Dynamic Threat Prevention System (DTPS), APSecure, FortiASIC,
FortiBIOS, FortiBridge, FortiClient, FortiGate, FortiGate Unified Threat
Management System, FortiGuard, FortiGuard-Antispam, FortiGuardAntivirus, FortiGuard-Intrusion, FortiGuard-Web, FortiLog, FortiAnalyzer,
FortiManager, Fortinet, FortiOS, FortiPartner, FortiProtect, FortiReporter,
FortiResponse, FortiShield, FortiVoIP, and FortiWiFi are trademarks of
Fortinet, Inc. in the United States and/or other countries. The names of
actual companies and products mentione d herein may be the trade marks
of their respective owners.
FortiGate Version 3 .0 MR4 Administration Guide
01-30004-0203-2007010215
Page 16
Contents
FortiGate Version 3 .0 MR4 Administration Guide
1601-30004-0203-20070102
Page 17
Introduction
Introduction
Welcome and thank you for selecting Fortinet products for your real-time network
protection.
FortiGate™ ASIC-accelerated multi-threat security systems improve network
security, reduce network misuse and abuse, and help you use communications
resources more efficiently without compromising the performance of your
network. FortiGate Systems are ICSA-certified for Antivirus, Firewall, IPSec,
SSL-TLS, IPS, Intrusion detection, and AntiSpyware services.
FortiGate Systems are dedicated, easily managed security device that delivers a
full suite of capabilities including:
•Application-level services such as virus protection, intrusion protection, spam
•Network-level services such as firewall, intrusion detection, IPSec and SSL
•Management services such as user authentication, logging, reporting with
The FortiGate security system uses Fortinet’s Dynamic Threat Prevention System
(DTPS™) technology, which leverages breakthroughs in chip design, networking,
security and content analysis. The unique ASIC-accelerated architecture anal yzes
content and behavior in real-time, enabling key applications to be deployed right
at the network edge where they are most effective at protecting your networks.
filtering, web content filtering, IM, P2P, and VoIP filtering
VPN, and traffic shaping
FortiAnalyzer, administration profiles, secure web and CLI administrative
access, and SNMP
This chapter contains the following sections:
•Introducing the FortiGate units
•Fortinet family of products
•About this document
•FortiGate documentation
•Customer service and technical support
FortiGate Version 3.0 MR4 Administration Guide
01-30004-0203-2007010217
Page 18
Introducing the FortiGat e un i tsIntroduction
5
5
Introducing the FortiGate units
All FortiGate Unified Threat Management Systems from the FortiGate-50B to the
FortiGate-5000 series deliver similar SOHO or enterprise-class network-based
antivirus, content filtering, firewall, VPN, and network-based intrusion
detection/prevention features.
FortiGate-5000 series chassis
The FortiGate-5000 series Security Systems are chassis-based systems that
MSSPs and large enterprises can use to provide subscriber security services
such as firewall, VPN, antivirus protection, spam filtering, web filtering and
intrusion prevention (IPS). The wide variety of system configurations available
with FortiGate-5000 series provide flexibility to meet the changing needs of
growing high performance networks. The FortiGate-5000 series chassis support
multiple hot-swappable FortiGate-5000 series modules and power supplies. This
modular approach provides a scalable, high-performance and failure-proof
solution.
5140SAP
1311975312468101214
5140
PWR
PWR
PWR
PWR
PWR
ACC
ACC
ACC
CONSOLE
CONSOLE
USB
USB
1 2 3 4 5 6 7 8
1 2 3 4 5 6 7 8
STA IPM
STA IPM
STA IPM
PWR
ACC
ACC
ACC
MANAGEMENT
MANAGEMENT
E
T
H
CONSOLE
CONSOLE
USB
USB
1 2 3 4 5 6 7 8
1 2 3 4 5 6 7 8
STA IPM
O
CONSOLE
CONSOLE
USB
USB
SYSTEM
SYSTEM
CONSOLE
CONSOLE
R
S
2
3
2
1 2 3 4 5 6 7 8
1 2 3 4 5 6 7 8
Z
R
E
0
Z
R
E
1
Z
R
E
2
E1
E2
E2
1514
1312
1110
98
76
54
32
10
ZRE
ZRE
OKCLK
INTEXT
FLT
FLT
FLT
HOT SWAP
RESET
RESET
LED MODE
STA IPM
LED MODE
STA IPM
FILTER
012
FAN TRAYFAN TRAYFAN TRAY
SERIAL 1 SERIAL 2 ALARM
L
2
1
3
R
A
R
R
R
O
C
T
O
J
ER
E
E
N
TI
I
I
S
S
SE
A
S
R
U
U
U
M
E
M
C
R
USB
1 2 3 4 5 6 7 8
CONSOLE
5
ACC
PWR
PWR
PWR
PWR
PWR
ACC
ACC
ACC
CONSOLE
CONSOLE
E
T
H
O
R
S
2
3
2
Z
R
E
0
Z
R
E
1
Z
R
E
2
E1
1514
1312
1110
98
76
54
32
10
OKCLK
INTEXT
FLT
HOT SWAP
CONSOLE
USB
USB
1 2
1 2
3 4
3 4
5 6 7 8
5 6 7 8
STA IPM
STA IPM
STA IPM
PWR
ACC
ACC
ACC
CONSOLE
CONSOLE
USB
1 2
3 4
5 6 7 8
CONSOLE
USB
USB
USB
1 2
1 2
1 2
5000SM
ETH1
ETH0
10/100
10/100
link/Act
link/Act
3 4
3 4
3 4
ETH0
Service
RESET
STATUS
Hot Swap
5 6 7 8
5 6 7 8
5 6 7 8
12
5000SM
ETH0ETH1
10/100
10/100
link/Act
link/Act
ETH0
STA IPM
Service
STA IPM
STA IPM
RESET
STATUS
Hot Swap
PWR
USB
1 2 3 4 5 6 7 8
CONSOLE
4
ACC
PWR
USB
1 2 3 4 5 6 7 8
CONSOLE
ACC
PWR
3
ETH
O
RS232ZRE0ZRE1ZRE2
E1
1514
1312
2
1
5000SM
10/100
SMC
link/Act
ETH1
10/100
ETH0
link/Act
2
SYSTEM
CONSOLE
MANAGEMENT
ETH
O
RS232ZRE0ZRE1ZRE2
SYSTEM
CONSOLE
MANAGEMENT
5050SAP
ETH0
Service
SERIAL
STATUS
Hot Swap
RESET
1
USB
CONSOLE
RESET
STATUS
PWR
USB
CONSOLE
RESET
STATUS
PWR
1110
E2
E1
1514
1312
1110
E2
ALARM
162
162
OKCLK
9876543210
ZRE
OKCLK
9876543210
ZRE
SERIAL
2
3 4 5 6
IPM
3 4 5 6
IPM
STA IPM
STA IPM
STA IPM
INTEXT
FLT
HOT SWAP
RESET
POWER
LED MODE
FLT
INTEXT
FLT
HOT SWAP
RESET
LED MODE
FLT
5000SM
10/100
SMC
ETH0
Service
link/Act
STATUS
Hot Swap
10/100
RESET
ETH0ETH1
link/Act
1
PSU A
PSU B
ALT
ON/OFF
ALT
ON/OFF
FortiGate-5140 chassis
You can install up to 14 FortiGate-5000 series modules in the 14 slots of the
FortiGate-5140 ATCA chassis. The FortiGate-5140 is a 12U chassis that co nt a ins
two redundant hot swappable DC power entry modules that connect to -48 VDC
Data Center DC power. The FortiGate-5140 chassis also includes three hot
swappable cooling fan trays.
