip 204.23.1.5
ip 192.45.56.73
8Set the default route to the Default Gateway IP address.
set system route number <route_no> dst 0.0.0.0 0.0.0.0 gw1
<gateway_ip>
Example
set system route number 0 dst 0.0.0.0 0.0.0.0 gw1 204.23.1.2
48Fortinet Inc.
NAT/Route mode installation Connecting the FortiGate unit to your networks
Connecting the FortiGate unit to your networks
When you have completed the initial configuration, you can connect the FortiGate unit
between your internal network and the Internet.
The FortiGate-400 has four 10/100Base-TX connectors that can be connected to up
to four different networks. You can connect them in any configuration. When you first
power on the FortiGate-400, the interfaces and zones are configured for the following
connections:
•interface 1 to connect to your internal network,
•interface 2 to connect to your public switch or router and the Internet,
•interface 3 to connect to a DMZ network,
•interface 4/HA to connect to another FortiGate-400 for high availability (see “High
availability” on page 75) or to connect to a fourth network.
Note: You can also create redundant connections to the internet by connecting two interfaces
to separate Internet connections. For example, you could connect interface 2 and 3 to different
Internet connections, each provided by a different service provider. See “Configuration
example: Multiple connections to the Internet” on page 52.
To connect the FortiGate unit running in NAT/Route mode:
1Connect interface 1 to the hub or switch connected to your internal network.
2Connect interface 2 to the public switch or router provided by your Internet Service
Provider.
3Optionally connect interface 3 to your DMZ network.
You can use a DMZ network to provide access from the Internet to a web server or
other server without installing the servers on your internal network.
4Optionally connect the 4/HA interface to a fourth network (not shown in Figure 7).
FortiGate-400 Installation and Configuration Guide 49
Configuring your networkNAT/Route mode installation
If you are running the FortiGate unit in NAT/Route mode, your networks must be
configured to route all Internet traffic to the IP address of the FortiGate interface to
which they are connected.
Completing the configuration
Use the information in this section to complete the initial configuration of the FortiGate
unit.
Configuring interface 3
Use the following procedure to configure interface 3 to connect to a network:
1Log into the web-based manager.
2Go to System > Network > Interface.
3Choose port3 and select Modify .
4Change the IP address and Netmask as required.
5Select Apply.
50Fortinet Inc.
NAT/Route mode installation Completing the configuration
Configuring interface 4/HA
Use the following procedure to configure interface 4/HA to connect to a network:
1Log into the web-based manager.
2Go to System > Network > Interface.
3Choose port4/ha and select Modify .
4Make sure that Work as HA is not selected.
5Change the IP address and Netmask as required.
6Select Apply.
Setting the date and time
For effective scheduling and logging, the FortiGate system date and time should be
accurate. You can either manually set the system date and time or you can configure
the FortiGate unit to automatically keep its time correct by synchronizing with a
Network Time Protocol (NTP) server.
To set the FortiGate system date and time, see “Setting system date and time” on
page 157.
Enabling antivirus protection
To enable antivirus protection to protect users on your internal network from
downloading a virus from the Internet:
1Go to Firewall > Policy > port1->port2.
2Select Edit to edit this policy.
3Select Anti-Virus & Web filter to enable antivirus protection for this policy.
4Select the Scan Content Profile.
5Select OK to save your changes.
Registering your FortiGate unit
After purchasing and installing a new FortiGate unit, you can register the unit by going
to System > Update > Support, or using a web browser to connect to
http://support.fortinet.com and selecting Product Registration.
Registration consists of entering your contact information and the serial numbers of
the FortiGate units you or your organization have purchased. Registration is quick and
easy. You can register multiple FortiGate units in a single session without re-entering
your contact information. For more information about registration, see “Registering
FortiGate units” on page 125.
FortiGate-400 Installation and Configuration Guide 51
Configuration example: Multiple connections to the InternetNAT/Route mode installation
Configuring virus and attack definition updates
You can go to System > Update to configure the FortiGate unit to automatically check
to see if new versions of the virus definitions and attack definitions are available. If it
finds new versions, the FortiGate unit automatically downloads and installs the
updated definitions.
The FortiGate unit uses HTTPS on port 8890 to check for updates. FortiGate interface
2 must have a path to the FortiResponse Distribution Network (FDN) using port 8890.
To configure automatic virus and attack updates, see “Updating antivirus and attack
definitions” on page 115.
Configuration example: Multiple connections to the Internet
This section describes some basic routing and firewall policy configuration examples
for a FortiGate unit with multiple connections to the Internet (see Figure 8). In this
topology, the organization operating the FortiGate unit uses two Internet service
providers to connect to the Internet. The FortiGate unit is connected to the Internet
using port 2 and port 3. Port 1 connects to gateway 1, operated by ISP1 and port 2
connects to gateway 2, operated by ISP2.
By adding ping servers to interfaces, and by configuring routing you can control how
traffic uses each Internet connection. With this routing configuration is place you can
proceed to create firewall policies to support multiple internet connections.
This section provides some examples of routing and firewall configurations to
configure the FortiGate unit for multiple internet connections. To use the information in
this section you should be familiar with FortiGate routing (see “Configuring routing” on
page 138) and FortiGate firewall configuration (see “Firewall configuration” on
page 169).
The examples below show how to configure destination-based routing and policy
routing to control different traffic patterns.
•Configuring Ping servers
•Destination based routing examples
•Policy routing examples
•Firewall policy example
52Fortinet Inc.
NAT/Route mode installation Configuration example: Multiple connections to the Internet
Figure 8: Example multiple Internet connection configuration
Configuring Ping servers
Use the following procedure to make Gateway 1 the ping server for port2 and
Gateway 2 the ping server for port3.
1Go to System > Network > Interface.
2For port2, select Modify .
•Ping Server: 1.1.1.1
•Select Enable Ping Server
•Select OK
3For port3, select Modify .
•Ping Server: 2.2.2.1
•Select Enable Ping Server
•Select OK
FortiGate-400 Installation and Configuration Guide 53
Configuration example: Multiple connections to the InternetNAT/Route mode installation
Using the CLI
1Add a ping server to port2.
set system interface port2 config detectserver 1.1.1.1 gwdetect
enable
2Add a ping server to port3.
set system interface port3 config detectserver 2.2.2.1 gwdetect
enable
Destination based routing examples
This section describes the following destination-based routing examples:
•Primary and backup links to the Internet
•Load sharing
•Load sharing and primary and secondary connections
Primary and backup links to the Internet
Use the following procedure to add a default destination-based route that directs all
outgoing traffic to Gateway 1. If Gateway 1 fails, all connections are re-directed to
Gateway 2. Gateway 1 is the primary link to the Internet and Gateway 2 is the backup
link.
1Go to System > Network > Routing Table.
2Select New.
•Destination IP: 0.0.0.0
•Mask: 0.0.0.0
•Gateway #1: 1.1.1.1
•Gateway #2: 2.2.2.1
•Device #1: port2
•Device #2: port3
•Select OK.
Using the CLI
1Add the route to the routing table.
set system route number 0 dst 0.0.0.0 0.0.0.0 gw1 1.1.1.1
dev1 port2 gw2 2.2.2.1 dev2 dmz
Table 11: Route for primary and backup links
Destination IP MaskGateway #1Device #1Gateway #2Device #2
0.0.0.00.0.0.01.1.1.1port22.2.2.1port3
54Fortinet Inc.
NAT/Route mode installation Configuration example: Multiple connections to the Internet
Load sharing
You can also configure destination routing to direct traffic through both gateways at
the same time. If users on your internal network connect to the networks of ISP1 and
ISP2, you can add routes for each of these destinations. Each route can include a
backup destination to the network of the other ISP.
The first route directs all traffic destined for the 100.100.100.0 network out port2 to
gateway 1 with the IP address 1.1.1.1. If this router is down, traffic destined for the
100.100.100.0 network is re-directed out port3 to gateway 2 with the IP address
2.2.2.1.
Load sharing and primary and secondary connections
You can combine these routes into a more complete multiple internet connection
configuration. In the topology shown in Figure 8 on page 53, users on the internal
network would connect to the Internet to access web pages and other Internet
resources. However, they may also connect to services, such as email, provided by
their ISPs. You can combine the routes described in the previous examples to provide
users with a primary and backup connection to the Internet, while at the same time
routing traffic to each ISP network as required.
The routing described below allows a user on the internal network to connect to the
Internet through gateway 1 and ISP1. At the same time, this user can also connect
through to gateway 2 to access a mail server maintained by ISP2.
Adding the routes using the web-based manager
1Go to System > Network > Routing Table.
2Select New to add the default route for primary and backup links to the Internet.
•Destination IP: 0.0.0.0
•Mask: 0.0.0.0
•Gateway #1: 1.1.1.1
•Gateway #2: 2.2.2.1
•Device #1: port2
•Device #2: port3
•Select OK.
FortiGate-400 Installation and Configuration Guide 55
Configuration example: Multiple connections to the InternetNAT/Route mode installation
3Select New to add a route for connections to the network of ISP1.
•Destination IP: 100.100.100.0
•Mask: 255.255.255.0
•Gateway #1: 1.1.1.1
•Gateway #2: 2.2.2.1
•Device #1: port2
•Device #2: port3
4Select New to add a route for connections to the network of ISP2.
