No part of this publication including text, examples, diagrams or illustrations may be reproduced,
transmitted, or translated in any form or by any means, electronic, mechanical, manual, optical or
otherwise, for any purpose, without prior written permission of Fortinet Inc.
FortiGate-400 Installation and Configuration Guide
Version 2.50 MR2
18 August 2003
Trademarks
Products mentioned in this document are trademarks or registered trademarks of their respective
holders.
Regulatory Compliance
FCC Class A Part 15 CSA/CUS
CAUTION: RISK OF EXPLOSION IF BATTERY IS REPLACED BY AN INCORRECT TYPE.
DISPOSE OF USED BATTERIES ACCORDING TO THE INSTRUCTIONS.
For technical support, please visit http://www.fortinet.com.
Send information about errors or omissions in this document or any Fortinet technical documentation to
Index .................................................................................................................... 299
Contents
FortiGate-400 Installation and Configuration Guide13
Contents
14 Fortinet Inc.
FortiGate-400 Installation and Configuration Guide Version 2.50 MR2
Introduction
The FortiGate Antivirus Firewall supports network-based deployment of
application-level services—including antivirus protection and full-scan content filtering.
FortiGate Antivirus Firewalls improve network security, reduce network misuse and
abuse, and help you use communications resources more efficiently without
compromising the performance of your network. FortiGate Antivirus Firewalls are
ICSA-certified for firewall, IPSec and antivirus services.
Your FortiGate Antivirus Firewall is a dedicated easily managed security device that
delivers a full suite of capabilities that include:
•application-level services such as virus protection and content filtering,
•network-level services such as firewall, intrusion detection, VPN, and traffic
shaping.
Your FortiGate Antivirus Firewall employs Fortinet’s Accelerated Behavior and
Content Analysis System (ABACAS™) technology, which leverages breakthroughs in
chip design, networking, security, and content analysis. The unique ASIC-based
architecture analyzes content and behavior in real-time, enabling key applications to
be deployed right at the network edge where they are most effective at protecting your
networks. The FortiGate series complements existing solutions, such as host-based
antivirus protection, and enables new applications and services while greatly lowering
costs for equipment, administration and maintenance.
The FortiGate-400 model meets
enterprise-class requirements for
performance, availability, and reliability.
With throughput up to 500Mbps and
high-availability features including
automatic failover with no session loss, the FortiGate-400 is the choice for mission
critical applications.
Antivirus protection
FortiGate ICSA-certified antivirus protection virus scans web (HTTP), file transfer
(FTP), and email (SMTP, POP3, and IMAP) content as it passes through the
FortiGate. If a virus is found, antivirus protection removes the file containing the virus
from the content stream and forwards an replacement message to the intended
recipient.
FortiGate-400 Installation and Configuration Guide 15
Web content filteringIntroduction
For extra protection, you also configure antivirus protection to block files of specified
file types from passing through the FortiGate unit. You can use the feature to stop files
that may contain new viruses.
If the FortiGate unit contains a hard disk, infected or blocked files can be quarantined.
The FortiGate administrator can download quarantined files, so that they can be virus
scanned, cleaned, and forwarded to the intended recipient. You can also configure the
FortiGate unit to automatically delete quarantined files after a specified time period.
The FortiGate unit can send email alerts to system administrators when it detects and
removes a virus from a content stream. The web and email content can be in normal
network traffic or in encrypted IPSec VPN traffic.
ICSA Labs has certified that FortiGate Antivirus Firewalls:
•detect 100% of the viruses listed in the current In The Wild List (www.wildlist.org),
•detect viruses in compressed files using the PKZip format,
•detect viruses in e-mail that has been encoded using uuencode format,
•detect viruses in e-mail that has been encoded using MIME encoding,
•log all actions taken while scanning.
Web content filtering
FortiGate web content filtering can be configured to scan all HTTP content protocol
streams for URLs or for web page content. If a match is found between a URL on the
URL block list, or if a web page is found to contain a word or phrase in the content
block list, the FortiGate blocks the web page. The blocked web page is replaced with a
message that you can edit using the FortiGate web-based manager.
You can configure URL blocking to block all or just some of the pages on a web site.
Using this feature you can deny access to parts of a web site without denying access
to it completely.
