No part of this publication including text, examples, diagrams or illustrations may be reproduced,
transmitted, or translated in any form or by any means, electronic, mechanical, manual, optical or
otherwise, for any purpose, without prior written permission of Fortinet Inc.
FortiGate-4000 Installation and Configuration Guide
Version 2.50
February 5 2004
Trademarks
Products mentioned in this document are trademarks or registered trademarks of their respective
holders.
Regulatory Compliance
FCC Class A Part 15 CSA/CUS
CAUTION: RISK OF EXPLOSION IF BATTERY IS REPLACED BY AN INCORRECT TYPE.
DISPOSE OF USED BATTERIES ACCORDING TO THE INSTRUCTIONS.
For technical support, please visit http://www.fortinet.com.
Send information about errors or omissions in this document or any Fortinet technical documentation to
Index .................................................................................................................... 323
FortiGate-4000 Installation and Configuration Guide13
Contents
14 Fortinet Inc.
FortiGate-4000 Installation and Configuration Guide Version 2.50
Introduction
FortiGate Antivirus Firewalls support network-based deployment of application-level
services, including antivirus protection and full-scan content filtering. FortiGate
Antivirus Firewalls improve network security, reduce network misuse and abuse, and
help you use communications resources more efficiently without compromising the
performance of your network. FortiGate Antivirus Firewalls are ICSA-certified for
firewall, IPSec, and antivirus services.
The FortiGate Antivirus Firewall is a dedicated easily managed security device that
delivers a full suite of capabilities that include:
•application-level services such as virus protection and content filtering,
•network-level services such as firewall, intrusion detection, VPN, and traffic
shaping.
The FortiGate Antivirus Firewall uses Fortinet’s Accelerated Behavior and Content
Analysis System (ABACAS™) technology, which leverages breakthroughs in chip
design, networking, security, and content analysis. The unique ASIC-based
architecture analyzes content and behavior in real-time, enabling key applications to
be deployed right at the network edge, where they are most effective at protecting
your networks. The FortiGate series complements existing solutions, such as hostbased antivirus protection, and enables new applications and services while greatly
lowering costs for equipment, administration, and maintenance.
The FortiGate-4000 model is a chassis
based system that broadband Service
providers can use to provide subscriber
security services such as firewall, VPN,
and antivirus protection. The
FortiGate-4000 system scales from 1 to
10 blades enabling customers to add
incremental performance. Two basic
system configurations provides flexibility to meet the network layout of high
performance networks. The FortiGate-4000 supports high-end features including
802.1Q VLAN support, redundant hot-swappable power supplies and cooling, and
stateful failover HA.
FortiGate-4000 Installation and Configuration Guide 15
Antivirus protectionIntroduction
Antivirus protection
FortiGate ICSA-certified antivirus protection scans web (HTTP), file transfer (FTP),
and email (SMTP, POP3, and IMAP) content as it passes through the FortiGate unit. If
a virus is found, antivirus protection removes the file containing the virus from the
content stream and forwards a replacement message to the intended recipient.
For extra protection, you can configure antivirus protection to block specified file types
from passing through the FortiGate unit. You can use the feature to stop files that
might contain new viruses.
If the FortiGate unit contains a hard disk, infected or blocked files can be quarantined.
The FortiGate administrator can download quarantined files so that they can be virus
scanned, cleaned, and forwarded to the intended recipient. You can also configure the
FortiGate unit to automatically delete quarantined files after a specified time.
The FortiGate unit can send email alerts to system administrators when it detects and
removes a virus from a content stream. The web and email content can be in normal
network traffic or encrypted IPSec VPN traffic.
ICSA Labs has certified that FortiGate Antivirus Firewalls:
•detect 100% of the viruses listed in the current In The Wild List (www.wildlist.org),
•detect viruses in compressed files using the PKZip format,
•detect viruses in email that has been encoded using uuencode format,
•detect viruses in email that has been encoded using MIME encoding,
•log all actions taken while scanning.