•Destination IP: 200.200.200.0
•Mask: 255.255.255.0
•Gateway #1: 2.2.2.1
•Gateway #2: 1.1.1.1
•Device #1: port3
•Device #2: port2
•Select OK.
5Change the order of the routes in the routing table to move the default route below the
other two routes.
•For the default route select Move to .
•Type a number in the Move to field to move this route to the bottom of the list.
If there are only 3 routes, type 3.
•Select OK.
Adding the routes using the CLI
1Add the route for connections to the network of ISP2.
set system route number 1 dst 100.100.100.0 255.255.255.0 gw1
1.1.1.1 dev1 port2 gw2 2.2.2.1 dev2 port3
1Add the route for connections to the network of ISP1.
set system route number 2 dst 200.200.200.0 255.255.255.0 gw1
2.2.2.1 dev1 port3 gw2 1.1.1.1 dev2 port2
2Add the default route for primary and backup links to the Internet.
set system route number 3 dst 0.0.0.0 0.0.0.0 gw1 1.1.1.1
dev1 port2 gw2 2.2.2.1 dev2 port3
The routing table should have routes arranged as shown in Tab le 1 3.
NAT/Route mode installation Configuration example: Multiple connections to the Internet
Policy routing examples
Policy routing can be added to increase the control you have over how packets are
routed. Policy routing works on top of destination-based routing. This means you
should configure destination-based routing first and then build policy routing on top to
increase the control provided by destination-based routing.
For example, if you have used destination-based routing to configure routing for dual
internet connections, you can use policy routing to apply more control to which traffic
is sent to which destination route. This section describes the following policy routing
examples, based on topology similar to that shown in Figure 8 on page 53.
Differences are noted in each example.
The policy routes described in these examples only work if you have already defined
destination routes similar to those described in the previous section.
•Routing traffic from internal subnets to different external networks
•Routing a service to an external network
For more information about policy routing, see “Policy routing” on page 146.
Routing traffic from internal subnets to different external networks
If the FortiGate provides internet access for multiple internal subnets, you can use
policy routing to control the route that traffic from each network takes to the Internet.
For example, if the internal network includes the subnets 192.168.10.0 and
192.168.20.0 you can enter the following policy routes:
1Enter the following command to route traffic from the 192.168.10.0 subnet to the
100.100.100.0 external network:
set system route policy 1 src 192.168.10.0 255.255.255.0 dst
100.100.100.0 255.255.255.0 gw 1.1.1.1
2Enter the following command to route traffic from the 192.168.20.0 subnet to the
200.200.200.0 external network:
set system route policy 2 src 192.168.20.0 255.255.255.0 dst
200.200.200.0 255.255.255.0 gw 2.2.2.1
Routing a service to an external network
You can use the following policy routes to direct all HTTP traffic (using port 80) to one
external network and all other traffic to the other external network.
1Enter the following command to route all HTTP traffic using port 80 to the next hop
gateway with IP address 1.1.1.1.
set system route policy 1 src 0.0.0.0 0.0.0.0 dst 0.0.0.0
0.0.0.0 protocol 6 port 1 1000 gw 1.1.1.1
2Enter the following command to route all other traffic to the next hop gateway with IP
address 2.2.2.1.
Set system route policy 2 src 0.0.0.0 0.0.0.0 dst 0.0.0.0
0.0.0.0 gw 2.2.2.1
FortiGate-400 Installation and Configuration Guide 57
Configuration example: Multiple connections to the InternetNAT/Route mode installation
Firewall policy example
Firewall policies control how traffic flows through the FortiGate unit. Once routing for
multiple internet connections has been configured you must create firewall policies to
control which traffic is allowed through the FortiGate unit and the interfaces through
which this traffic can connect.
For traffic originating on the Internal network to be able to connect to the Internet
through both Internet connections, you must add redundant policies from the internal
interface to each interface that connects to the Internet. Once these policies have
been added, the routing configuration controls which internet connection is actually
used.
Adding a redundant default policy
Figure 8 on page 53 shows a FortiGate unit connected to the Internet using its port2
and port3 interfaces. The default policy allows all traffic from the port1 network to
connect to the Internet through the port2 interface. If you add a similar policy to the
port1 to port3 policy list, this policy will allow all traffic from the port1 network to
connect to the Internet through the port3 interface. With both of these policies added
to the firewall configuration, the routing configuration will determine which Internet
connection the traffic from the internal network actually uses. For more information
about the default policy, see “Default firewall configuration” on page 170.
To add a redundant default policy
1Go to Firewall > Address > port3.
2Add the following address to port3.
Address Name Port3_All
IP Address0.0.0.0
Netmask0.0.0.0
3Go to Firewall > Policy > port1->port3.
4Select New.
5Configure the policy to match the default policy.
SourcePort1_All
DestinationPort3_All
ScheduleAlways
ServiceANY
ActionAccept
NATSelect NAT.
6Select OK to save your changes.
58Fortinet Inc.
NAT/Route mode installation Configuration example: Multiple connections to the Internet
Adding more firewall policies
In most cases your firewall configuration includes more than just the default policy.
However, the basic premise of creating redundant policies applies even as the firewall
configuration becomes more complex. To configure the FortiGate unit to use multiple
Internet connections you must add duplicate policies for connections between the
internal network and both interfaces connected to the Internet. As well, as you add
redundant policies, you must arrange them in both policy lists in the same order.
Restricting access to a single Internet connection
In some cases you might want to limit some traffic to only being able to use one
Internet connection. For example, in the topology shown in Figure 8 on page 53 the
organization might want its mail server to only be able to connect to the SMTP mail
server of ISP1. To do this, you add a single port1->port2 firewall policy for SMTP
connections. Because redundant policies have not been added, SMTP traffic from the
Internet network is always connected to ISP1. If the connection to ISP1 fails the SMTP
connection is not available.
FortiGate-400 Installation and Configuration Guide 59
Configuration example: Multiple connections to the InternetNAT/Route mode installation
60Fortinet Inc.
FortiGate-400 Installation and Configuration Guide Version 2.50 MR2
Transparent mode installation
This chapter describes how to install your FortiGate unit in Transparent mode. If you
want to install the FortiGate unit in NAT/Route mode, see “NAT/Route mode
installation” on page 45. If you want to install two or more FortiGate units in HA mode,
see “High availability” on page 75.
This chapter describes:
•Preparing to configure Transparent mode
•Using the setup wizard
•Using the front control buttons and LCD
•Using the command line interface
•Completing the configuration
•Connecting the FortiGate unit to your networks
•Transparent mode configuration examples
Preparing to configure Transparent mode
Use Ta bl e 1 4 to gather the information that you need to customize Transparent mode
settings.
The management IP address and netmask must be valid for the network
from which you will manage the FortiGate unit. Add a default gateway if the
FortiGate unit must connect to a router to reach the management
computer.
DNS Settings
Default Gateway:_____._____._____._____
Primary DNS Server:_____._____._____._____
Secondary DNS Server: _____._____._____._____
FortiGate-400 Installation and Configuration Guide 61
Using the setup wizardTransparent mode installation
Using the setup wizard
From the web-based manager, you can use the setup wizard to create the initial
configuration of your FortiGate unit. To connect to the web-based manager, see
“Connecting to the web-based manager” on page 32.
Changing to Transparent mode
The first time that you connect to the FortiGate unit, it is configured to run in
NAT/Route mode. To switch to Transparent mode using the web-based manager:
1Go to System > Status.
2Select Change to Transparent Mode.
3Select Transparent in the Operation Mode list.
4Select OK.
The FortiGate unit changes to Transparent mode.
To reconnect to the web-based manager, change the IP address of your management
computer to 10.10.10.2. Connect to interface 1, 2, or 3 and browse to https:// followed
by the Transparent mode management IP address. The default FortiGate Transparent
mode Management IP address is 10.10.10.1.
Starting the setup wizard
To start the setup wizard:
1Select Easy Setup Wizard (the middle button in the upper-right corner of the
web-based manager).
2Use the information that you gathered in Table 14 on page 61 to fill in the wizard fields.
Select the Next button to step through the wizard pages.
3Confirm your configuration settings and then select Finish and Close.
Reconnecting to the web-based manager
If you changed the IP address of the management interface while you were using the
setup wizard, you must reconnect to the web-based manager using the new IP
address. Browse to https:// followed by the new IP address of the management
interface. Otherwise, you can reconnect to the web-based manager by browsing to
https://10.10.10.1. If you connect to the management interface through a router, make
sure that you have added a default gateway for that router to the management IP
default gateway field.
62Fortinet Inc.
Transparent mode installation Using the front control buttons and LCD
Using the front control buttons and LCD
This procedure describes how to use the control buttons and LCD to configure
Transparent mode IP addresses. Use the information that you recorded in Table 14 on
page 61 to complete this procedure. Starting with Main Menu displayed on the LCD,
use the front control buttons and LCD:
1Press Enter three times to configure the
management interface IP address.
2Set the manager interface IP address.
Use the up and down arrow keys to increase or decrease the value of each IP address
digit. Press Enter to move to the next digit. Press Esc to move to the previous digit.