To prevent unintentional blocking of legitimate web pages, you can add URLs to an
Exempt List that overrides the URL blocking and content blocking lists.
Web content filtering also includes a script filter feature that can be configured to block
unsecure web content such as Java Applets, Cookies, and ActiveX.
You can also use the Cerberian URL blocking to block unwanted URLs.
Email filtering
FortiGate Email filtering can be configured to scan all IMAP and POP3 email content
for unwanted senders or for unwanted content. If a match is found between a sender
address pattern on the Email block list, or if an email is found to contain a word or
phrase in the banned word list, the FortiGate adds a Email tag to subject line of the
email. Receivers can then use their mail client software to filter messages based on
the Email tag.
16Fortinet Inc.
Introduction Firewall
You can configure Email blocking to tag email from all or some senders within
organizations that are known to send spam email. To prevent unintentional tagging of
email from legitimate senders, you can add sender address patterns to an exempt list
that overrides the email block and banned word lists.
Firewall
The FortiGate ICSA-certified firewall protects your computer networks from the hostile
environment of the Internet. ICSA has granted FortiGate firewalls version 4.0 firewall
certification, providing assurance that FortiGate firewalls successfully screen for and
secure corporate networks against a wide range of threats from public or other
untrusted networks.
After basic installation of the FortiGate unit, the firewall allows users on the protected
network to access the Internet while blocking Internet access to internal networks. You
can modify this firewall configuration to place controls on access to the Internet from
the protected networks and to allow controlled access to internal networks.
FortiGate policies include a complete range of options that:
•control all incoming and outgoing network traffic,
•control encrypted VPN traffic,
•apply antivirus protection and web content filtering,
•block or allow access for all policy options,
•control when individual policies are in effect,
•accept or deny traffic to and from individual addresses,
•control standard and user defined network services individually or in groups,
•require users to authenticate before gaining access,
•include traffic shaping to set access priorities and guarantee or limit bandwidth for
each policy,
•include logging to track connections for individual policies,
•include Network address translation (NAT) mode and Route mode policies,
•include Mixed NAT and Route mode policies.
The FortiGate firewall can operate in NAT/Route mode or Transparent mode.
NAT/Route mode
In NAT/Route mode, you can create NAT mode policies and Route mode policies.
•NAT mode policies use network address translation to hide the addresses in a
more secure zone from users in a less secure zone.
•Route mode policies accept or deny connections between zones without
performing address translation.
FortiGate-400 Installation and Configuration Guide 17
VLANIntroduction
Transparent mode
Transparent mode provides the same basic firewall protection as NAT mode. Packets
received by the FortiGate unit are intelligently forwarded or blocked according to
firewall policies. The FortiGate unit can be inserted in your network at any point
without the need to make changes to your network or any of its components.
However, VPN, VLAN, multi-zone functionality, and some advanced firewall features
are only available in NAT/Route mode.
VLAN
Fortigate Antivirus Firewalls support IEEE 802.1Q-compliant virtual LAN (VLAN) tags.
Using VLAN technology a single FortiGate unit can provide security services to, and
control connections between multiple security domains according to the VLAN IDs
added to VLAN packets. The FortiGate unit can recognize VLAN IDs and apply
security policies to secure network and IPSec VPN traffic between each security
domain. It can also apply authentication, content filtering, and antivirus protection to
VLAN-tagged network and VPN traffic.
Network intrusion detection
The FortiGate Network Intrusion Detection System (NIDS) is a real-time network
intrusion detection sensor that detects and prevents a wide variety of suspicious
network activity. NIDS detection uses attack signatures to identify over 1000 attacks.
You can enable and disable the attacks that the NIDS detects. You can also write your
own user-defined detection attack signatures.
NIDS prevention detects and prevents many common denial of service and packetbased attacks. You can enable and disable prevention attack signatures and
customize attack signature thresholds and other parameters.
To notify system administrators of the attack, the NIDS records the attack and any
suspicious traffic to the attack log and can be configured to send alert emails.
Fortinet updates NIDS attack definitions periodically. You can download and install
updated attack definitions manually, or you can configure the FortiGate to
automatically check for and download attack definition updates.
18Fortinet Inc.