FortiGate-5050 chassis
You can install up to five FortiGate-5000 series modules in the five slots of the
FortiGate-5050 ATCA chassis. The FortiGate-5050 is a 5U chassis that contains
two redundant DC power connections that connect to -48 VDC Data Center DC
power. The FortiGate-5050 chassis also includes a hot swappable cooling fan
tray.
FortiGate Version 3 .0 MR4 Administration Guide
1801-30004-0203-20070102
Page 19
Introduction Introducing the FortiGate units
FortiGate-5020 chassis
You can install one or two FortiGate-5000 series modules in the two slots of the
FortiGate-5020 ATCA chassis. The FortiGate-5020 is a 4U chassis that contains
two redundant AC to DC power supplies that connect to AC power. The
FortiGate-5020 chassis also includes an internal cooling fan tray.
About the FortiGate-5000 series modules
Each FortiGate-5000 series module is a standalone security system th at can also
function as part of an HA cluster. All FortiGate-5000 series modules are also hot
swappable. All FortiGate-5000 series units are high capacity security systems
with multiple gigabit interfaces, multiple virtual domain capacity, and other high
end FortiGate features.
FortiGate-5005FA2 module
The FortiGate-5001SX module is an independent high- performance security
system with eight Gigabit ethernet interfaces; two of which include Fortinet
technology to accelerate small packet performance. The FortiGate
module also supports high-end features including 802.1Q VLANs and multiple
virtual domains.
-5005FA2
FortiGate-5001SX module
The FortiGate-5001SX module is an independent high- performance security
system with eight Gigabit ethernet interfaces. The FortiGate
supports high-end features including 802.1Q VLANs and multiple virtual domains.
FortiGate-5001FA2 module
The FortiGate-5001FA2 module is an independent high-performance security
system with six Gigabit ethernet interfaces. The FortiGate-5001FA2 module is
similar to the FortiGate-5001SX module except that two of the FortiGate-5001FA2
interfaces include Fortinet technology to accelerate small packet performance.
FortiGate-5002FB2 module
The FortiGate-5002FB2 module is an independent high-performance FortiGate
security system with a total of 6 Gigabit ethernet interfaces. Two of the
FortiGate-5002FB2 interfaces include Fortinet technology to accelerate small
packet performance.
FortiGate-3600A
The FortiGate-3600A
unit provides carrierclass levels of
performance and
reliability demanded by
large enterprises and
service providers. The
unit uses multiple CPUs and FortiASIC chips to deliver throughput of 4Gbps,
EscEnter
-5001SX module
2
7856341
CONSOLE
PWR
9
10
Hi-Temp
USB
MODEM
FortiGate Version 3 .0 MR4 Administration Guide
01-30004-0203-2007010219
Page 20
Introducing the FortiGat e un i tsIntroduction
meeting the needs of the most demanding applications. The FortiGate-3600A unit
includes redundant power supplies, which minimize single-point failures, and
supports load-balanced operation. The high-capacity, reliability and easy
management makes the FortiGate-3600A a natural choice for managed service
offerings.
FortiGate-3600
The FortiGate-3600
unit provides carrierclass levels of
performance and
reliability demanded by
Esc Enter
2
1
345/HA
large enterprises and
service providers. The
unit uses multiple CPUs and FortiASIC chips to deliver throughput of 4Gbps,
meeting the needs of the most demanding applications. The FortiGate-3600 unit
includes redundant power supplies, which minimize single-point failures, and
supports load-balanced operation. The high-capacity, reliability and easy
management makes the FortiGate-3600 a natural choice for managed service
offerings.
POWER
Hi-Temp 4
INTERNAL EXTERNAL
12
3
5/HA
EXT
INT
FortiGate-3000
The FortiGate-3000
unit provides the
carrier-class levels of
performance and
reliability demanded
by large enterprises
and service providers. The unit uses multiple CPUs and FortiASIC chips to deliver
a throughput of 3Gbps, meeting the needs of the most demanding applications.
The FortiGate-3000 unit includes redundant power supplies to minimize singlepoint failures, including load-balanced operation and redundant failover with no
interruption in service. The high capacity, reliability, and easy management of the
FortiGate-3000 makes it a natural choice for managed service offerings.
FortiGate-1000A
The FortiGate-1000A
Security System is a
high-performance
solution for the most
demanding large
enterprise and service
providers. The
FortiGate-1000A automatically keeps up to date information on Fortinet’s
FortiGuard Subscription Services by the FortiGuard Distribution Network,
ensuring around-the-clock protection against the latest viruses, worms, trojans
and other threats. The FortiGate-1000A has flexible architecture to quickly adapt
to emerging technologies such as IM, P2P or VOIP including identity theft
methods such as spyware, phishing and phar m i ng attacks.
Esc Enter
POWER
12
4/HA
Hi-Temp
INT
1234/HA INTERNAL EXTERNAL
3
EXT
FortiGate Version 3 .0 MR4 Administration Guide
2001-30004-0203-20070102
Page 21
Introduction Introducing the FortiGate units
FortiGate-1000AFA2
The FortiGate1000AFA2 Security
System is a
high-performance
solution for the most
CONSOLE
USB
A2A1
demanding large
enterprise and service
providers. The FortiGate-1000AFA2 features two extra optical fiber ports with
Fortinet’s FortiAccel™ technology, enhancing small packet performance. The
FortiGate-1000AFA2 also delivers critical security functions in a hardened security
platform, tuned for reliability, usability, rapid deployment, low operational costs
and most importantly a superior detection rate against known and unknown
anomalies.
FortiGate-1000
The FortiGate-1000 unit is
designed for larger
enterprises. The FortiGate-
Enter
Esc
1000 meets the needs of
the most demanding applications, using multiple CPUs and FortiASIC chips to
deliver a throughput of 2Gps. The FortiGate-1000 unit includes support for
redundant power supplies to minimize single-port failures, load-balanced
operation, and redundant failover with no interruption in service.