Web content filtering
FortiGate web content filtering can scan all HTTP content protocol streams for URLs
or web page content. If there is a match between a URL on the URL block list, or a
web page contains a word or phrase that is in the content block list, the FortiGate unit
blocks the web page. The blocked web page is replaced with a message that you can
edit using the FortiGate web-based manager.
You can configure URL blocking to block all or some of the pages on a web site. Using
this feature, you can deny access to parts of a web site without denying access to it
completely.
To prevent unintentionally blocking legitimate web pages, you can add URLs to an
exempt list that overrides the URL blocking and content blocking lists.
Web content filtering also includes a script filter feature that can block unsecure web
content such as Java applets, cookies, and ActiveX.
You can use the Cerberian URL blocking to block unwanted URLs.
16Fortinet Inc.
Introduction Email filtering
Email filtering
FortiGate email filtering can scan all IMAP and POP3 email content for unwanted
senders or unwanted content. If there is a match between a sender address pattern
on the email block list, or an email contains a word or phrase in the banned word list,
the FortiGate adds an email tag to the subject line of the email. The recipient can use
the mail client software to filter messages based on the email tag.
You can configure email blocking to tag email from all or some senders within
organizations that are known to send spam email. To prevent unintentionally tagging
email from legitimate senders, you can add sender address patterns to an exempt list
that overrides the email block and banned words lists.
Firewall
The FortiGate ICSA-certified firewall protects your computer networks from Internet
threats. ICSA has granted FortiGate firewalls version 4.0 firewall certification,
providing assurance that FortiGate firewalls successfully screen and secure corporate
networks against a range of threats from public or other untrusted networks.
After basic installation of the FortiGate unit, the firewall allows users on the protected
network to access the Internet while blocking Internet access to internal networks. You
can configure the firewall to put controls on access to the Internet from the protected
networks and to allow controlled access to internal networks.
FortiGate policies include a range of options that:
•control all incoming and outgoing network traffic,
•control encrypted VPN traffic,
•apply antivirus protection and web content filtering,
•block or allow access for all policy options,
•control when individual policies are in effect,
•accept or deny traffic to and from individual addresses,
•control standard and user defined network services individually or in groups,
•require users to authenticate before gaining access,
•include traffic shaping to set access priorities and guarantee or limit bandwidth for
each policy,
•include logging to track connections for individual policies,
•include Network Address Translation (NAT) mode and Route mode policies,
•include mixed NAT and Route mode policies.
The FortiGate firewall can operate in NAT/Route mode or Transparent mode.
FortiGate-4000 Installation and Configuration Guide 17
VLANs and virtual domainsIntroduction
NAT/Route mode
In NAT/Route mode, you can create NAT mode policies and Route mode policies.
•NAT mode policies use network address translation to hide the addresses in a
more secure network from users in a less secure network.
•Route mode policies accept or deny connections between networks without
performing address translation.
Transparent mode
Transparent mode provides the same basic firewall protection as NAT mode. Packets
that the FortiGate unit receives are forwarded or blocked according to firewall policies.
The FortiGate unit can be inserted in the network at any point without having to make
changes to your network or its components. However, VPN and some advanced
firewall features are available only in NAT/Route mode.
VLANs and virtual domains
Fortigate Antivirus Firewalls support IEEE 802.1Q-compliant virtual LAN (VLAN) tags.
Using VLAN technology, a single FortiGate unit can provide security services to, and
control connections between, multiple security domains according to the VLAN IDs
added to VLAN packets. The FortiGate unit can recognize VLAN IDs and apply
security policies to secure network and IPSec VPN traffic between each security
domain. The FortiGate unit can also apply authentication, content filtering, and
antivirus protection to VLAN-tagged network and VPN traffic.
The FortiGate unit supports VLANs in NAT/Route and Transparent mode. In
NAT/Route mode, you enter VLAN subinterfaces to receive and send VLAN packets.
In Transparent mode, you create virtual domains and then add VLAN subinterfaces to
those virtual domains.
Network intrusion detection
The FortiGate Network Intrusion Detection System (NIDS) is a real-time network
intrusion detection sensor that detects and prevents a variety of suspicious network
activity. NIDS uses attack signatures to identify more than 1000 attacks. You can
enable and disable the attacks that the NIDS detects. You can also write user-defined
detection attack signatures.