Introduction VPN
VPN
Using FortiGate virtual private networking (VPN), you can provide a secure
connection between widely separated office networks or securely link telecommuters
or travellers to an office network.
FortiGate VPN features include the following:
•Industry standard and ICSA-certified IPSec VPN including:
•IPSec, ESP security in tunnel mode,
•DES, 3DES (triple-DES), and AES hardware accelerated encryption,
•HMAC MD5 and HMAC SHA1 authentication and data integrity,
•AutoIKE key based on pre-shared key tunnels,
•IPSec VPN using local or CA certificates,
•Manual Keys tunnels,
•Diffie-Hellman groups 1, 2, and 5,
•Aggressive and Main Mode,
•Replay Detection,
•Perfect Forward Secrecy,
•XAuth authentication,
•Dead peer detection.
•PPTP for easy connectivity with the VPN standard supported by the most popular
operating systems.
•L2TP for easy connectivity with a more secure VPN standard also supported by
many popular operating systems.
•Firewall policy based control of IPSec VPN traffic.
•IPSec NAT traversal so that remote IPSec VPN gateways or clients behind a NAT
can connect to an IPSec VPN tunnel.
•VPN hub and spoke using a VPN concentrator to allow VPN traffic to pass from
one tunnel to another tunnel through the FortiGate unit.
•IPSec Redundancy to create a redundant AutoIKE key IPSec VPN connection to a
remote network.
High availability
High Availability (HA) provides fail-over between two or more FortiGate units. Fortinet
achieves HA through the use of redundant hardware: matching FortiGate models
running in NAT/Route mode. You can configure the FortiGate units for either
active-passive (A-P) or active-active (A-A) HA.
Both A-P and A-A HA use similar redundant high availability hardware configurations.
High availability software guarantees that if one of the FortiGate units in the HA group
fails, all functions, established firewall connections, and IPSec VPN sessions are
maintained.
FortiGate-400 Installation and Configuration Guide 19
Secure installation, configuration, and managementIntroduction
Secure installation, configuration, and management
Installation is quick and simple. The first time you turn on the FortiGate unit, it is
already configured with default IP addresses and security policies. Connect to the
web-based manager, set the operating mode, and use the setup wizard to customize
FortiGate IP addresses for your network, and the FortiGate unit is set to protect your
network. You can then use the web-based manager to customize advanced FortiGate
features to meet your needs.
You can also create a basic configuration using the FortiGate front panel control
buttons and LCD.
Web-based manager
Using HTTP or a secure HTTPS connection from any computer running Internet
Explorer, you can configure and manage the FortiGate unit. The web-based manager
supports multiple languages. You can configure the FortiGate unit for HTTP and
HTTPs administration from any FortiGate interface.
You can use the web-based manager for most FortiGate configuration settings. You
can also use the web-based manager to monitor the status of the FortiGate unit.
Configuration changes made with the web-based manager are effective immediately
without the need to reset the firewall or interrupt service. Once a satisfactory
configuration has been established, it can be downloaded and saved. The saved
configuration can be restored at any time.
Figure 1: The FortiGate web-based manager and setup wizard
20Fortinet Inc.
Introduction Secure installation, configuration, and management
Command line interface
You can access the FortiGate command line interface (CLI) by connecting a
management computer serial port to the FortiGate RS-232 serial Console connector.
You can also use Telnet or a secure SSH connection to connect to the CLI from any
network connected to the FortiGate, including the Internet.
The CLI supports the same configuration and monitoring functionality as the
web-based manager. In addition, you can use the CLI for advanced configuration
options not available from the web-based manager. This Installation and Configuration Guide contains information about basic and advanced CLI commands.
You can find a more complete description of connecting to and using the FortiGate CLI
in the FortiGate CLI Reference Guide.
Logging and reporting
The FortiGate supports logging of various categories of traffic and of configuration
changes. You can configure logging to:
•report traffic that connects to the firewall,
•report network services used,
•report traffic permitted by firewall policies,
•report traffic that was denied by firewall policies,
•report events such as configuration changes and other management events, IPSec
tunnel negotiation, virus detection, attacks, and web page blocking,
•report attacks detected by the NIDS,
•send alert email to system administrators to report virus incidents, intrusions, and
firewall or VPN events or violations.