1234 / HA
INTERNAL
EXTERNAL
FortiGate-800
FortiGate-800F
The FortiGate-800 provides
high throughput, a total of
eight network connections,
8
Esc Enter
INTERNAL EXTERNAL DMZ HA
PWR
123
4USB
CONSOLE
(four of which are userdefined), VLAN support, and virtual domains. The FortiGate-800 also provides
stateful failover HA, when you are configuring a cluster of FortiGate units.The
FortiGate-800 is a natural choice for large enterprises, who demand top network
security performance.
The FortiGate-800F
provides the same features
as the FortiGate-800, using
800F
PWR
INTERNAL EXTERNALDMZHA1 2 3
Esc Enter
CONSOLE
4USB
four fibre-optic Internal,
External, DMZ and HA interfaces. The FortiGate-800F also provides stateful
failover HA, and support for the RIP and OSPF routing protocols. The FortiGate800F provides the flexibility, reliability and easy management large enterprises
are looking for.
FortiGate Version 3 .0 MR4 Administration Guide
01-30004-0203-2007010221
Page 22
Introducing the FortiGat e un i tsIntroduction
FortiGate-500A
The FortiGate-500A unit
provides the carrier-class
levels of performance and
reliability demanded by
CONSOLE
Esc Enter
A
USBLAN
L1 L2 L3
L4
12 3 4
10/10010/100/1000
56
large enterprises and
service providers. With a total of 10 network connections, (including a 4-port LAN
switch), and high-availability features with automatic failover with no session loss,
the FortiGate-500A is the choice for mission critical applications. The flexibility,
reliability, and easy management of the FortiGate-500A makes it a natural choice
for managed service offerings.
FortiGate-500
The FortiGate-500 unit is
designed for larger
INTERNAL
EXTERNAL1 2 3 4 5 6 7 8
enterprises. The flexibility,
Esc Enter
reliability, and easy
management makes the
FortiGate-500 a natural choice for managed service offerings. The FortiGate-500
supports high availability (HA).
HADMZ
FortiGate-400A
FortiGate-400
FortiGate-300A
The FortiGate-400A unit
meets enterprise-class
requirements for
performance, availability,
Esc Enter
A
CONSOLE10/10010/100/1000USB
1 2 3 4 5 6
and reliability. The
FortiGate-400A also supports high availability (HA) and features automatic
failover with no session loss, making it the choice for mission critical applications.
The FortiGate-400 unit is
designed for larger
enterprises. The FortiGate-
Esc Enter
1
CONSOLE
4 / HA3
2
400 unit is capable of
throughput up to 500Mbps
and supports high availability (HA), which includes automatic failover with no
session loss.
The FortiGate-300A unit
meets enterprise-class
requirements for
Esc Enter
CONSOLE10/10010/100/1000USB
1 2 3 4 5 6
performance, availability,
and reliability. The
FortiGate-300A also supports high availability (HA) and includes automatic
failover with no session loss, making the FortiGate-300A a good choice for
mission critical applications.
FortiGate Version 3 .0 MR4 Administration Guide
2201-30004-0203-20070102
Page 23
Introduction Introducing the FortiGate units
FortiGate-300
The FortiGate-300 unit is
designed for larger
enterprises. The FortiGate-
Esc Enter
300 unit features high
availability (HA), which
includes automatic failover with no session loss. This feature makes the
FortiGate-300 an excellent choice for mission-critical applications.
FortiGate-200A
The FortiGate-200A unit is
an easy-to-deploy and
easy-to-administer solution
that delivers exceptional
Esc Enter
A
1234
DMZ2DMZ1INTERNALWAN1 WAN2CONSOLE USB
value and performance for
small office, home office and branch office applications.
FortiGate-200
The FortiGate-200 unit is
designed for small
INTERNALPOWER STATUS
DMZ
businesses, home offices or
EXTERNAL
even branch office
applications. The FortiGate200 unit is an easy-to-deploy and easy-to-administer solution. The FortiGate-200
also supports high availability (HA).
INTERNAL
CONSOLE
DMZ
EXTERNAL
FortiGate-100A
FortiGate-100
The FortiGate-100A unit is
designed to be an
easy-to-administer solution for
small offices, home offices, and
WAN 1 WAN 2
PWR STATUS
A
DMZ 1
LINK 100 LINK 100 LINK 100 LINK 100 LINK 100 LINK 100 LINK 100 LINK 100
DMZ 2
INTERNAL
4321
branch office applications.
The FortiGate-100A supports advanced features such as 80 2.1Q VLAN, virtu al
domains, and the RIP and OSPF routing protocols.
The FortiGate-100 unit is designed
for SOHO, SMB and branch office
applications.
The FortiGate-100 supports
INTERNAL
EXTERNAL
POWER
DMZ
STATUS
advanced features such as 802.1Q
VLAN, virtual domains, high availability (HA), and the RIP and OSPF routing
protocols.
FortiGate Version 3 .0 MR4 Administration Guide
01-30004-0203-2007010223
Page 24
Introducing the FortiGat e un i tsIntroduction
FortiGate-60/60M/ADSL
The FortiGate-60 unit is designed
for telecommuters remote offices,
and retail stores. The FortiGate-60
unit includes an external modem
PWR STATUS
INTERNAL
LINK 100 LINK 100 LINK 100 LINK 100 LINK 100 LINK 100 LINK 100
DMZ4321
WAN1 WAN2
port that can be used as a backup
or stand alone connection to the
Internet while the FortiGate-60M unit includes an internal mod em that can also be
used either as a backup or a standalone connection to the Internet. The FortiGate60ADSL includes an internal ADSL modem.
FortiWiFi-60/60A/60AM
The FortiWiFi-60 model provides a
secure, wireless LAN solution for
wireless connections. It combines
mobility and flexibility with FortiWiFi
Antivirus Firewall features, and can
be upgraded to future radio
technologies. The FortiWiFi-60
serves as the connection point
between wireless and wired networks
or the center-point of a standalone
wireless network.
PWRWLAN
INTERNAL
LINK 100 LINK 100 LINK 100 LINK 100 LINK 100 LINK 100 LINK 100
DMZ4321
WAN1 WAN2
FortiGate-50B
FortiGate-50A
The FortiGate-50B is designed for
telecommuters and small remote
offices with 10 to 50 employees.
The FortiGate-50B unit includes
POWERSTATUS
WAN1 WAN2
INTERNAL
LINK / ACT
10/100
321
two WAN interfaces for redundant
connections to the Internet. The
FortiGate-50B unit also features a 3-port switch for internal network connections
and supports HA configurations with other FortiGate-50B units.
The FortiGate-50A unit is designed for
telecommuters and small remote
offices with 10 or fewer employees.