NIDS prevention detects and prevents many common denial of service and packetbased attacks. You can enable and disable prevention attack signatures and
customize attack signature thresholds and other parameters.
To notify system administrators of the attack, the NIDS records the attack and any
suspicious traffic to the attack log, and can be configured to send alert emails.
Fortinet updates NIDS attack definitions periodically. You can download and install
updated attack definitions manually or you can configure the FortiGate unit to
automatically check for and download attack definition updates.
18Fortinet Inc.
Introduction VPN
VPN
Using FortiGate virtual private networking (VPN), you can provide a secure
connection between widely separated office networks or securely link telecommuters
or travellers to an office network. Service providers can also use the FortiGate unit to
provide VPN services for their clients.
FortiGate VPN features include the following:
•Industry standard and ICSA-certified IPSec VPN, including:
•IPSec, ESP security in tunnel mode,
•DES, 3DES (triple-DES), and AES hardware accelerated encryption,
•HMAC MD5 and HMAC SHA1 authentication and data integrity,
•AutoIKE key based on pre-shared key tunnels,
•IPSec VPN using local or CA certificates,
•Manual Keys tunnels,
•Diffie-Hellman groups 1, 2, and 5,
•Aggressive and Main Mode,
•Replay Detection,
•Perfect Forward Secrecy,
•XAuth authentication,
•Dead peer detection.
•PPTP for easy connectivity with the VPN standard supported by the most popular
operating systems.
•L2TP for easy connectivity with a more secure VPN standard, also supported by
many popular operating systems.
•Firewall policy based control of IPSec VPN traffic.
•IPSec NAT traversal so that remote IPSec VPN gateways or clients behind a NAT
can connect to an IPSec VPN tunnel.
•VPN hub and spoke using a VPN concentrator to allow VPN traffic to pass from
one tunnel to another through the FortiGate unit.
•IPSec Redundancy to create a redundant AutoIKE key IPSec VPN connection to a
remote network.
High availability
High Availability (HA) provides failover between two or more FortiGate units. Fortinet
achieves HA by using redundant hardware: matching FortiGate models running in
NAT/Route mode. You can configure the FortiGate units for either active-passive (A-P)
or active-active (A-A) HA.
Both A-P and A-A HA use similar redundant hardware configurations. High availability
software guarantees that if one of the FortiGate units in the HA group fails, all
functions, established firewall connections, and IPSec VPN sessions are maintained.
FortiGate-4000 Installation and Configuration Guide 19
Secure installation, configuration, and managementIntroduction
Secure installation, configuration, and management
The first time you power on the FortiGate unit, it is already configured with default IP
addresses and security policies. Connect to the web-based manager, set the
operating mode, and use the Setup wizard to customize FortiGate IP addresses for
your network, and the FortiGate unit is ready to protect your network. You can then
use the web-based manager to customize advanced FortiGate features.
Web-based manager
Using HTTP or a secure HTTPS connection from any computer running Internet
Explorer, you can configure and manage the FortiGate unit. The web-based manager
supports multiple languages. You can configure the FortiGate unit for HTTP and
HTTPS administration from any FortiGate interface.
You can use the web-based manager to configure most FortiGate settings. You can
also use the web-based manager to monitor the status of the FortiGate unit.
Configuration changes made using the web-based manager are effective immediately
without resetting the firewall or interrupting service. Once you are satisfied with a
configuration, you can download and save it. The saved configuration can be restored
at any time.
Figure 1: The FortiGate web-based manager and setup wizard
20Fortinet Inc.
Introduction Document conventions
Command line interface
You can access the FortiGate command line interface (CLI) by connecting a
management computer serial port to the FortiGate RS-232 serial console connector.
You can also use Telnet or a secure SSH connection to connect to the CLI from any
network that is connected to the FortiGate unit, including the Internet.
The CLI supports the same configuration and monitoring functionality as the
web-based manager. In addition, you can use the CLI for advanced configuration
options that are not available from the web-based manager.