Logs can be sent to a remote syslog server or to a WebTrends NetIQ Security
Reporting Center and Firewall Suite server using the WebTrends enhanced log
format. Some models can also save logs to an optional internal hard drive. If a hard
drive is not installed, you can configure most FortiGates to log the most recent events
and attacks detected by the NIDS to shared system memory.
FortiGate-400 Installation and Configuration Guide 21
What’s new in Version 2.50Introduction
What’s new in Version 2.50
This section presents a brief summary of some of the new features in FortiOS v2.50:
System administration
•Improved graphical FortiGate system health monitoring that includes CPU and
memory usage, session number and network bandwidth usage, and the number of
viruses and intrusions detected. See “System status” on page 110.
•Revised antivirus and attack definition update functionality that connects to a new
version of the FortiResponse Distribution network. Updates can now be scheduled
hourly and the System > Update page displays more information about the current
update status. See “Updating antivirus and attack definitions” on page 115.
•Direct connection to the Fortinet tech support web page from the web-based
manager. You can register your FortiGate unit and get access to other technical
support resources. See “Registering FortiGate units” on page 125.
Network configuration
•Changes have been made to how zones are added and used. See “Configuring
zones” on page 133.
•Changes have been made to how VLANs are added and used. See “Configuring
VLANs” on page 139.
•New interface configuration options. See “Configuring interfaces” on page 135.
•Ping server and dead gateway detection for all interfaces.
•HTTP and Telnet administrative access to any interface.
•Secondary IP addresses for all FortiGate interfaces.
•Reserve IP/MAC pair combinations for DHCP servers (CLI only).
Routing Information Protocol (RIP)
•New RIP v1 and v2 functionality. See “RIP configuration” on page 149.
SNMP
•SNMP v1 and v2 support.
•Support for RFC 1213 and RFC 2665
•Monitoring of all FortiGate configuration and functionality
•See “Configuring SNMP” on page 162
22Fortinet Inc.
Introduction What’s new in Version 2.50
HA
•Active-active HA using switches and with the ability to select the schedule
•Transparent mode HA
•A/V update for HA clusters
•Configuration synchronizing for HA
See “High availability” on page 75.
Replacement messages
You can customize messages sent by the FortiGate unit:
•When a virus is detected,
•When a file is blocked,
•When a fragmented email is blocked
•When an alert email is sent
See “Customizing replacement messages” on page 164.
Firewall
•The firewall default configuration has changed. See “Default firewall configuration”
on page 170.
•Add virtual IPs to all interfaces. See “Virtual IPs” on page 188.
•Add content profiles to firewall policies to configure blocking, scanning, quarantine,
web content blocking, and email filtering. See “Content profiles” on page 197.
Users and authentication
•LDAP authentication. See “Configuring LDAP support” on page 205.
VPN
See the FortiGate VPN Guide for a complete description of FortiGate VPN
functionality. New features include:
•Phase 1
•AES encryption
•Certificates
•Advanced options including Dialup Group, Peer, XAUTH, NAT Traversal, DPD
•Phase 2
•AES encryption
•Encryption policies select service
•Generate and import local certificates
•Import CA certificates
FortiGate-400 Installation and Configuration Guide 23
What’s new in Version 2.50Introduction
NIDS
See the FortiGate NIDS Guide for a complete description of FortiGate NIDS
functionality. New features include:
•Attack detection signature groups
•User-configuration attack prevention
•Monitor multiple interfaces for attacks
•Monitor VLAN subinterfaces for attacks
•User-defined attack detection signatures
Antivirus
See the FortiGate Content Protection Guide for a complete description of FortiGate
antivirus functionality. New features include:
•Content profiles
•Quarantine for files containing viruses or files that are blocked
•Blocking oversized files
Web Filter
See the FortiGate Content Protection Guide for a complete description of FortiGate
web filtering functionality. New features include:
•Cerberian URL Filtering
Email filter
See the FortiGate Content Protection Guide for a complete description of FortiGate
email filtering functionality.
Logging and Reporting
See the FortiGate Logging and Message Reference Guide for a complete description
of FortiGate logging.
•Log to remote host CSV format
•Log message levels: Emergency, Alert, critical, error, Warning, notification,
information
•Log level policies
•Traffic log filter
•New antivirus, web filter, and email filter logs
•Alert email supports authentication
•Suppress email flooding
•Extended WebTrends support for graphing activity
24Fortinet Inc.