The FortiGate-50 unit includes an
STATUS
A
INTERNAL EXTERNAL
LINK 100 LINK 100
PWR
external modem port that can be used
as a backup or stand alone connection to the Internet.
FortiGate Version 3 .0 MR4 Administration Guide
2401-30004-0203-20070102
Page 25
Introduction Fortinet family of products
Fortinet family of products
Fortinet offers a family of products that includes both software and hardware
appliances for a complete network security solution including mail, logging,
reporting, network management, and securi ty alon g with FortiGate Unified Threat
Manager Systems. For more information on the Fortinet product family, go to
www.fortinet.com/products.
FortiGuard Subscription Services
FortiGuard Subscription Services are security services created, updated and
managed by a global team of Fortinet security professionals. They ensure the
latest attacks are detected and blocked before harming your corporate resources
or infecting your end-user computing devices. These services are created with the
latest security technology and designed to operate with the lowest possible
operational costs.
•FortiGuard Premier Service
An online virus scan ner and virus encyclopedia is also available for yo ur reference
from the FortiGuard Center.
FortiAnalyzer
FortiClient
FortiAnalyzer™ provides network administrators with the info rmation they need to
enable the best protection and security for their networks against attacks and
vulnerabilities. FortiAnalyzer features include:
•collects logs from FortiGate devices and syslog devices and FortiClient
•creates hundreds of reports using collected log data
•scans and reports vulnerabilities
•stores files quarantined from a FortiGate unit
The FortiAnalyzer unit can also be configured as a network analyzer to capture
real-time traffic on areas of your network where firewalls are not employed. You
can also use the unit as a storage device where users can access and sh are files,
including the reports and logs that are saved on the FortiAnalyzer hard disk.
FortiClient™ Host Security software provides a secure computing environment for
both desktop and laptop users running the most popular Microsoft Windows
operating systems. FortiClient offers many features including:
•creating VPN connections to remote networks
•configuring real-time protection against viruses
•guarding against modification of the Windows registry
•virus scanning.
FortiGate Version 3 .0 MR4 Administration Guide
01-30004-0203-2007010225
Page 26
Fortinet family of productsIntroduction
FortiClient also offers a silent installation feature, enabling an administrator to
efficiently distribute FortiClient to several users’ computers with preconfigured
settings.
FortiManager
FortiManager™ meets the needs of large enterprises (including managed security
service providers) responsible for establishing and maintaining security policies
across many dispersed FortiGate installations. With FortiManager you can
configure multiple FortiGate devices and monitor their status. You can also view
real-time and historical logs for FortiGate devices. FortiManager emp hasizes ease
of use, including easy integration with third party systems.
FortiBridge
FortiBridge™ products are designed to provide enterprise or ganizations operating
FortiGate units in Transparent mode with continuous network traffic flow in the
event of a power outage or a FortiGate system failure. The FortiBridge unit
bypasses the FortiGate unit to make sure that the network can continue
processing traffic. FortiBridge products are easy to use and deploy, including
providing customizable actions a FortiBridge unit takes in the event of a power
outage or FortiGate system failure.
FortiMail
FortiReporter
FortiMail™ provides powerful, flexible heuristic scanning and reporting capabilities
to incoming and outgoing email traffic. The FortiMail unit ha s reliable, high
performance features for detecting and blocking malicious att achments and sp am,
such as FortiGuard Antispam/Antivirus support, heuristic scanning, greylisting,
and Bayesian scanning. Built on Fortinet’s award winning For tiOS and FortiASIC
technology, FortiMail antivirus technology extends full content inspection
capabilities to detect the most advanced email threats.
FortiReporter Security Analyzer software generates easy-to-understand reports
and can collect logs from any FortiGate unit, as well as over 30 network and
security devices from third-party vendors. FortiReporter reveals network abuse,
manages bandwidth requirements, monitors web usage, and ensures employees
are using the office network appropriately. FortiReporter allows IT administrators
to identify and respond to attacks, including identifying ways to proactively secure
their networks before security threats arise.
FortiGate Version 3 .0 MR4 Administration Guide
2601-30004-0203-20070102
Page 27
Introduction About this document
About this document
This FortiGate Version 3.0 MR4 Administration Guide provides detailed
information about FortiGate™ web-based manager options a nd ho w to use them.
This guide also contains some information about the FortiGate CLI.
This administration guide describes web-based manager functions in the same
order as the web-based manager menu. The document begins with a general
description of the FortiGate web-based manager and a description of FortiGate
virtual domains. Following these chapters, each item in the System menu, Router
menu, Firewall menu, and VPN menu gets a separate chapter. Then User,
AntiVirus, Intrusion Protection, Web Filter, AntiSpam, IM/P2P, and Log & Report
are all described in single chapters. The document concludes with a detailed
index.
The most recent version of this document is available from the FortiGate page of
the Fortinet Technical Documentation web site. The information in this document
is also available in a slightly different form as FortiGate web-based manager
online help.
You can find more information about FortiOS v3.0 from the FortiGate page of the
Fortinet T echnical Document ation web site as well as from the Fortinet Knowledge
Center.
This administration guide contains the following chapters:
•Web-based manager provides an introduction to the features of the FortiGate
web-based manager and includes information about how to register a
FortiGate unit and about how to use the web-based manager online help.
•System Status describes the System Status page, the dashboard of your
FortiGate unit. At a glance you can view the current system status of the
FortiGate unit including serial number, uptime, FortiGuard license information,
system resource usage, alert messages and network statistics. This section
also describes status changes that you can make, including changing the unit
firmware, host name, and system time.
•Using virtual domains describes how to use virtual domains to operate your
FortiGate unit as multiple virtual FortiGate units, providing separate firewall
and routing services to multiple networks.
•System Network explains how to configure physical and virtual interfaces an d
DNS settings on the FortiGate unit.
•System Wireless describes how to configure the Wireless LAN interface on a
FortiWiFi-60 unit.
•System DHCP provides information about how to configure a FortiGate
interface as a DHCP server or DHCP relay agent.
•System Config contains procedures for configuring HA and virtual clustering,
configuring SNMP and replacement messages, and changing the operation
mode.
•System Admin guides you through adding and editing administrator accounts,
defining access profiles for administrators, configuring Fo rtiManager™ access,
and defining general administrative settings such as language, timeouts, and
web administration ports.
•System Maintenance details how to back up and restore the system
configuration using a management computer or the FortiUSB device, enable
FortiGuard services and FortiGuard Distribution Network (FDN) updates, and
enter a license key to increase the maximum number of virtual domains.
FortiGate Version 3 .0 MR4 Administration Guide
01-30004-0203-2007010227
Page 28
About this documentIntroduction
•System Chassis (FortiGate-5000 series) describes information displayed on
the system chassis web-based manager pages about all of the hardware
components in your FortiGate-5140 or FortiG at e- 50 5 0 cha ssis.