This Installation and Configuration Guide contains information about basic and
advanced CLI commands. For a more complete description about connecting to and
using the FortiGate CLI, see the FortiGate CLI Reference Guide.
Logging and reporting
The FortiGate unit supports logging for various categories of traffic and configuration
changes. You can configure logging to:
•report traffic that connects to the firewall,
•report network services used,
•report traffic that was permitted by firewall policies,
•report traffic that was denied by firewall policies,
•report events such as configuration changes and other management events, IPSec
tunnel negotiation, virus detection, attacks, and web page blocking,
•report attacks detected by the NIDS,
•send alert email to system administrators to report virus incidents, intrusions, and
firewall or VPN events or violations.
Logs can be sent to a remote syslog server or a WebTrends NetIQ Security Reporting
Center and Firewall Suite server using the WebTrends enhanced log format. Some
models can also save logs to an optional internal hard drive. If a hard drive is not
installed, you can configure most FortiGate units to log the most recent events and
attacks detected by the NIDS to the system memory.
Document conventions
This guide uses the following conventions to describe CLI command syntax.
•angle brackets < > to indicate variable keywords
For example:
FortiGate-4000 Installation and Configuration Guide 21
Fortinet documentationIntroduction
execute restore config <filename_str>
You enter restore config myfile.bak
<xxx_str> indicates an ASCII string variable keyword.
<xxx_integer> indicates an integer variable keyword.
<xxx_ip> indicates an IP address variable keyword.
•vertical bar and curly brackets {|} to separate alternative, mutually exclusive
required keywords
For example:
set system opmode {nat | transparent}
You can enter set system opmode nat or set system opmode
transparent
•square brackets [ ] to indicate that a keyword is optional
For example:
get firewall ipmacbinding [dhcpipmac]
You can enter get firewall ipmacbinding or
get firewall ipmacbinding dhcpipmac
Fortinet documentation
Information about FortiGate products is available from the following FortiGate User
Manual volumes:
•Volume 1: FortiGate Installation and Configuration Guide
Describes installation and basic configuration for the FortiGate unit. Also describes
how to use FortiGate firewall policies to control traffic flow through the FortiGate
unit and how to use firewall policies to apply antivirus protection, web content
filtering, and email filtering to HTTP, FTP, and email content passing through the
FortiGate unit.
•Volume 2: FortiGate VPN Guide
Contains in-depth information about FortiGate IPSec VPN using certificates, preshared keys and manual keys for encryption. Also contains basic configuration
information for the Fortinet Remote VPN Client, detailed configuration information
for FortiGate PPTP and L2TP VPN, and VPN configuration examples.
•Volume 3: FortiGate Content Protection Guide
Describes how to configure antivirus protection, web content filtering, and email
filtering to protect content as it passes through the FortiGate unit.
22Fortinet Inc.
Introduction Customer service and technical support
•Volume 4: FortiGate NIDS Guide
Describes how to configure the FortiGate NIDS to detect and protect the FortiGate
unit from network-based attacks.
•Volume 5: FortiGate Logging and Message Reference Guide
Describes how to configure FortiGate logging and alert email. Also contains the
FortiGate log message reference.
•Volume 6: FortiGate CLI Reference Guide
Describes the FortiGate CLI and contains a reference to all FortiGate CLI
commands.
The FortiGate online help also contains procedures for using the FortiGate web-based
manager to configure and manage the FortiGate unit.
Comments on Fortinet technical documentation
You can send information about errors or omissions in this document, or any Fortinet
technical documentation, to techdoc@fortinet.com.
Customer service and technical support
For antivirus and attack definition updates, firmware updates, updated product
documentation, technical support information, and other resources, please visit the
Fortinet technical support web site at http://support.fortinet.com.
You can also register FortiGate Antivirus Firewalls from http://support.fortinet.com and
change your registration information at any time.
Fortinet email support is available from the following addresses:
amer_support@fortinet.com For customers in the United States, Canada, Mexico, Latin
apac_support@fortinet.com For customers in Japan, Korea, China, Hong Kong, Singapore,
eu_support@fortinet.comFor customers in the United Kingdom, Scandinavia, Mainland
For information on Fortinet telephone support, see http://support.fortinet.com.