Note: When you enter an IP address, the LCD display always shows three digits for each part
of the address. For example, the IP address 192.168.100.1 appears on the LCD display as
192.168.100.001. The IP address 192.168.23.45 appears as 192.168.023.045.
3When you have set the last digit of the IP address, press Enter.
4Use the down arrow to highlight Netmask.
5Press Enter and set the management IP Netmask.
6When you have set the last digit of the Netmask, press Enter.
7Press Esc to return to the Main Menu.
8Repeat these steps to configure the default gateway if required.
Using the command line interface
As an alternative to the setup wizard, you can configure the FortiGate unit using the
command line interface (CLI). To connect to the CLI, see “Connecting to the command
line interface (CLI)” on page 33. Use the information that you gathered in Table 14 on
page 61 to complete the following procedures.
Changing to Transparent mode
1Log into the CLI if you are not already logged in.
2Switch to Transparent mode. Enter:
set system opmode transparent
After a few seconds, the login prompt appears.
3Type admin and press Enter.
The following prompt appears:
Type ? for a list of commands.
4Confirm that the FortiGate unit has switched to Transparent mode. Enter:
get system status
The CLI displays the status of the FortiGate unit. The last line shows the current
operation mode.
Operation mode: Transparent
FortiGate-400 Installation and Configuration Guide 63
Completing the configurationTransparent mode installation
Configuring the Transparent mode management IP address
1Log into the CLI if you are not already logged in.
2Set the management IP address and netmask to the IP address and netmask that you
recorded in Table 14 on page 61. Enter:
set system management ip <IP address> <netmask>
Example
set system management ip 10.10.10.2 255.255.255.0
3Confirm that the address is correct. Enter:
get system management
The CLI lists the management IP address and netmask.
Configure the Transparent mode default gateway
1Log into the CLI if you are not already logged in.
2Set the default route to the default gateway that you recorded in Table 14 on page 61.
Enter:
set system route number <number> gw1 <IP address>
Example
set system route
You have now completed the initial configuration of the FortiGate unit.
number 0 gw1
204.23.1.2
Completing the configuration
Use the information in this section to complete the initial configuration of the FortiGate
unit.
Setting the date and time
For effective scheduling and logging, the FortiGate system date and time should be
accurate. You can either manually set the system date and time or you can configure
the FortiGate unit to automatically keep its time correct by synchronizing with a
Network Time Protocol (NTP) server.
To set the FortiGate system date and time, see “Setting system date and time” on
page 157.
Enabling antivirus protection
To enable antivirus protection to protect users on your internal network from
downloading a virus from the Internet:
1Go to Firewall > Policy > port1->port2.
2Select Edit to edit this policy.
3Select Anti-Virus & Web filter to enable antivirus protection for this policy.
4Select the Scan Content Profile.
5Select OK to save your changes.
64Fortinet Inc.
Transparent mode installation Connecting the FortiGate unit to your networks
Registering your FortiGate
After purchasing and installing a new FortiGate unit, you can register the unit by going
to System > Update > Support, or using a web browser to connect to
http://support.fortinet.com and selecting Product Registration.
Registration consists of entering your contact information and the serial numbers of
the FortiGate units you or your organization have purchased. Registration is quick and
easy. You can register multiple FortiGate units in a single session without re-entering
your contact information.
For more information about registration, see “Registering FortiGate units” on
page 125.
Configuring virus and attack definition updates
You can go to System > Update to configure the FortiGate unit to automatically check
to see if new versions of the virus definitions and attack definitions are available. If it
finds new versions, the FortiGate unit automatically downloads and installs the
updated definitions.
The FortiGate unit uses HTTPS on port 8890 to check for updates. FortiGate interface
2 must have a path to the FortiResponse Distribution Network (FDN) using port 8890.
To configure automatic virus and attack updates, see “Updating antivirus and attack
definitions” on page 115.
Connecting the FortiGate unit to your networks
When you have completed the initial configuration, you can connect the FortiGate-400
unit to your networks.
The FortiGate-400 has four 10/100Base-TX connectors that can be connected to up
to four different networks. You can connect them in any configuration.
For example, you can connect the FortiGate-400 interfaces using the following steps:
1Connect interface 1 to the hub or switch connected to your internal network.
2Connect interface 2 to the public switch or router provided by your Internet Service
Provider.
3Optionally connect interfaces 3 and 4/HA to hubs or switches connected to your other
networks (the example shows a connection to interface 3).
FortiGate-400 Installation and Configuration Guide 65
A FortiGate unit operating in Transparent mode still requires a basic configuration to
operate as a node on the IP network. As a minimum, the FortiGate unit must be
configured with an IP address and subnet mask. These are used for management
access and to allow the unit to receive antivirus and definitions updates. Also, the unit
must have sufficient route information to reach:
•the management computer,
•The FortiResponse Distribution Network (FDN),
•a DNS server.
A route is required whenever the FortiGate unit connects to a router to reach a
destination. If all of the destinations are located on the external network, you may be
required to enter only a single default route. If, however, the network topology is more
complex, you may be required to enter one or more static routes in addition to the
default route.
To create a route to a destination, you need to define an IP prefix which consists of an
IP network address and a corresponding netmask value. A default route matches any
prefix and forwards traffic to the next hop router (otherwise known as the default
gateway). A static route matches a more specific prefix and forwards traffic to the next
hop router.
Default route example:
IP Prefix0.0.0.0 (IP address)
0.0.0.0 (Netmask)
Next Hop 192.168.1.2
Static Route example:
IP Prefix172.100.100.0 (IP address)
255.255.255.0 (Netmask)
Next Hop 192.168.1.2
Note: When adding routes to the FortiGate unit, add the default route last so that it
appears on the bottom of the route list. This ensures that the unit will attempt to match
more specific routes before selecting the default route.
Example default route to an external network
Figure 10 shows a FortiGate unit where all destinations, including the management
computer, are located on the external network.To reach these destinations, the
FortiGate unit must connect to the “upstream” router leading to the external network.
To facilitate this connection, you must enter a single default route that points to the
upstream router as the next hop/default gateway.
FortiGate-400 Installation and Configuration Guide 67
To configure basic Transparent mode settings and a default route using the
web-based manager:
1Go to System > Status.
•Select Change to Transparent Mode.
•Select Transparent in the Operation Mode list.
•Select OK.
The FortiGate unit changes to Transparent mode.
2Go to System > Network > Management.
•Change the Management IP and Netmask:
IP: 192.168.1.1
Mask: 255.255.255.0
•Select Apply.
3Go to System > Network > Routing.
•Select New to add the default route to the external network.
Destination IP: 0.0.0.0
Mask: 0.0.0.0
Gateway: 192.168.1.2
•Select OK.
CLI configuration steps
To configure the Fortinet basic settings and a default route using the CLI:
1Change the system to operate in Transparent Mode.
set system opmode transparent
2Add the Management IP address and Netmask.
set system management ip 192.168.1.1 255.255.255.0
3Add the default route to the external network.
set system route number 1 gw1 192.168.1.2
Example static route to an external destination
Figure 11 shows a FortiGate unit that requires routes to the FDN located on the
external network. The Fortigate unit does not require routes to the DNS servers or
management computer because they are located on the internal network.
To connect to the FDN, you would typically enter a single default route to the external
network. However, to provide an extra degree of security, you could enter static routes
to a specific FortiResponse server in addition to a default route to the external
network. If the static route becomes unavailable (perhaps because the IP address of
the FortiResponse server changes) the FortiGate unit will still be able to receive
antivirus and NIDS updates from the FDN using the default route.
FortiGate-400 Installation and Configuration Guide 69
Figure 12 shows a FortiGate unit where the FDN is located on an external subnet and
the management computer is located on a remote, internal subnet. To reach the FDN,
you need to enter a single default route that points to the upstream router as the next
hop/default gateway. To reach the management computer, you need to enter a single
static route that leads directly to it. This route will point to the internal router as the
next hop. (No route is required for the DNS servers because they are on the same
layer 3 subnet as the FortiGate unit.)
Figure 12: Static route to an internal destination
General configuration steps
1Set the unit to operate in Transparent mode.
2Configure the Management IP address and Netmask of the FortiGate unit.
3Configure the static route to the management computer on the internal network.
4Configure the default route to the external network.
FortiGate-400 Installation and Configuration Guide Version 2.50 MR2
High availability
Fortinet achieves high availability (HA) using redundant hardware and the FortiGate
Clustering Protocol (FGCP). The FortiGate units in the HA cluster enforce the same
overall security policy and share the same configuration settings. You can add up to
32 FortiGate units to an HA cluster. Each FortiGate unit in an HA cluster must be the
same model and be running the same FortiOS firmware image.
FortiGate HA is device redundant. If one of the FortiGate units in an HA cluster fails,
all functions, all established firewall connections, and all IPSec VPN sessions
maintained by the other FortiGate units in the HA cluster.
The FortiGate units in the cluster use dedicated HA ethernet interfaces to
communicate cluster session information and report individual system status. The
units in the cluster are constantly communicating HA status information to make sure
the cluster is functioning properly. For this reason, the connection between the HA
ports of all of the FortiGate units in the cluster must be well maintained. An interruption
of this communication can cause unpredictable results.