•Router Static explains how to define static routes and create route policies. A
static route causes packets to be forwarded to a destination other than the
factory configured default gateway.
•Router Static explains how to define static routes and create route policies. A
static route causes packets to be forwarded to a destination other than the
factory configured default gateway.
•Router Dynamic contains information about how to configure dynamic
protocols to route traffic through large or complex networks.
•Router Monitor explains how to interpret the Routing Monitor list. The list
displays the entries in the FortiGate routing table.
•Firewall Policy describes how to add firewall policies to control connections
and traffic between FortiGate interfaces, zones, and VLAN subinterfaces.
•Firewall Address describes how to configure addresses and address groups
for firewall policies.
•Firewall Service describes available services and how to configure service
groups for firewall policies.
•Firewall Schedule describes how to configure one-time and recurring
schedules for firewall policies.
•Firewall Virtual IP describes how to configure and use virtual IP addresses and
IP pools.
•Firewall Protection Profile describes how to configure protection profiles for
firewall policies.
•VPN IPSEC provides information about the tunnel-mode and route-based
(interface mode) Internet Protocol Security (IPSec) VPN options available
through the web-based manager.
•VPN PPTP explains how to use the web-based manager to spec ify a range of
IP addresses for PPTP clients.
•VPN SSL provides information about basic SSL VPN settings.
•VPN Certificates explains how to manage X.509 security certificates.
•User details how to control access to network resources through user
authentication.
•AntiVirus explains how to enable antivirus options when you create a firewall
protection profile.
•Intrusion Protection explains how to configure IPS options when a firewall
protection profile is created.
•Web Filter explains how to configure web filter options when a firewall
protection profile is created.
•Antispam explains how to configure spam filter options when a firewall
protection profile is created.
•IM, P2P & VoIP explains how to configure IM, P2P, and VoIP options when a
firewall protection profile is created. You can view IM, P2P, and VoIP statistics
to gain insight into how the protocols are being used within the network.
•Log&Report describes how to enable logging, view log files, and view the basic
reports available through the web-based manager.
FortiGate Version 3 .0 MR4 Administration Guide
2801-30004-0203-20070102
Page 29
Introduction FortiGate documentation
Document conventions
The following document conventions are used in this guide:
•In the examples, private IP addresses are used for both private and public IP
addresses.
•Notes and Cautions are used to provide important information:
Note: Highlights useful additional information.
Caution: Warns you about commands or procedures that could have unexpected or
!
undesirable results including loss of data or damage to equipment.
Typographic conventions
Fortinet documentation uses the following typographical conventions:
ConventionExample
Menu commandsGo to VPN > IPSEC > Phase 1 and select Create New.
Keyboard inputIn the Gateway Name field, type a name for the remote VPN
set http_retry_count <retry_integer>
set natip <address_ipv4mask>
end
Authentication</TITLE></HEAD>
<BODY><H4>You must authenticate to use this
service.</H4>
<address_ipv4>
FortiGate documentation
The most up-to-date publications and previous releases of Fortinet product
documentation are available from the Fortinet Technical Documentation web site
at http://docs.forticare.com.
The following FortiGate product documentation is available:
•FortiGate QuickStart Guide
Provides basic information about connecting and installing a FortiGate unit.
FortiGate Version 3 .0 MR4 Administration Guide
01-30004-0203-2007010229
Page 30
FortiGate documentationIntroduction
•FortiGate Installation Guide
Describes how to install a FortiGate unit. Includes a hardware reference,
default configuration information, installation procedures, connection
procedures, and basic configuration procedures. Choose the guide for you r
product model number.
•FortiGate Administration Guide
Provides basic information about how to configure a FortiGate unit, including
how to define FortiGate protection profiles and firewall policies; how to apply
intrusion prevention, antivirus protection, web content filtering, and spam
filtering; and how to configure a VPN.
•FortiGate online help
Provides a context-sensitive and searchable version of the Administration
Guide in HTML format. You can access online help from the web-based
manager as you work.
•FortiGate CLI Reference
Describes how to use the FortiGate CLI and contains a reference to all
FortiGate CLI commands.
•FortiGate Log Message Reference
Available exclusively from the Fortinet Knowledge Center, the FortiGate Log
Message Reference describes the structure of FortiGate log messages and
provides information about the log messages that are generated by FortiGate
units.
•FortiGate High Availability Overview and FortiGate High Availability User
Guide
These documents contain in-depth information about the F ort iG ate High
Availability (HA) feature and the FortiGate clustering protocol.
•FortiGate IPS User Guide
Describes how to configure the FortiGate Intrusion Preventio n System settings
and how the FortiGate IPS deals with some common attacks.
•FortiGate IPSec VPN User Guide
Provides step-by-step instructions for configuring IPSec VPNs using the webbased manager.
•FortiGate SSL VPN User Guide
Compares FortiGate IPSec VPN and FortiGate SSL VPN technology, and
describes how to configure web-only mode and tunnel-m ode SSL VPN access
for remote users through the web-based manager.
•FortiGate PPTP VPN User Guide
Explains how to configure a PPTP VPN using the web-based manager.
•FortiGate Certificate Management User Guide
Contains procedures for managing digital certificates including generating
certificate requests, installing signed certificates, importing CA root certificates
and certificate revocation lists, and backing up and resto ring installed
certificates and private keys.
•FortiGate VLANs and VDOMs User Guide
Describes how to configure VLANs and VDOMS in both NAT/Route and
Transparent mode. Includes detailed examples.
FortiGate Version 3 .0 MR4 Administration Guide
3001-30004-0203-20070102
Page 31
Introduction Customer service and technical support
Fortinet Tools and Documentation CD
All Fortinet documentation is available from th e Fortinet Tools and Documentation
CD shipped with your Fortinet product. The documents on this CD are current for
your product at shipping time. For the latest versions of all Fortinet documentation
see the Fortinet Technical Documentation web site at http://docs.forticare.com.
Fortinet Knowledge Center
Additional Fortinet technical documentation is available from the Fortinet
Knowledge Center. The knowledge center contains troubleshooting and how-to
articles, FAQs, technical notes, and more. Visit the Fortinet Knowledge Center at
http://kc.forticare.com.
Comments on Fortinet technical documentation
Please send information about any errors or omissions in this document, or any
Fortinet technical documentation, to techdoc@fortinet.com.
Customer service and technical support
Fortinet Technical Support provides services designed to make sure that your
Fortinet systems install quickly, configure easily, and operate reliably in your
network.
Please visit the Fortinet Technical Support web site at http://support.fortinet.com
to learn about the technical support services that Fortinet provides.