When requesting technical support, please provide the following information:
•Your name
•Company name
•Location
•Email address
•Telephone number
•FortiGate unit serial number
•FortiGate model
•FortiGate FortiOS firmware version
•Detailed description of the problem
America and South America.
Malaysia, all other Asian countries, and Australia.
Europe, Africa, and the Middle East.
FortiGate-4000 Installation and Configuration Guide 23
Customer service and technical supportIntroduction
24Fortinet Inc.
FortiGate-4000 Installation and Configuration Guide Version 2.50
Getting started
This chapter describes unpacking, setting up, and powering on a FortiGate-4000
Antivirus Firewall. When you have completed the procedures in this chapter, you can
proceed to one of the following:
•If you are going to operate the FortiGate unit in NAT/Route mode, go to
“NAT/Route mode installation” on page 61.
•If you are going to operate the FortiGate unit in Transparent mode, go to
“Transparent mode installation” on page 69.
•If you are going to operate two or more FortiGate units in HA mode, go to “High
availability” on page 81.
This chapter describes:
•Warnings and cautions
•Package contents
•Physical description
•Front panel features
•Rear panel features
•Installing hardware
•Turning FortiGate-4000 chassis power on and off
•Hot swapping modules
•Connecting to the web-based manager
•Connecting to the Command Line Interface (CLI)
•Factory default configuration
•Planning the FortiGate configuration
•FortiGate model maximum values matrix
•Next steps
FortiGate-4000 Installation and Configuration Guide 25
Warnings and cautionsGetting started
!
Warnings and cautions
You should be aware of the following cautions and warnings before operating the
FortiGate-4000 antivirus firewall.
Warning
Turning off all power switches may not turn off all power to the FortiGate-4000 unit.
Disconnect the FortiGate-4000 unit from its power source and from any
telecommunications links and networks before installing and removing FortiGate-4000
components or performing other maintenance tasks. Failure to do this can result in
personal injury or equipment damage. Some circuitry in the unit may continue to
operate even though all power switches are off.
The procedures in this chapter are for qualified technical personnel with experience
installing and configuring servers. Read and adhere to all warnings, cautions, and
notices in this chapter.
Caution: Electrostatic discharge (ESD) can damage FortiGate-4000 components. You should
only perform the procedures described in this chapter from an ESD workstation. If no such
station is available, you can provide some ESD protection by wearing an anti-static wrist strap
and attaching it to a metal part of the FortiGate-4000 chassis.
Package contents
The FortiGate-4000 package consists of two or more packages. One or more of the
packages contains two FortiBlade-4010 modules. Each FortiBlade-4010 module is
capable of functioning as a standalone FortiGate-4000 antivirus firewall or being part
of a FortiGate-4000 HA cluster.
The other package contains the following components:
•FortiGate-4000 chassis which includes the following components (already
•Three power cables,
•One RJ-45 to DB-9 serial cable (only the black header works with the
•One mounting rail kit,
•One FortiGate-4000 QuickStart Guide,
•One documentation CD containing Fortinet user documentation.
•One 10/100 out of band management module (rear panel).
FortiGate-4000 unit),
26Fortinet Inc.
Getting started Physical description
Figure 2: FortiGate-4000 package contents
FortiGate-4000P Chassis (back view)
KVM/ACCESS
PWR/KVMSTATUS
LAN 1 LAN 2
POWER ON/OFF
Physical description
The FortiGate-4000 chassis is a 4U 19-inch rack mounted steel shelf with the
following features:
•High density design accommodates up to 10 FortiBlade-4010 modules,
•Gigabit LAN interfaces,
•SFP connectors for multimode fibre optic interfaces (FortiGate-4000S),
•Built-in KVM switch module,
•Hot-swappable FortiBlade-4010 modules, power modules, and cooling fan trays,
•Redundant power modules for high reliability.