You can manage the cluster by connecting to any cluster interface configured for
management access.
FortiGate units can be configured to operate in active-passive (A-P) or active-active
(A-A) HA mode. Active-active and active-passive HA are supported in both NAT/Route
and Transparent modes.
1
are
This chapter provides an overview of HA functionality and describes how to configure
and manage HA clusters in NAT/Route mode and in Transparent mode.
•Active-passive HA
•Active-active HA
•HA in NAT/Route mode
•HA in Transparent mode
•Managing the HA cluster
•Advanced HA options
Active-passive HA
An Active-passive (A-P) HA cluster, also referred to as hot standby HA, consists of a
primary FortiGate unit that is processing traffic and one or more subordinate FortiGate
units connected to the network and to the primary FortiGate unit but not processing
traffic.
1.HA does not provide session failover for PPPoE, DHCP, PPTP, and L2TP services.
FortiGate-400 Installation and Configuration Guide 75
Active-active HAHigh availability
During startup the members of an HA cluster negotiate to select the primary unit. The
primary unit allows other FortiGate units to join the HA cluster as subordinate units
and assigns each subordinate unit a priority.
The primary FortiGate unit sends session messages to the subordinate units through
the FortiGate HA interfaces. All FortiGate units in the cluster maintain all session
information. If the primary FortiGate unit fails, the subordinate units negotiate to select
a new primary unit. All connections are resumed by the new primary unit.
During a fail-over, the new primary unit notifies the adjacent networking devices so
that the entire network can quickly converge to the new data path. The new primary
unit also alerts administrators of the changes to the HA cluster by writing a message
to its event log, sending an SNMP trap (if SNMP is enabled), and sending an alert
email.
If a subordinate FortiGate unit fails, the primary FortiGate unit writes a message to its
event log, and sends an SNMP trap and an alert email. The primary FortiGate unit
also adjusts the priority of each of the remaining units in the HA cluster.
Active-active HA
Active-active (A-A) HA provides load balancing between all of the FortiGate units in an
HA cluster. An active-active HA cluster consists of a primary FortiGate unit and one or
more subordinate FortiGate units all processing traffic. The primary FortiGate unit
uses a load balancing algorithm to distribute sessions to all of the FortiGate units in
the HA cluster.
In active-active HA mode the primary unit uses one of the following scheduling
algorithms to distribute network sessions among the members of the HA cluster.
Table 15: Active-Active HA load balancing scheduling algorithms
ScheduleDescription
NoneNo load balancing. Used when the cluster interfaces are connected to
HubUsed when the cluster interfaces are connected to a hub. Distributes
Least-ConnectionDistributes traffic to the cluster unit with the fewest concurrent
Round RobinDistributes traffic to the next available cluster unit.
Weighted Round
Robin
RandomRandomly distributes traffic to cluster units.
IPDistributes traffic to units in a cluster based on the Source IP and
IP PortDistributes traffic to units in a cluster based on the Source IP, Source
load balancing switches.
traffic to units in the cluster based on the Source IP and Destination IP
of the packet.
connections.
Similar to Round Robin but weighted values are assigned to each of
the units in a cluster based on their capacity. For example, the primary
unit should have a lower weighted value because it handles scheduling
and forwards traffic.
Destination IP of the packet.
Port, Destination IP, and Destination port of the packet.
76Fortinet Inc.
High availability HA in NAT/Route mode
During startup the members of the HA cluster negotiate to select the primary unit. The
primary unit allows other FortiGate units to join the HA cluster as subordinate units
and assigns each subordinate unit a priority.
The FortiGate units in the HA cluster communicate status and session information
using their HA interfaces. All FortiGate units in the cluster maintain all session
information. For load balancing, when the primary FortiGate unit forwards a packet to
a subordinate unit it sends the packet back out the interface on which it received the
packet to the corresponding interface on the subordinate FortiGate unit.
If the primary FortiGate unit fails, the first subordinate unit to register that the primary
unit has failed becomes the new primary unit. The new primary unit notifies the other
FortiGate units that it is the new primary unit and resets the priority of each of the
remaining subordinate units. The new primary unit also redistributes communication
sessions among the units in the HA cluster.
During a fail-over, the new primary FortiGate unit notifies the adjacent networking
devices so that the entire network can quickly converge to the new data path. The new
primary unit also alerts administrators of the changes to the HA cluster by writing a
message to the event log, sending an SNMP trap (if SNMP is enabled), and sending
an alert email.
If a subordinate FortiGate unit fails, the primary unit writes a message to the event log,
and sends an SNMP trap and an alert email. The primary unit also adjusts the priority
of each of the remaining units in the HA cluster.
HA in NAT/Route mode
Use the following steps to configure a group of FortiGate units to operate as an HA
cluster in NAT/Route mode.
•Installing and configuring the FortiGate units
•Configuring the HA interfaces
•Configuring the HA cluster
•Connecting the HA cluster to your network
•Starting the HA cluster
Installing and configuring the FortiGate units
Follow the instructions in “NAT/Route mode installation” on page 45 to install and
configure the FortiGate units. All of the FortiGate units in the HA cluster should have
the same configuration. Do not connect the FortiGate units to the network. Instead,
proceed to “Configuring the HA interfaces”.
Configuring the HA interfaces
Configure the 4/HA interfaces of all of the FortiGate-400s in the HA cluster to operate
in HA mode. When you switch the 4/HA interface to HA mode, the System > Config >
HA options become active. When running in HA mode, the 4/HA interfaces cannot be
connected to a network because they are dedicated to HA communication.
FortiGate-400 Installation and Configuration Guide 77
HA in NAT/Route modeHigh availability
The 4/HA interface of each FortiGate-400 unit must be configured with a different IP
address. The addresses of the 4/HA interfaces must be on the same subnet and they
must be configured for management access.
Repeat the following procedure for each FortiGate unit in the HA cluster:
1Connect to the FortiGate unit and log into the web-based manager.
2Go to System > Network > Interface.
3For the port4/ha interface, select Modify .
4Select Work as HA to configure port4/ha for HA operation.
When the FortiGate unit is configured for HA operation, you cannot connect a network
to the 4/HA interface.
5Change the IP address and Netmask as required.
6Select the management access methods for the HA interface.
HTTPSTo allow secure HTTPS connections to the web-based manager through this
PINGIf you want this interface to respond to pings. Use this setting to verify your
HTTPTo allow HTTP connections to the web-based manager through this interface.
SSHTo allow secure SSH connections to the CLI through this interface.
SNMPTo allow a remote SNMP manager to request SNMP information by connecting to
TELNETTo allow Telnet connections to the CLI through this interface. Telnet connections
interface.
installation and for testing.
HTTP connections are not secure and can be intercepted by a third party.
this interface.
are not secure and can be intercepted by a third party.
7Select Apply.
Now that you have configured the HA interfaces, proceed to “Configuring the HA
cluster”.
Configuring the HA cluster
Use the following procedure to configure each FortiGate unit for HA before connecting
the HA cluster to your network.
Note: These instructions describe configuring each of the FortiGate units in the HA cluster
before connecting the HA cluster to your network. You can also use the procedure “Connecting
the HA cluster to your network” on page 80 to connect the HA cluster to your network first.
1Connect to the FortiGate unit and log into the web-based manager.
2Go to System > Config > HA.
3Select HA.
You can only select HA if the 4/HA interface is configured for HA operation. See
“Configuring the HA interfaces” on page 77.
78Fortinet Inc.
High availability HA in NAT/Route mode
4Select the HA mode.
Select Active-Passive mode to create an Active-Passive HA cluster, in which one
FortiGate unit in the HA cluster is actively processing all connections and the others
are passively monitoring the status and remaining synchronized with the active
FortiGate unit.
Select Active-Active mode to create an Active-Active HA cluster, in which each
FortiGate unit in the HA cluster is actively processing connections and monitoring the
status of the other FortiGate units.
The HA mode must be the same for all FortiGate units in the HA cluster.
5Enter and confirm a password for the HA cluster.
The password must be the same for all FortiGate units in the HA cluster.
6Select a Group ID for the HA cluster.
The Group ID must be the same for all FortiGate units in the HA cluster.
7If you are configuring Active-Active HA, select a schedule.
The schedule controls load balancing among the FortiGate units in the active-active
HA cluster. The schedule must be the same for all FortiGate units in the HA cluster.
NoneNo load balancing. Select None when the cluster interfaces are
HubLoad balancing for hubs. Select Hub if the cluster interfaces are
Least ConnectionLeast connection load balancing. If the FortiGate units are connected
Round RobinRound robin load balancing. If the FortiGate units are connected using
Weighted Round
Robin
RandomRandom load balancing. If the FortiGate units are connected using
IPLoad balancing according to IP address. If the FortiGate units are
IP PortLoad balancing according to IP address and port. If the FortiGate units
connected to load balancing switches.
connected to a hub. Traffic is distributed to units in a cluster based on
the Source IP and Destination IP of the packet.
using switches, select Least connection to distribute traffic to the cluster
unit with the fewest concurrent connections.
switches, select round robin to distribute traffic to the next available
cluster unit.