FortiGate Version 3 .0 MR4 Administration Guide
01-30004-0203-2007010231
Page 32
Customer service and technical supportIntroduction
FortiGate Version 3 .0 MR4 Administration Guide
3201-30004-0203-20070102
Page 33
Web-based manager
Web-based manager
This section describes the features of the user-friendly web-b ased manager
administrative interface of your FortiGate unit.
Using HTTP or a secure HTTPS connection from any computer running a web
browser, you can configure and manage the FortiGate unit. The web-based
manager supports multiple languages. You can configure the FortiGate unit for
HTTP and HTTPS administration from any FortiGate interface.
Figure 1: Example FortiGate-5001SX Web-based manager dashboard
You can use the web-based manager to configure most FortiGate settings and to
monitor the status of the FortiGate unit. Configu ra tio n ch an ge s ma d e us in g the
web-based manager are effective immediately without resetting the firewall or
interrupting service. Once you are satisfied with a configuration, you can back it
up. The saved configuration can be restored at an y tim e.
The following topics are included in this section:
•Button bar features
•Web-based manager pages
FortiGate Version 3.0 MR4 Administration Guide
01-30004-0203-2007010233
Page 34
Button bar featuresWeb-based manager
Button bar features
The button bar in the upper right corner of the web-based manager provides
access to several important FortiGate features.
Figure 2: Web-based manager button bar
Contact Customer Support
Logout
Online Help
Contact Customer Support
The Contact Customer Support button opens the Fortinet Support web page in a
new browser window. From this page you can:
•Access the Fortinet Knowledge Center.
•Log into Customer Support (Support Login).
•Register your FortiGate unit (Product Registration).
•Find out about Fortinet Training and Certification.
•Visit the FortiGuard Center.
To register your FortiGate unit, go to Product Registration and follow the
instructions.
Using the Online Help
The Online Help button displays online help for the current web-based manag er
page. The online help page that is displayed cont ains info rmation a nd procedur es
related to the controls on the current web-based manager page. Most help pages
also contains hyperlinks to related topics. The online help system also includes a
number of controls that you can use to find additional information.
Figure 3: Viewing system status online help page
Show Navigation
Previous
Next
Bookmark
Print
Email
FortiGate Version 3 .0 MR4 Administration Guide
3401-30004-0203-20070102
Page 35
Web-based manager Button bar features
Show
Navigation
PreviousDisplay the previous page in the online help.
NextDisplay the next page in the online help.
EmailSend an email to Fortinet Technical Documentation at
PrintPrint the current online help page.
BookmarkAdd an entry for this online help page to your browser bookmarks or
Open the online help navigation pane. From the navigation pane you can
use the online help table of contents, index, and search to access all of
the information in the online help. The online help is organized in the
same way as the FortiGate web-based manager and the FortiGate
Administration Guide.
techdoc@fortinet.com. You can use this email address to let us know if
you have a comment about or correction for the online help or any other
Fortinet technical documentation product.
favorites list. Use this button to make it easier to find helpful online help
pages. You cannot use the Bookmark icon to add an entry to your
favorites list if you are viewing online help from Internet Explorer runnin g
on a management PC with Windows XP and service pack 2 installed.
Select Show Navigation to display the online help navigation pane.
Figure 4: Online help page with navigation pane
ContentsSearchIndexShow in Contents
ContentsDisplay the online help table of contents. You can navigate through the
IndexDisplay the online help index. You can use the index to find information in
SearchDisplay the online help search. See “About searching the online help” on
Show in
Contents
table of contents to find information in the online help. The online help is
organized in the same way as the FortiGate web-based manager and the
FortiGate Administration Guide.
the online help.
page 35 for information about how to search for information in the online
help.
If you have used the index, search, or hyperlinks to find information in the
online help, the table of contents may not be visible or the table of
contents may be out of sync with the current help page. You can select
Show in Contents to display the table of contents showing the location of
the current help page.
About searching the online help
Using the online help search, you can search for one word o r multiple words in the
full text of the FortiGate online help system. Please note the following about the
search:
•If you search for multiple words, the search finds help pages that co ntain all of
the words that you entered. The search does not find help pages that only
contain one of the words that you entered.
FortiGate Version 3 .0 MR4 Administration Guide
01-30004-0203-2007010235
Page 36
Button bar featuresWeb-based manager
•The help pages found by the search are ranked in orde r of rele van ce . Th e
higher the ranking, the more likely the help page includes useful or detailed
information about the word or words that you are searching for. Help pages
with one or more of the search words in the help page title are ranked highest.
•You can use the asterisk (*) as a search wildcard character that is replaced by
any number of characters. For example, if you search for auth* the search
finds help pages containing auth, authenticate, authentication, authenticates, and so on.
•In some cases the search only finds exact matches. For example if you search
for windows the search may not find pages containing the word window. You
can work around this using the * wildcard (for example by searching for
window*).
To search in the help system
1From any web-based manager page, select the online help button.
2Select Show Navigation to display the online help navigation pane.
3Select Search.
4Type one or more words to search for in the search field and then press enter or
select Go.
The search pane lists the name s of all the on line help p ages tha t cont ain the wor d
or words that you entered. Select a name from the list to display that help page.
Logout
Using the keyboard to navigate in the online help
You can use the keyboard shortcuts listed in Table 1 to display and find
information in the online help.
Table 1: Online help navigation keys
KeyFunction
Alt+1Display the table of contents.
Alt+2Display the index.
Alt+3Display the Search tab.
Alt+4Go to the previous page.
Alt+5Go to the next page.
Alt+7Send an email to Fortinet Technical Documentation at
techdoc@fortinet.com. Y ou can use this email address to let us know if
you have a comment about or correction for the online help or any other
Fortinet technical documentation product.
Alt+8Print the current online help page.
Alt+9Add an entry for this online help page to your browser bookmarks or
favorites list. Use this button to make it easier to find helpful online help
pages.
The Logout button immediately logs you out of the web-based manager. Log out
before you close the browser window . If you simply close the browser or leave the
web-based manager, you remain logged-in until the idle timeout (default 5
minutes) expires.
FortiGate Version 3 .0 MR4 Administration Guide
3601-30004-0203-20070102
Page 37
Web-based manager Web-based manager pages
Web-based manager pages
The web-based manager interface consists of a menu and pages, many of which
have multiple tabs. When you select a menu item, such as System, it expands to
reveal a submenu. When you select one of the submenu items, the associated
page opens at its first tab. To view a different tab, select the tab.
The procedures in this manual direct you to a page by specifying the menu item,
the submenu item and the tab, like this:
1Go to System > Network > Interface.
Figure 5: Parts of the web-based manager (shown for the FortiGate-50B)
Menu
Web-based manager menu
The menu provides access to configuration options for all major features of the
FortiGate unit.
Tabs
Page
Button bar
SystemConfigure system facilities, such as network interfaces, virtual domains,
RouterConfigure FortiGate static and dynamic routing.