Introduction About this document
About this document
This installation and configuration guide describes how to install and configure the
FortiGate-400. This document contains the following information:
•Getting started describes unpacking, mounting, and powering on the FortiGate.
•NAT/Route mode installation describes how to install the FortiGate if you are
planning on running it in NAT/Route mode.
•Transparent mode installation describes how to install the FortiGate if you are
planning on running it in Transparent mode.
•High availability describes how to install and configure the FortiGate in a high
availability configuration.
•System status describes how to view the current status of your FortiGate unit and
related status procedures including installing updated FortiGate firmware, backing
up and restoring system settings, and switching between Transparent and
NAT/Route mode.
•Virus and attack definitions updates and registration describes configuring
automatic virus and attack definition updates. This chapter also contains
procedures for connecting to the FortiGate tech support webs site and for
registering your FortiGate unit.
•Network configuration describes configuring interfaces, zones, and VLANs and
configuring routing.
•RIP configuration describes the FortiGate RIP2 implementation and how to
configure RIP settings.
•System configuration describes system administration tasks available from the
System > Config web-based manager pages. This chapter describes setting
system time, adding and changed administrative users, configuring SNMP, and
editing replacement messages.
•Firewall configuration describes how to configure firewall policies to control traffic
through the FortiGate unit and apply content protection profiles to content traffic.
•Users and authentication describes how to add user names to the FortiGate user
database and how to configure the FortiGate to connect to a RADIUS server to
authenticate users.
•IPSec VPN describes how to configure FortiGate IPSec VPN.
•PPTP and L2TP VPN describes how to configure PPTP and L2TP VPNs between
the FortiGate and a windows client.
•Network Intrusion Detection System (NIDS) describes how to configure the
FortiGate NIDS to detect and prevent network attacks.
•Antivirus protection describes how use the FortiGate to protect your network from
viruses and worms.
•Web filtering describes how to configure web content filtering to prevent unwanted
Web content from passing through the FortiGate.
•Email filter describes how to configure email filtering to screen unwanted email
content.
•Logging and reporting describes how to configure logging and alert email to track
activity through the FortiGate.
•The Glossary defines many of the terms used in this document.
FortiGate-400 Installation and Configuration Guide 25
Document conventionsIntroduction
Document conventions
This guide uses the following conventions to describe CLI command syntax.
•angle brackets < > to indicate variable keywords
For example:
execute restore config <filename_str>
You enter restore config myfile.bak
<xxx_str> indicates an ASCII string variable keyword.
<xxx_integer> indicates an integer variable keyword.
<xxx_ip> indicates an IP address variable keyword.
•vertical bar and curly brackets {|} to separate alternative, mutually exclusive
required keywords
For example:
set system opmode {nat | transparent}
You can enter set system opmode nat or set system opmode
transparent
•square brackets [ ] to indicate that a keyword is optional
For example:
get firewall ipmacbinding [dhcpipmac]
You can enter get firewall ipmacbinding or
get firewall ipmacbinding dhcpipmac
26Fortinet Inc.
Introduction Fortinet documentation
Fortinet documentation
Information about FortiGate products is available from the following FortiGate User
Manual volumes:
•Volume 1: FortiGate Installation and Configuration Guide
Describes installation and basic configuration for the FortiGate unit. Also describes
how to use FortiGate firewall policies to control traffic flow through the FortiGate
unit and how to use firewall policies to apply antivirus protection, web content
filtering, and email filtering to HTTP, FTP and email content passing through the
FortiGate unit.
•Volume 2: FortiGate VPN Guide
Contains in-depth information about FortiGate IPSec VPN using certificates, preshared keys and manual keys for encryption. Also contains basic configuration
information for the Fortinet Remote VPN Client, detailed configuration information
for FortiGate PPTP and L2TP VPN, and VPN configuration examples.
•Volume 3: FortiGate Content Protection Guide
Describes how to configure antivirus protection, web content filtering, and email
filtering to protect content as it passes through the FortiGate unit.
•Volume 4: FortiGate NIDS Guide
Describes how to configure the FortiGate NIDS to detect and protect the FortiGate
unit from network-based attacks.