FortiGate-4000 Installation and Configuration Guide 27
Front panel featuresGetting started
Table 1: FortiGate-4000 chassis
Dimensions42.6 x 17.7 x 67.0 cm 16.78 x 6.97 x 26.40 in.
WeightMinimum: 28 kg (61 lb) (no FortiBlade-4010 modules installed)
Operating Environment Temperature: 0 to 35°C
Storage EnvironmentTemperature: -20 to 80°C
Power dissipationMinimum: 1050 watts
Power Requirements100 ~ 230 VAC input
Power ConsumptionMinimum: 1.3 KVA (3+1 redundancy)
Front panel features
physical description
(W x H x D)
Maximum: 50 kg (110 lb) when full configured.
FortiBlade-4010: 2 kg
Relative humidity: 10% to 90% (Non-condensing)
Relative humidity: 10% to 90% (Non-condensing)
Maximum: 2100 watts
AC inlet x 3
Maximum: 2.6 KVA (6+1 redundancy)
Figure 3 shows the location of the FortiGate-4000 chassis front panel components.
The front panel contains and provides access to up to 10 FortiBlade-4010 modules
and the KVM switch module.
Figure 3: FortiGate-4000 chassis front panel
KVM/ACCESS
PWR/KVMSTATUS
LAN 1 LAN 2
POWER ON/OFF
Note: Do not operate the FortiGate-4000 chassis with open slots on the front panel. For
optimum cooling performance, all front panel slots must either contain a FortiBlade-4010
module or be covered by an empty slot cover.
28Fortinet Inc.
Getting started Front panel features
FortiBlade-4010 module
Each FortiBlade-4010 module is an independent FortiGate-4000 antivirus firewall
capable of operating at gigabit network speeds. You can install up to 10
FortiBlade-4010 modules in the FortiGate-4000 chassis. Each FortiBlade-4010
module can operate as a standalone FortiGate-4000 antivirus firewall or you can
group FortiBlade-4010 modules into high availability (HA) clusters. Each cluster
provides failover between the FortiBlade-4010 modules in the cluster. In addition,
when operating in active-active HA mode, the FortiBlade-4010 clusters provide
antivirus scanning load balancing to increase virus scanning performance.
Figure 4: FortiBlade-4010 front panel
Mounting Knots
KVM/ACCESS
button
PWR/KVM and
STATUS LEDs
LAN 1 and
LAN 2 LEDs
KVM/ACCESS
PWR/KVMSTATUS
LAN 1 LAN 2
Not used
Power button
POWER ON/OFF
Module lock
and handle
Table 2: FortiBlade-4010 module front panel buttons
ButtonDescription
KVM/AccessPress and hold for approximately 5 seconds for KVM access to a
FortiBlade-4010 module.
PowerPower the FortiBlade-4010 module on or off.
FortiGate-4000 Installation and Configuration Guide 29
Front panel featuresGetting started
Table 3: FortiBlade-4010 module front panel LEDs
LEDStateDescription
PWR/KVMBlueThe FortiBlade-4010 module is powered on.
GreenKVM access to this FortiBlade-4010 module is enabled.
STATUSOffNormal operation.
RedSystem Fault.
LAN 1GreenThe correct cable is connected to the internal interface of this
FortiBlade-4010 module and the connected equipment has power.
FlashingNetwork activity at the internal interface of this FortiBlade-4010
module.
LAN 2GreenThe correct cable is connected to the external interface of this
FortiBlade-4010 module and the connected equipment has power.
FlashingNetwork activity at the external interface of this FortiBlade-4010
module.
KVM switch module
Use the KVM switch module to switch serial connections to the CLI of each
FortiBlade-4010 module installed in the FortiGate-4000 chassis. To access the CLI,
connect the the black header of the RJ-45 to DB-9 serial cable to the management
module (see “Management module” on page 33) and to a management PC. You can
use the FortiBlade select buttons on the KVM switch module to select the FortiBlade4010 module that you can connect to.
Figure 5: KVM switch module front panel
Mounting Knot
ALARM
KVM
FortiBlade
select buttons
Not used
Not used
ALARM
KVM
30Fortinet Inc.
Loading...
+ 302 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.