FirewallConfigure firewall policies and protection profiles that apply network
VPNConfigure IPSec, SSL, and PPTP virtual private networking.
UserConfigure user accounts for use with firewall policies that require user
FortiGate Version 3 .0 MR4 Administration Guide
01-30004-0203-2007010237
DHCP services, High Availability (HA), system time and set system
options.
protection features. Also configure virtual IP addresses and IP pools.
authentication. Also configure external authentication servers such as
RADIUS, LDAP, and Windows AD.
Configure the FortiGate Intrusion Protection System (IPS).
Page 38
Web-based manager pagesWeb-based manager
AntiSpamConfigure email spam filtering.
IM, P2P & VoIP Configure monitoring and control of internet messaging, peer-to-peer
Log & ReportConfigure logging, alert email, and FortiGuard Log and Analysis. View
messaging, and voice over IP (VoIP) traffic.
log messages and reports. Connect to a FortiAnalyzer to view log
messages and reports. View log messages stored by FortiGuard Log and
Analysis.
Lists
Many of the web-based manager pages are lists. There are lists of network
interfaces, firewall policies, administrators, users, and so on.
Figure 6: Example of a web-based manager list
Delete
Edit
Icons
The list shows some information about each item and the icons in the right-most
column enable you to take action on the item. In this example, you can select
Delete to remove the item or select Edit to modify the item.
To add another item to the list, you select Create New. This opens a dialog box in
which you define the new item. The dialog box for crea ting a new item is simila r to
the one for editing an existing item.
The web-based manager has icons in addition to buttons to enable you to interact
with the system. There are tooltips to assist you in underst anding the function of
the icon. Pause the mouse pointer over the icon to view the tooltip. Table 2
describes the icons that are available in the web-based manager.
Table 2: web-based manager icons
IconNameDescription
Change
Password
ClearClear a log file.
CollapseColl apse this section to hide some fields. This icon is used in
Change the administrator password. This icon appears in the
Administrators list if your access profile enables you to give
write permission to administrators.
some dialog boxes and some lists.
Column
Settings
DeleteDelete an item. This icon appears in lists where the item can be
3801-30004-0203-20070102
Select the columns to display. This icon is used in Log Access
and firewall Policy lists among others.
deleted and you have write permission on the page.
FortiGate Version 3 .0 MR4 Administration Guide
Page 39
Web-based manager Web-based manager pages
T able 2: web-based manager icons (Continued)
IconNameDescription
Description The tooltip for this icon displays the Description field for this
Download
or Backup
DownloadDownload a Certificate Signing Request.
EditEdit a configuration. This icon appears in lists where you have
ExpandExpand this section to reveal more fields. This icon is used in
FilterSet a filter on one or more columns in this table. A dialog opens
GoDo a search.
Insert Policy
before
Move toMove item in list.
Next pageView next page of list.
Previous
page
table entry.
Download a log file or back up a configuration file.
write permission on the page.
some dialog boxes and some lists.
in which you can specify filters. The icon is green on columns
where a filter is active, otherwise it is grey.
Create a new policy to precede the current one.
View previous page of list.
RefreshUpdate the information on this page.
RestoreRestore a configuration from a file.
ViewView a configuration. This icon appears in list s instead of the
Edit icon when you do not have write permission on that page.
FortiGate Version 3 .0 MR4 Administration Guide
01-30004-0203-2007010239
Page 40
Web-based manager pagesWeb-based manager
FortiGate Version 3 .0 MR4 Administration Guide
4001-30004-0203-20070102
Page 41
System Status Status page
System Status
This section describes the System Status page, the dashboard of your FortiGate
unit. At a glance you can view the current system status of the FortiGate unit
including serial number, uptime, FortiGuard™ license information, system
resource usage, alert messages and network statistics.
Note: Your browser must support Javascript to view the System Status page.
The following topics are included in this section:
•Status page
•Changing system information
•Changing the FortiGate firmware
•Viewing operational history
•Manually updating FortiGuard definitions
•Viewing Statistics
•Topology viewer
Status page
Viewing system status
View the System Status page, also known as the system dashboard, for a
snapshot of the current operating status of the FortiGate unit. FortiGate
administrators whose access profiles permit read access to system configuration
can view system status information.
When the FortiGate unit is part of an HA cluster, the Status page includes basic
HA cluster status information including the name of the clu ste r an d th e clus te r
members including their hostnames. To view more complete status information for
the cluster, go to System > Config > HA. For more information, see “HA” on
page 119. HA is not available on FortiGate models 50A and 50AM.
FortiGate administrators whose access profiles permit write access to system
configuration can change or update FortiGate un it information . For infor mation on
access profiles, see “Access profiles” on page 148.
The System St atus page displays by default when you log in to the web-based
manager.
At any time, go to System > Status to view the System Status page.
To view this page, your access profile must permit read access to system
configuration. If you also have system configuration write access, you can modify
system information and update FortiGuard - AV and FortiGuard - IPS definitions.
For information on access profiles, see “Access profiles” on page 148.
FortiGate Version 3.0 MR4 Administration Guide
01-30004-0203-2007010241
Page 42
Status pageSystem Status
The System Status page is completely customizable. You can select which
displays to show, whe re they are located on the p age, and if they ar e minimized or
maximized. Each display has an icon associated with it for easy recognition when
minimized.
Figure 7: System Status page
Select Add Content to add any of the displays not currently shown on the System
Status p age. Any displays current on the System S tatus page will be greyed out as
you can only have one of each display on the System Status page. Optionally
select Back to default to restore the historic System Status page configuration.
Position your mouse over a display’s titlebar to see your available options for that
display. The options vary slightly from display to display.
Figure 8: A minimized display
Display title
Twistie arrow
Display TitleShows the name of the display
Twistie arrowSelect to maximize or minimize the display.
Refresh iconSelect to update the displayed information.
Close iconSelect to close the display. You will be prompted to confirm the
close.
Refresh icon
Close icon
FortiGate Version 3 .0 MR4 Administration Guide
4201-30004-0203-20070102
Page 43
System Status Status page
System information
Figure 9: Example FortiGate-5001 System Information
Serial NumberThe serial number of the current FortiGate unit. The seri al number is
UptimeThe time in days, hours, and minutes since the FortiGate unit was last
System TimeThe current date and time according to the FortiGate unit internal
Host NameThe host name of the current FortiGate unit.
Cluster NameThe name of the HA cluster for this FortiGate unit. See “HA” on
Cluster MembersThe FortiGate units in the HA cluster. Information displayed about
Virtual Cluster 1
Virtual Cluster 2
Firmware Version The version of the firmware installed on the curr en t Fo rti Gate unit.
FortiClient Version The currently loaded version of FortiClient. Select Update to upload a
Operation ModeThe operating mode of the current FortiGate unit. A FortiGate can
specific to the FortiGate unit and does not change with firmware
upgrades.
started.
clock.