Weighted round robin load balancing. Similar to round robin, but
weighted values are assigned to each of the units in a cluster based on
their capacity and on how many connections they are currently
processing. For example, the primary unit should have a lower weighted
value because it handles scheduling and forwards traffic. Weighted
round robin distributes traffic more evenly because units that are not
processing traffic will be more likely to receive new connections than
units that are very busy.
switches, select random to randomly distribute traffic to cluster units.
connected using switches, select IP to distribute traffic to units in a
cluster based on the Source IP and Destination IP of the packet.
are connected using switches, select IP Port to distribute traffic to units
in a cluster based on the Source IP, Source Port, Destination IP, and
Destination port of the packet.
FortiGate-400 Installation and Configuration Guide 79
HA in NAT/Route modeHigh availability
8Under Monitor on Interface, select the names of the interfaces to be monitored.
Monitor FortiGate interfaces to make sure they are functioning properly and that they
are connected to their networks. If a monitored interface fails or is disconnected from
its network, the FortiGate unit stops processing traffic and is removed from the cluster.
If you can re-establish traffic flow through the interface (for example, if you re-connect
a disconnected network cable) the FortiGate unit rejoins the cluster. You should only
monitor interfaces that are connected to networks.
9Select Apply.
The FortiGate unit negotiates to establish an HA cluster. When you select apply you
may temporarily loose connectivity with the FortiGate unit as the HA cluster
negotiates.
Figure 13: Example Active-Active HA configuration
10Repeat this procedure to add each FortiGate unit in the HA cluster.
When you have configured all of the FortiGate units, proceed to “Connecting the HA
cluster to your network”.
Connecting the HA cluster to your network
To connect the HA cluster to your network you must connect all matching interfaces in
the cluster to the same hub or switch. Then you must connect these interfaces to their
networks using the same hub or switch.
Also, you must connect all of the HA interfaces in the cluster to their own hub or
switch. You can also connect a management computer to this hub or switch. The units
in the cluster are constantly communicating HA status information to make sure the
cluster is functioning properly. For this reason, the connection between the HA ports of
all of the FortiGate units in the cluster must be well maintained. An interruption of this
communication can cause unpredictable results.
Switches are recommended for performance reasons.
80Fortinet Inc.
High availability HA in NAT/Route mode
The network equipment to use and the procedure to follow are the same, whether you
are configuring the FortiGate units for active-active HA or active-passive HA.
To connect the FortiGate units to your network:
1Connect port 1 of each FortiGate unit to a switch or hub connected to your internal
network.
2Connect port 2 of each FortiGate unit to a switch or hub connected to your external
network.
3Optionally connect port 3 of each FortiGate unit to a switch or hub connected to
another network.
4Connect the 4/HA interfaces of the FortiGate units to another switch or hub.
Figure 14: HA network configuration
When you have connected the cluster, proceed to “Starting the HA cluster”.
FortiGate-400 Installation and Configuration Guide 81
HA in Transparent modeHigh availability
Starting the HA cluster
After all of the FortiGate units in the cluster are configured for HA and once the cluster
is connected, use the following procedure to start the HA cluster.
1Power on all of the HA units in the cluster.
As the units power on they negotiate to choose the primary cluster unit and the
subordinate units. This negotiation occurs with no user intervention.
When negotiation is complete the cluster is ready to begin processing network traffic.
You can use the information in “Managing the HA cluster” on page 86 to log into and
manage the cluster.
HA in Transparent mode
Use the following steps to configure a group of FortiGate units to operate as an HA
cluster in Transparent mode.
•Installing and configuring the FortiGate units
•Configuring the HA interface and HA IP address
•Configuring the HA cluster
•Connecting the HA cluster to your network
•Starting the HA cluster
Installing and configuring the FortiGate units
Follow the instructions in “Transparent mode installation” on page 61 to install and
configure the FortiGate units. All of the FortiGate units in the HA cluster should have
the same configuration. Do not connect the FortiGate units to the network. Instead,
proceed to “Configuring the HA interface and HA IP address”.
Configuring the HA interface and HA IP address
Configure the 4/HA interfaces of all of the FortiGate-400s in the HA cluster to operate
in HA mode. When you switch the 4/HA interface to HA mode, the System > Config >
HA options become active. When running in HA mode, the 4/HA interfaces cannot be
connected to a network because they are dedicated to HA communication.
The 4/HA interface of each FortiGate-400 unit must be configured with a different IP
address. The addresses of the 4/HA interfaces must be on the same subnet and they
must be configured for management access.
Repeat the following procedure for each FortiGate unit in the HA cluster:
1Connect to the FortiGate unit and log into the web-based manager.
2Go to System > Network > Management.
3For the port4/ha interface, select HA to configure port4/ha for HA operation.
4Select the management Access methods for the port4/ha interface.
82Fortinet Inc.
High availability HA in Transparent mode
HTTPSTo allow secure HTTPS connections to the web-based manager through this
PINGIf you want this interface to respond to pings. Use this setting to verify your
HTTPTo allow HTTP connections to the web-based manager through this interface.
SSHTo allow secure SSH connections to the CLI through this interface.
SNMPTo allow a remote SNMP manager to request SNMP information by connecting to
TELNETTo allow Telnet connections to the CLI through this interface. Telnet connections
interface.
installation and for testing.
HTTP connections are not secure and can be intercepted by a third party.
this interface.
are not secure and can be intercepted by a third party.
5Change the HA IP address and Netmask as required.
6Optionally configure management access for other interfaces.
7Select Apply.
Now that you have configured the HA interfaces, proceed to “Configuring the HA
cluster”.
Configuring the HA cluster
Use the following procedure to configure each FortiGate unit for HA before connecting
the HA cluster to your network.
Note: These instructions describe configuring each of the FortiGate units in the HA cluster
before connecting the HA cluster to your network. You can also use the procedure “Connecting
the HA cluster to your network” on page 85 to connect the HA cluster to your network first.
1Connect to the FortiGate unit and log into the web-based manager.
2Go to System > Config > HA.
3Select HA.
You can only select HA if the 4/HA interface is configured for HA operation. See
“Configuring the HA interface and HA IP address” on page 82.
4Select the HA mode.
Select Active-Passive mode to create an Active-Passive HA cluster, in which one
FortiGate unit in the HA cluster is actively processing all connections and the others
are passively monitoring the status and remaining synchronized with the active
FortiGate unit.
Select Active-Active mode to create an Active-Active HA cluster, in which each
FortiGate unit in the HA cluster is actively processing connections and monitoring the
status of the other FortiGate units.
The HA mode must be the same for all FortiGate units in the HA cluster.
5Enter and confirm a password for the HA cluster.
The password must be the same for all FortiGate units in the HA cluster.
6Select a Group ID for the HA cluster.
The Group ID must be the same for all FortiGate units in the HA cluster.
FortiGate-400 Installation and Configuration Guide 83
HA in Transparent modeHigh availability
7If you are configuring Active-Active HA, select a schedule.
The schedule controls load balancing among the FortiGate units in the active-active
HA cluster. The schedule must be the same for all FortiGate units in the HA cluster.
NoneNo load balancing. Select None when the cluster interfaces are
HubLoad balancing for hubs. Select Hub if the cluster interfaces are
Least ConnectionLeast connection load balancing. If the FortiGate units are connected
Round RobinRound robin load balancing. If the FortiGate units are connected using
Weighted Round
Robin
RandomRandom load balancing. If the FortiGate units are connected using
IPLoad balancing according to IP address. If the FortiGate units are
IP PortLoad balancing according to IP address and port. If the FortiGate units
connected to load balancing switches.
connected to a hub. Traffic is distributed to units in a cluster based on
the Source IP and Destination IP of the packet.
using switches, select Least connection to distribute traffic to the cluster
unit with the fewest concurrent connections.
switches, select round robin to distribute traffic to the next available
cluster unit.
Weighted round robin load balancing. Similar to round robin, but
weighted values are assigned to each of the units in a cluster based on
their capacity and on how many connections they are currently
processing. For example, the primary unit should have a lower weighted
value because it handles scheduling and forwards traffic. Weighted
round robin distributes traffic more evenly because units that are not
processing traffic will be more likely to receive new connections than
units that are very busy.
switches, select random to randomly distribute traffic to cluster units.
connected using switches, select IP to distribute traffic to units in a
cluster based on the Source IP and Destination IP of the packet.
are connected using switches, select IP Port to distribute traffic to units
in a cluster based on the Source IP, Source Port, Destination IP, and
Destination port of the packet.
8Under Monitor on Interface, select the names of the interfaces to be monitored.
Monitor FortiGate interfaces to make sure they are functioning properly and that they
are connected to their networks. If a monitored interface fails or is disconnected from
its network, the FortiGate unit stops processing traffic and is removed from the cluster.
If you can re-establish traffic flow through the interface (for example, if you re-connect
a disconnected network cable) the FortiGate unit rejoins the cluster. You should only
monitor interfaces that are connected to networks.
9Select Apply.
The FortiGate unit negotiates to establish an HA cluster. When you select apply you
may temporarily loose connectivity with the FortiGate unit as the HA cluster
negotiates.
84Fortinet Inc.
High availability HA in Transparent mode
Figure 15: Sample active-passive HA configuration
10Repeat this procedure to add each FortiGate unit in the HA cluster.