•Volume 5: FortiGate Logging and Message Reference Guide
Describes how to configure FortiGate logging and alert email. Also contains the
FortiGate log message reference.
•Volume 6: FortiGate CLI Reference Guide
Describes the FortiGate CLI and contains a reference to all FortiGate CLI
commands.
The FortiGate online help also contains procedures for using the FortiGate web-based
manager to configure and manage your FortiGate unit.
Comments on Fortinet technical documentation
You can send information about errors or omissions in this document or any Fortinet
technical documentation to techdoc@fortinet.com.
FortiGate-400 Installation and Configuration Guide 27
Customer service and technical supportIntroduction
Customer service and technical support
For antivirus and attack definition updates, firmware updates, updated product
documentation, technical support information, and other resources, please visit the
Fortinet technical support web site at http://support.fortinet.com.
You can also register FortiGate Antivirus Firewalls from http://support.fortinet.com and
modify your registration information at any time.
Fortinet email support is available from the following addresses:
amer_support@fortinet.com For customers in the United States, Canada, Mexico, Latin
apac_support@fortinet.com For customers in Japan, Korea, China, Hong Kong, Singapore,
eu_support@fortinet.comFor customers in the United Kingdom, Scandinavia, Mainland
For information on Fortinet telephone support, see http://support.fortinet.com.
When requesting technical support, please provide the following information:
•Your name
•Company name
•Location
•Email address
•Telephone number
•FortiGate unit serial number
•FortiGate model
•FortiGate FortiOS firmware version
•Detailed description of the problem
America and South America.
Malaysia, all other Asian countries, and Australia.
Europe, Africa, and the Middle East.
28Fortinet Inc.
FortiGate-400 Installation and Configuration Guide Version 2.50 MR2
Getting started
This chapter describes unpacking, setting up, and powering on your FortiGate
Antivirus Firewall. When you have completed the procedures in this chapter, you can
proceed to one of the following:
•If you are going to operate the FortiGate unit in NAT/Route mode, go to
“NAT/Route mode installation” on page 45.
•If you are going to operate the FortiGate unit in Transparent mode, go to
“Transparent mode installation” on page 61.
•If you are going to operate two or more FortiGate units in HA mode, go to “High
availability” on page 75.
This chapter describes:
•Package contents
•Mounting
•Powering on
•Connecting to the web-based manager
•Connecting to the command line interface (CLI)
•Factory default FortiGate configuration settings
•Planning your FortiGate configuration
•FortiGate model maximum values matrix
•Next steps
FortiGate-400 Installation and Configuration Guide 29
Package contentsGetting started
Package contents
The FortiGate-400 package contains the following items:
•FortiGate-400 Antivirus Firewall
•one orange crossover ethernet cable
•one gray regular ethernet cable
•one null modem cable
•FortiGate-400 QuickStart Guide
•one power cable
•CD containing the FortiGate user documentation
•two 19-inch rack mount brackets
Figure 2: FortiGate-400 package contents
Ethernet Cables:
Orange - Crossover
Grey - Straight-through
Null-Modem Cable
(RS-232)
EscEnter
Front
1
CONSOLE
4 / HA3
2
Mounting
LCDControl
Buttons
RS-232 Serial
Connection
Interface
1, 2, 3, 4/HA
Power
Light
Power Cable
Back
Rack-Mount Brackets
FortiGate-400
4 / HA3
1
CONSOLE
2
Esc Enter
QuickStart Guide
Copyright 2003 Fortinet Incorporated. All rights reserved.
Trademarks
Products mentioned in this document are trademarks.
Documentation
Removable
Hard Drive
Power
Switch
Power
Connection
USER MANUAL
The FortiGate-400 unit can be mounted in a standard 19-inch rack. It requires 1 U of
vertical space in the rack.
The FortiGate-400 unit can also be installed as a free-standing appliance on any
stable surface. For free-standing installation, make sure that the appliance has at least
1.5 in. (3.75 cm) of clearance on each side to allow for adequate air flow and cooling.
Dimensions
•16.75 x 12 x 1.75 in. 42.7 x 30.5 x 4.5 cm
Weight
•11 lb. (5 kg)
30Fortinet Inc.
Loading...
+ 278 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.