When you have configured all of the FortiGate units, proceed to “Connecting the HA
cluster to your network”.
Connecting the HA cluster to your network
To connect the HA cluster to your network you must connect all matching interfaces in
the cluster to the same hub or switch. Then you must connect these interfaces to their
networks using the same hub or switch.
Also, you must connect all of the HA interfaces in the cluster to their own hub or
switch. You can also connect a management computer to this hub or switch. The units
in the cluster are constantly communicating HA status information to make sure the
cluster is functioning properly. For this reason, the connection between the HA ports of
all of the FortiGate units in the cluster must be well maintained. An interruption of this
communication can cause unpredictable results.
Switches are recommended for better performance.
The network equipment to use and the procedure to follow are the same, whether you
are configuring the FortiGate units for active-active HA or active-passive HA.
To connect the FortiGate units to your network:
1Connect port 1 of each FortiGate unit to a switch or hub connected to your internal
network.
2Connect port 2 of each FortiGate unit to a switch or hub connected to your external
network.
3Optionally connect port 3 of each FortiGate unit to a switch or hub connected to
another network.
4Connect the 4/HA interfaces of the FortiGate units to another switch or hub.
When you have connected the cluster, proceed to “Starting the HA cluster”.
FortiGate-400 Installation and Configuration Guide 85
Managing the HA clusterHigh availability
Starting the HA cluster
After all of the FortiGate units in the cluster are configured for HA and once the cluster
is connected, use the following procedure to start the HA cluster.
1Power on all of the HA units in the cluster.
As the units power on they negotiate to choose the primary cluster unit and the
subordinate units. This negotiation occurs with no user intervention.
When negotiation is complete the cluster is ready to begin processing network traffic.
You can use the information in “Managing the HA cluster” on page 86 to log into and
manage the cluster.
Managing the HA cluster
When a FortiGate cluster is up and running, you manage it as a cluster instead of a
group of individual FortiGate units. You manage the cluster by connecting to the
web-based manager or CLI using any interface configured for management access.
Since all units in the cluster are configured with the same interface IP addresses
(except for the HA interface), connecting to any interface IP address configured for
management access connects to that cluster interface; which automatically connects
you to the primary FortiGate unit.
You can also connect to and manage individual units in the cluster by connecting to
their HA interfaces (all of which are configured with a different IP address).
You can also manage individual cluster units by connect to the primary unit CLI. From
here you can use the execute ha manage command to connect to the CLI of each
unit in the cluster.
This section describes:
•Viewing the status of cluster members
•Monitoring cluster members
•Monitoring cluster sessions
•Viewing and managing cluster log messages
•Managing individual cluster units
•Synchronizing the cluster configuration
•Returning to standalone configuration
•Replacing a FortiGate unit after fail-over
Viewing the status of cluster members
To view the status of each cluster member.
1Connect to the cluster and log into the web-based manager.
2Go to System > Status > Cluster Members.
The web-based manager lists the serial numbers of all of the FortiGate units in the
cluster. The primary unit is identified as Local. For each cluster member, the list
includes the up time and status for that cluster member.
86Fortinet Inc.
High availability Managing the HA cluster
Figure 16: Example cluster members list
Monitoring cluster members
To monitor health information for each cluster member.
1Connect to the cluster and log into the web-based manager.
2Go to System > Status > Monitor.
CPU, Memory Status, and Hard disk status is displayed for each cluster member. The
primary unit is identified as Local and the other units in the cluster are listed by serial
number.
The display includes bar graphs of current CPU and memory usage as well as line
graphs of CPU and memory usage for the last minute.
For more information, see “Viewing CPU and memory status” on page 110.
Figure 17: Example cluster Sessions & Network display
3Select Sessions & Network.
Sessions and network status is displayed for each cluster member. The primary unit is
identified as Local and the other units in the cluster are listed by serial number.
The display includes bar graphs of the current number of sessions and current
network utilization as well as line graphs of session and network utilization usage for
the last minute. The line graph scales are shown in the upper left corner of the graph.
For more information, see “Viewing sessions and network status” on page 111.
FortiGate-400 Installation and Configuration Guide 87
Managing the HA clusterHigh availability
4Select Virus & Intrusions.
Virus and intrusions status is displayed for each cluster member. The primary unit is
identified as Local and the other units in the cluster are listed by serial number.
The display includes bar graphs of the number viruses and intrusions detected per
hour as well as line graphs of the number of viruses and intrusions detected for the
last 20 hours.
For more information, see “Viewing virus and intrusions status” on page 112.
5Select Packets & Bytes.
The number of packets and bytes processed by each cluster member is displayed.
6For each of these displays you can set the automatic refresh interval and select Go to
control how often the web-based manager updates the display.
More frequent updates use system resources and increase network traffic. However,
this only occurs when you are viewing the display using the web-based manager. The
line graph scales are shown on the upper right corner of the graph.
Monitoring cluster sessions
To view the current primary unit communication sessions.
1Connect to the cluster and log into the web-based manager.
2Go to System > Status > Session.
The session table displays the sessions processed by the primary unit in the cluster.
The sessions include HA communications between the primary unit and the
subordinate units.
Viewing and managing cluster log messages
To view log messages for each cluster member:
1Connect to the cluster and log into the web-based manager.
2Go to Log&Report > Logging.
The primary unit Traffic log, Event log, Attack log, Antivirus log, Web Filter log, and
Email Filter log are displayed.
The pull-down list at the upper right of the display identifies the unit for which logs are
displayed. The primary unit is identified as Local and the other units in the cluster are
listed by serial number.
3Select the serial number of one of the units in the cluster to display the logs for this
cluster unit.
You can view logs saved to memory or logs saved to the hard disk, depending on the
configuration of the cluster unit.
4For each cluster unit:
•You can view and search log messages (see “Viewing logs saved to memory” on
page 289 and “Viewing and managing logs saved to the hard disk” on page 290)
•If the cluster unit contains a hard disk you can manage log messages (see
“Downloading a log file to the management computer” on page 291, “Deleting all
messages in an active log” on page 291, and “Deleting a saved log file” on
page 292)
88Fortinet Inc.
High availability Managing the HA cluster
Note: Note you can view and manage log messages for all cluster members. However, from the
primary unit you can only configure logging for the primary unit. To configure logging for other
units in the cluster you must manage individual cluster units.
Managing individual cluster units
You can manage individual cluster units by connecting to each unit’s HA interface
using either the web-based manager or the CLI. To do this, the HA interfaces of each
unit have to be configured for HTTPS and SSH management access.
You can also use the following procedure to connect to the CLI of each unit in the
cluster:
Managing individual units from the web-based manager:
1Use SSH to connect to the cluster and log into the web-based manager.
Connect to any cluster interface configured for SSH management to automatically log
into the primary unit.
You can also use a direct cable connection to log into the primary unit CLI (to do this
you must know which unit is the primary unit. See “Selecting a FortiGate unit to a
permanent primary unit” on page 91 to control which FortiGate unit becomes the
primary unit).
2Enter the following command followed by a space and type a question mark (?):
execute ha manage
A list of all of the subordinate units in the cluster is displayed. Each cluster unit in the
list is numbered, starting at 1. The information displayed for each cluster unit includes
the unit serial number and host name of the unit.
3Complete the command with the number of the subordinate unit to log into. For
example, to log into subordinate unit 1, enter the following command:
execute ha manage 1
You are connected to and logged into the CLI of the selected subordinate unit. If this
subordinate unit has a different host name, the CLI prompt changes to this host name.
You can use CLI commands to manage this subordinate unit.
4Enter the following command to return to the primary unit CLI:
exit
You can use the execute manage ha command to log into the CLI of any of the
other subordinate units in the cluster.
Synchronizing the cluster configuration
For best results when operating a cluster you should make sure that the
configurations of all of the units in the cluster remain synchronized. You can do this by
making configuration changes to the primary unit and then using the execute ha synchronize command from each subordinate unit in an HA cluster to manually
synchronize its configuration with the primary unit. Using this command you can
synchronize the following:
FortiGate-400 Installation and Configuration Guide 89
Managing the HA clusterHigh availability
Table 16: execute ha synchronize keywords
KeywordDescription
configSynchronize the FortiGate configuration. This includes normal system
avupdSynchronize the antivirus engine and antivirus definitions received by the
attackdefSynchronize NIDS attack definition updates received by the primary unit from
weblistsSynchronize web filter lists added to or changed on the primary unit.
emaillists Synchronize email filter lists added to or changed on the primary unit.
resmsgSynchronize replacement messages changed on the primary unit.
caSynchronize CA certificates added to the primary unit.
localcertSynchronize local certificates added to the primary unit.
allSynchronize all of the above.
configuration, firewall configuration, VPN configuration and so on stored in the
FortiGate configuration file.
primary unit from the FortiResponse Distribution Network (FDN).
the FDN.
Use the following procedure to make configuration changes to the primary FortiGate
unit and then synchronize the configuration of the subordinate units.
1Connect to the cluster and log into the web-based manager or CLI.
2Make configuration changes as required.
3Connect to the CLI of each of the subordinate units in the cluster.
To connect to subordinate units, see “Managing individual cluster units” on page 89.
4Use the execute ha synchronize command to synchronize the configuration of
the subordinate unit.
5Repeat steps 3 and 4 for all of the subordinate units in the HA cluster.
Returning to standalone configuration
Repeat this procedure for each FortiGate unit in the HA cluster. To return to
standalone configuration:
1Connect to the web-based manager.
2Go to System > Config > HA.
3Select Standalone Mode and select Apply.
The FortiGate unit exits from HA mode and returns to standalone mode.
Replacing a FortiGate unit after fail-over
A failover can occur due to a hardware or software problem. When a failover occurs,
you can attempt to restart the failed FortiGate unit by cycling its power. If the FortiGate
unit starts up correctly, it rejoins the HA cluster, which then continues to function
normally. If the FortiGate unit does not restart normally or does not rejoin the HA
cluster, you must take it out of the network and either reconfigure or replace it.
Once the FortiGate unit is reconfigured or replaced, change its HA configuration to
match that of the FortiGate unit that failed and connect it back into the network. The
reconnected FortiGate unit then automatically joins the HA cluster.
90Fortinet Inc.
High availability Advanced HA options
Advanced HA options
The following advanced HA options are available from the FortiGate CLI:
•Selecting a FortiGate unit to a permanent primary unit
•Configuring weighted-round-robin weights
Selecting a FortiGate unit to a permanent primary unit
In a typical FortiGate cluster configuration, the primary unit selection process is
automatic. The primary unit can be different each time the cluster starts up. In addition
the unit functioning as the primary unit can change from time to time (for example, if
the current primary unit restarts, one of the other units in the cluster replaces it as the
primary unit).
In some situations, you may want to control which unit becomes the primary unit. You
can configure a FortiGate unit to become the permanent primary unit by changing the
priority of this unit and configuring it to override any other primary unit.
When FortiGates units in a cluster are negotiating to be the primary unit, the one with
the lowest priority always becomes the primary unit. If two units have the same
priority, the standard negotiation process is used to select the primary unit.
To configure a FortiGate unit to be the permanent primary unit in an HA cluster:
1Connect to the CLI of the permanent primary FortiGate unit.
2Set the priority of the permanent primary unit. Enter:
set system ha priority <priority_int>
Where <priority_int> is the priority to set for the permanent primary unit. The unit
with the lowest priority becomes the primary unit. The default priority is 128. Set the
priority of the permanent primary unit to a number lower than 128.
For example, to set the priority of the permanent primary unit to 10, enter the
command:
set system ha priority 10
3Make sure the priorities of all of the other units in the cluster are higher than the
priority of the permanent primary unit.
The command get system ha mode displays the current priority of the FortiGate
unit that you are connected to.
4Configure the permanent primary unit to override an existing primary unit when it joins
the cluster. Use the following command to configure primary unit override:
set system ha override enable
Enable override so the that the permanent primary unit will always override any other
primary unit. For example, if the permanent primary unit shuts down, one of the other
units in the cluster replaces it as the primary unit. When the permanent primary unit is
restarted, it can become the primary unit again only if override is enabled.
FortiGate-400 Installation and Configuration Guide 91
Advanced HA optionsHigh availability
Configuring weighted-round-robin weights
By default, in active-active HA mode the weighted round-robin schedule assigns the
same weight to each FortiGate unit in the cluster. Once the cluster is configured to use
the weighted round-robin schedule, you can use the set system ha weight
command to configure a weight value for each cluster unit. The weight value sets the
maximum number of connections that are sent to a cluster unit before a connection
can be sent to the next cluster unit. You can set weight values to control the number of
connections processed by each cluster unit. One use for this technique would be to
reduce the number of connections processed by the primary cluster unit, by
increasing the weight assigned to the subordinate cluster units.
Weight values are entered in order according to the priority of the units in the cluster.
For example, if you have a cluster of 3 FortiGate units, you can enter the following
command to configure the weight values for each unit:
set system ha weight 1 3 3
This command has the following results:
•The first connection is processed by the primary unit
•The next three connections are processed by the first subordinate unit
•The next three connections are processed by the second subordinate unit
The subordinate units will process more connections than the primary unit, and both
subordinate units will on average process the same number of connections.
92Fortinet Inc.
FortiGate-400 Installation and Configuration Guide Version 2.50 MR2
System status
You can connect to the web-based manager and go to System > Status to view the
current status of your FortiGate unit. The status information that is displayed includes
the current firmware version, the current virus and attack definitions, and the FortiGate
unit serial number.
If you have logged into the web-based manager using the admin administrator
account, you can use System Status to make any of the following changes to the
FortiGate system settings:
•Changing the FortiGate host name
•Changing the FortiGate firmware
•Manual virus definition updates
•Manual attack definition updates
•Backing up system settings
•Restoring system settings
•Restoring system settings to factory defaults
•Changing to Transparent mode
•Changing to NAT/Route mode
•Restarting the FortiGate unit
•Shutting down the FortiGate unit
If you log into the web-based manager with any other administrator account, you can
go to System > Status to view the system settings including:
•Displaying the FortiGate serial number
•Displaying the FortiGate up time
•Displaying log hard disk status
All administrative users can also go to System > Status > Monitor and view
FortiGate system status. System status displays FortiGate health monitoring
information including CPU and memory status, Session and network status.
•System status
All administrative users can also go to System > Status > Session and view the
active communication sessions to and through the FortiGate unit.
•Session list
FortiGate-400 Installation and Configuration Guide 93
Changing the FortiGate host nameSystem status
Changing the FortiGate host name
The FortiGate host name appears on the System > Status page and on the FortiGate
CLI prompt. The host name is also used as the SNMP System Name (see
“Configuring SNMP” on page 162).
The default host name is FortiGate-400.
To change the FortiGate host name:
1Go to System > Status.
2Select Edit Host Name .
3Enter a new host name.
4Select OK.
The new host name appears on the System Status page and is added to the SNMP
System Name.
Changing the FortiGate firmware
After you download a FortiGate firmware image from Fortinet, you can use the
procedures in Tab le 1 to install the firmware image on your FortiGate unit.
Table 1: Firmware upgrade procedures
ProcedureDescription
Upgrade to a new
firmware version
Revert to a previous
firmware version
Install a firmware
image from a system
reboot using the CLI
Test a new firmware
image before
installing it
Installing and using a
backup firmware
image
Commonly-used web-based manager and CLI procedures to
upgrade to a new FortiOS firmware version or to a more recent
build of the same firmware version.
Use the web-based manager or CLI procedure to revert to a
previous firmware version. This procedure reverts your FortiGate
unit to its factory default configuration.
Use this procedure to install a new firmware version or revert to a
previous firmware version. You must run this procedure by
connecting to the CLI using the FortiGate console port and a nullmodem cable. This procedure reverts your FortiGate unit to its
factory default configuration.
Use this procedure to test a new firmware image before installing it.
You must run this procedure by connecting to the CLI using the
FortiGate console port and a null-modem cable. This procedure
temporarily installs a new firmware image using your current
configuration. You can test the firmware image before installing it
permanently. If the firmware image works correctly you can use
one of the other procedures listed in this table to install it
permanently.
If your FortiGate unit is running BIOS version v3.x, you can install a
backup firmware image. Once the backup firmware image is
installed you can switch to this backup image when required.
94Fortinet Inc.
System status Changing the FortiGate firmware
Upgrade to a new firmware version
Use the following procedures to upgrade your FortiGate to a newer firmware version.
Upgrading the firmware using the web-based manager
Note: Installing firmware replaces your current antivirus and attack definitions with the
definitions included with the firmware release that you are installing. When you have installed
new firmware, use the procedure “Manually updating antivirus and attack definitions” on
page 119 to make sure that antivirus and attack definitions are up-to-date.
1Copy the firmware image file to your management computer.
2Login to the FortiGate web-based manager as the admin administrative user.
3Go to System > Status.
4Select Firmware Upgrade .
5Enter the path and filename of the firmware image file, or select Browse and locate the
file.
6Select OK.
The FortiGate unit uploads the firmware image file, upgrades to the new firmware
version, restarts, and displays the FortiGate login. This process takes a few minutes.
7Login to the web-based manager.
8Go to System > Status and check the Firmware Version to confirm that the firmware
upgrade has been installed successfully.
9Use the procedure “Manually updating antivirus and attack definitions” on page 119 to
update antivirus and attack definitions.
Upgrading the firmware using the CLI
To use the following procedure you must have a TFTP server that you can connect to
from the FortiGate unit.
Note: Installing firmware replaces your current antivirus and attack definitions with the
definitions included with the firmware release that you are installing. When you have installed
new firmware, use the procedure “Manually updating antivirus and attack definitions” on
page 119 to make sure that antivirus and attack definitions are up-to-date. You can also use the
CLI command
definitions.
1Make sure that the TFTP server is running.
2Copy the new firmware image file to the root directory of the TFTP server.
3Log into the CLI as the admin administrative user.
4Make sure the FortiGate unit can connect to the TFTP server.
You can use the following command to ping the computer running the TFTP server.
For example, if the TFTP server's IP address is 192.168.1.168:
execute ping 192.168.1.168
execute updatecenter updatenow to update the antivirus and attack
FortiGate-400 Installation and Configuration Guide 95
Changing the FortiGate firmwareSystem status
5Enter the following command to copy the firmware image from the TFTP server to the
FortiGate:
execute restore image <name_str> <tftp_ip>
Where <name_str> is the name of the firmware image file on the TFTP server and
<tftp_ip> is the IP address of the TFTP server. For example, if the firmware image
file name is FGT_300-v250-build045-FORTINET.out and the IP address of the
TFTP server is 192.168.1.168, enter:
The FortiGate unit uploads the firmware image file, upgrades to the new firmware
version, and restarts. This process takes a few minutes.
6Reconnect to the CLI.
7To confirm that the new firmware image has been loaded, enter:
get system status
8Use the procedure “Manually updating antivirus and attack definitions” on page 119 to
update antivirus and attack definitions, or from the CLI, enter:
execute updatecenter updatenow
9To confirm that the antivirus and attack definitions have been updated, enter the
following command to display the antivirus engine, virus and attack definitions version,
contract expiry, and last update attempt information.
get system objver
Revert to a previous firmware version
Use the following procedures to revert your FortiGate unit to a previous firmware
version.
Reverting to a previous firmware version using the web-based
manager
The following procedures return your FortiGate unit to its factory default configuration
and delete NIDS user-defined signatures, web content lists, email filtering lists, and
changes to replacement messages.
Before running this procedure you can:
•Backup the FortiGate unit configuration, use the procedure “Backing up system
settings” on page 108.
•Backup the NIDS user defined signatures, see the FortiGate NIDS Guide
•Backup web content and email filtering lists, see the FortiGate Content Protection Guide.
If you are reverting to a previous FortiOS version (for example, reverting from FortiOS
v2.50 to FortiOS v2.36) you may not be able to restore your previous configuration
from the backup configuration file.
96Fortinet Inc.
System status Changing the FortiGate firmware
Note: Installing firmware replaces your current antivirus and attack definitions with the
definitions included with the firmware release that you are installing. When you have installed
new firmware, use the procedure “Manually updating antivirus and attack definitions” on
page 119 to make sure that antivirus and attack definitions are up-to-date.
1Copy the firmware image file to your management computer.
2Login to the FortiGate web-based manager as the admin administrative user.
3Go to System > Status.
4Select Firmware Upgrade .
5Enter the path and filename of the previous firmware image file, or select Browse and
locate the file.
6Select OK.
The FortiGate unit uploads the firmware image file, reverts to the old firmware version,
resets the configuration, restarts, and displays the FortiGate login. This process takes
a few minutes.
7Login to the web-based manager.
For information about logging into the web-based manager when the FortiGate unit is
set to factory defaults, see “Connecting to the web-based manager” on page 32.
8Go to System > Status and check the Firmware Version to confirm that the firmware
has been installed successfully.
9Restore your configuration.
See “Restoring system settings” on page 108 to restore your previous configuration.
10Use the procedure “Manually updating antivirus and attack definitions” on page 119 to
update antivirus and attack definitions.
Reverting to a previous firmware version using the CLI
This procedure reverts your FortiGate unit to its factory default configuration and
deletes NIDS user-defined signatures, web content lists, email filtering lists, and
changes to replacement messages.
Before running this procedure you can:
•Backup the FortiGate unit configuration using the command execute backup config.
•Backup the NIDS user defined signatures using the command execute backup
nidsuserdefsig
•Backup web content and email filtering lists, see the FortiGate Content Protection
Guide.
If you are reverting to a previous FortiOS version (for example, reverting from FortiOS
v2.50 to FortiOS v2.36) you may not be able to restore your previous configuration
from the backup configuration file.
FortiGate-400 Installation and Configuration Guide 97
Changing the FortiGate firmwareSystem status
Note: Installing firmware replaces your current antivirus and attack definitions with the
definitions included with the firmware release that you are installing. When you have installed
new firmware, use the procedure “Manually updating antivirus and attack definitions” on
page 119 to make sure that antivirus and attack definitions are up-to-date. You can also use the
CLI command
definitions.
execute updatecenter updatenow to update the antivirus and attack
To use the following procedure you must have a TFTP server that you can connect to
from the FortiGate unit.
1Make sure that the TFTP server is running.
2Copy the new firmware image file to the root directory of the TFTP server.
3Login to the FortiGate CLI as the admin administrative user.
4Make sure the FortiGate unit can connect to the TFTP server.
You can use the following command to ping the computer running the TFTP server.
For example, if the TFTP server's IP address is 192.168.1.168:
execute ping 192.168.1.168
5Enter the following command to copy the firmware image from the TFTP server to the
FortiGate unit:
execute restore image <name_str> <tftp_ip>
Where <name_str> is the name of the firmware image file on the TFTP server and
<tftp_ip> is the IP address of the TFTP server. For example, if the firmware image
file name is FGT_300-v250-build045-FORTINET.out and the IP address of the
TFTP server is 192.168.1.168, enter:
The FortiGate unit uploads the firmware image file. Once the file has been uploaded a
message similar to the following is displayed:
Get image from tftp server OK.
This operation will downgarde the current firmware version!
Do you want to continue? (y/n)
6Type Y
7The FortiGate unit reverts to the old firmware version, resets the configuration to
factory defaults, and restarts. This process takes a few minutes.
8Reconnect to the CLI.
For information about logging into the web-based manager when the FortiGate unit is
set to factory defaults, see “Connecting to the command line interface (CLI)” on
page 33.
9To confirm that the new firmware image has been loaded, enter:
get system status
10Restore your previous configuration. Use the following command:
execute restore config
11Use the procedure “Manually updating antivirus and attack definitions” on page 119 to
update antivirus and attack definitions, or from the CLI, enter:
execute updatecenter updatenow
98Fortinet Inc.
System status Changing the FortiGate firmware
12To confirm that the antivirus and attack definitions have been updated, enter the
following command to display the antivirus engine, virus and attack definitions version,
contract expiry, and last update attempt information.
get system objver
Install a firmware image from a system reboot using the CLI
This procedure installs a specified firmware image and resets the FortiGate unit to
default settings. You can use this procedure to upgrade to a new firmware version,
revert to an older firmware version, or to re-install the current firmware.
Note: There are a few variations on this procedure for different FortiGate BIOS versions. These
variations are explained in the procedure steps that are affected. The version of the BIOS
running on your FortiGate unit is displayed when you restart the FortiGate unit while accessing
the CLI by connecting to the FortiGate console port using a null-modem cable.
To run this procedure you:
•access the CLI by connecting to the FortiGate console port using a null-modem
cable,
•install a TFTP server that you can connect to from port1. The TFTP server should
be on the same subnet as port1.
Before running this procedure you can:
•Backup the FortiGate unit configuration, use the procedure “Backing up system
settings” on page 108.
•Backup the NIDS user defined signatures, see the FortiGate NIDS Guide
•Backup web content and email filtering lists, see the FortiGate Content Protection Guide.
If you are reverting to a previous FortiOS version (for example, reverting from FortiOS
v2.50 to FortiOS v2.36) you may not be able to restore your previous configuration
from the backup configuration file.
Note: Installing firmware replaces your current antivirus and attack definitions with the
definitions included with the firmware release that you are installing. When you have installed
new firmware, use the procedure “Manually updating antivirus and attack definitions” on
page 119 to make sure that antivirus and attack definitions are up-to-date.
To install firmware from a system reboot
1Connect to the CLI using the null modem cable and FortiGate console port.
2Make sure that the TFTP server is running.
3Copy the new firmware image file to the root directory of your TFTP server.
4Make sure that port1 is connected to the same network as the TFTP server.
5To confirm that the FortiGate unit can connect to the TFTP server, use the following
command to ping the computer running the TFTP server. For example, if the TFTP
server’s IP address is 192.168.1.168:
execute ping 192.168.1.168
FortiGate-400 Installation and Configuration Guide 99
Changing the FortiGate firmwareSystem status
6Enter the following command to restart the FortiGate unit:
execute reboot
As the FortiGate units starts, a series of system startup messages are displayed.
When one of the following messages appears:
•FortiGate unit running v2.x BIOS
Press Any Key To Download Boot Image.
...
•FortiGate unit running v3.x BIOS
Press any key to enter configuration menu.....
......
7Immediately press any key to interrupt the system startup.
I
Note: You only have 3 seconds to press any key. If you do not press any key soon enough, the
FortiGate unit reboots and you must log in and repeat the
execute reboot command.
If you successfully interrupt the startup process, one of the following messages
appears:
•FortiGate unit running v2.x BIOS
Enter TFTP Server Address [192.168.1.168]:
Go to step 9.
•FortiGate unit running v3.x BIOS
[G]: Get firmware image from TFTP server.
[F]: Format boot device.
[B]: Boot with backup firmware and set as default.
[Q]: Quit menu and continue to boot with default firmware.
[H]: Display this list of options.
Enter G,F,B,Q,or H:
8Type G to get the new firmware image from the TFTP server.
9Type the address of the TFTP server and press Enter.
The following message appears:
Enter Local Address [192.168.1.188]:
10Type the address of port1 and press Enter.
Note: The local IP address is only used to download the firmware image. After the firmware is
installed the address of this interface is changed back to the default IP address for this interface.
The following message appears:
Enter File Name [image.out]:
100Fortinet Inc.
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.