Select Change to change the time or configure the FortiGate unit to
get the time from an NTP server. See “Configuring system time” on
page 49.
If the FortiGate unit is in HA mode, this field is not displayed.
Select Change to change the host name.
See “Changing the FortiGate unit host name” on page 50.
page 119.
The FortiGate unit must be operating in HA mode to display this field.
each member includes hostname, serial number, and if the unit is a
primary (master) or subordinate (slave) unit in the cluster. See “HA”
on page 119.
The FortiGate unit must be operating in HA mode with virtual
domains not enabled to display this field.
The role of each FortiGate unit in virtual cluster 1 and virtual cluster 2.
See “HA” on page 119.
The FortiGate unit must be operating in HA mode with virtual
domains enabled to display these fields.
Select Update to change the firmware.
See “Upgrading to a new firmware version” on page 51.
new FortiClient software image to this FortiGate unit from your
management computer.
This is available only on FortiGate models that provide a portal from
which hosts can download FortiClient software.
operated in NAT mode or T ransparent mode. Select change to switch
between NAT and Transparent mode. See “Changing operation
mode” on page 141
If virtual domains are enabled, this field shows the operating mode of
the current virtual domain. A virtual domain can be operating in either
NAT mode or Transparent mode.
FortiGate Version 3 .0 MR4 Administration Guide
01-30004-0203-2007010243
Page 44
Status pageSystem Status
Virtual DomainThe status of virtual domains on your FortiGate unit. Select enable or
Current
Administrators
disable to change the status of virtual domains.
If you change the state of virtual domains, your session will be
terminated and you will need to login. For more information see
“Using virtual domains” on page 61.
The number of administrators currently logged into the FortiGate unit.
Select Details to view more information about each administrator that
is logged. The additional information includes user name, type of
connection, IP address they are connecting from, and when they
logged in.
License Information
License information displays the status of your FortiGate support contract, and
FortiGuard subscriptions. The FortiGate unit updates the license information
status indicators automatically by connecting to the FortiGuard network.
FortiGuard subscriptions status indicators are green for OK, grey if the FortiGate
unit cannot connect to the FortiGuard network, and yellow if the license has
expired.
Selecting any of the Configure options will take you to the maintenance page. For
more information, see “Syste m Ma in te na nc e” on page 157.
Figure 10: Example License Information
Support ContractThe support contract number and expiry date.
If Not Registered is displayed, select Register to register the
unit.
If Renew is visible, you need to renew your support contract.
Contact your local reseller.
FortiGuard Subscriptions
AntiVirusThe FortiGuard Antivirus license version, issue date and
AV DefinitionsThe current installed version of the FortiGuard Antivirus
IPS DefinitionsThe current installed version of the Intrusion Prevention
4401-30004-0203-20070102
service status. If your license has expired you can select
Renew two renew the license.
Definitions. To update the definitions manually, select
Update. For more information, see “Updating the FortiGuard
AV Definitions manually” on page 53.
date and service status. If your license has expired you can
select Renew two renew the license.
System (IPS) attack definitions. To update the definitions
manually, select Update. For more information, see
“Updating the FortiGuard IPS Definitions manually” on
page 53.
FortiGate Version 3 .0 MR4 Administration Guide
Page 45
System Status Status page
Web FilteringThe FortiGuard Web Filtering license type, expiry date and
AntispamThe FortiGuard Antispam license type, expiry date and
Log & AnalysisThe FortiGuard Log & Analysis license type, expiry date and
Virtual DomainThe number of virtual domains the unit supports.
service status. If your license has expired you can select
Renew two renew the license.
service status. If your license has expired you can select
Renew two renew the license.
service status.
For FortiGate models 3000 or higher, you can select the
Purchase More link to purchase a license key through
Fortinet Support to increase the maximum number of
VDOMs. See “License” on page 172.
CLI Console
There are commands in FortiOS that are only accessible from the CLI. Generally
to use the CLI you connect via telnet or SSH using a 3rd party program.
The System Status page includes a fully functional CLI console. To use the
console, click on it and you are automatically logged in as the account you are
currently using in the GUI. The CLI console default view cannot be resized or
moved. You can cut & paste text from the CLI console.
Figure 11: CLI Console
Customize
icon
The two controls on the CLI console window are the customize icon, and the
Detach control.
The Detach control moves the CLI console into its own window that is free to
resize or be repositioned on your screen. The two controls on the detached CLI
console are Customize and Attach. Customize has been explained. Attach simply
puts the CLI console back in place on the System Status page.
The customize icon allows you to change the look of the console using fonts and
colors for the text and background.
FortiGate Version 3 .0 MR4 Administration Guide
01-30004-0203-2007010245
Page 46
Status pageSystem Status
Figure 12: Customize CLI Console window
PreviewSee how your changes will appear on the CLI console.
TextSelect this control, then choose a color from the color matrix to the
BackgroundSelect this control, then choose a color from the color matrix to the
Use external
command input box
Console buffer length Select the number of lines the console buffer keeps in memory.
FontSelect a font from the list.
SizeSelect the size of the font. The default size is 10.
Reset defaultsSelect to return to the default settings, discarding any changes.
OKSelect to save your changes and return to the CLI console.
CancelSelect to discard your change and return to the CLI console.
right to change the color of the text in the CLI console.
right to change the color of the background in the CLI console.
Select to allow external input.
Valid numbers are from 20 to 9999.
System Resources
Any System Resources that are not displayed on the status page can be viewed
as a graph by selecting the History icon.
Figure 13: Example System Resources
History
FortiGate Version 3 .0 MR4 Administration Guide
4601-30004-0203-20070102
Page 47
System Status Status page
History iconView a graphical representation of the last minute of CPU, memory,
CPU UsageThe current CPU status displayed as a dial gauge and as a
Memory UsageThe current memory status displayed as a dial gauge and as a
FortiAnalyzer Disk
Quota
sessions, and network usage. This page also shows the virus and
intrusion detections over the last 20 hours. For more information
see “Viewing operational history” on page 52.
percentage.
The web-based manager displays CPU usage for core processes
only. CPU usage for management processes (for example, for
HTTPS connections to the web-based manager) is excluded.
percentage.
The web-based manager displays memory usage for core
processes only. Memory usage for management processes (for
example, for HTTPS connections to the web-based manager) is
excluded.
The current status of the FortiAnalyzer disk quota used for the
FortiGate unit displayed as a pie chart and a percentage.
This is available only if you have configured logging to a
FortiAnalyzer unit.
Interface Status
An illustration of the FortiGate unit front panel shows the status of the unit’s
ethernet interfaces. If a network interface is shaded green, that interface is
connected. Pause the mouse pointer over the interface to view the IP address,
netmask and current status of the interface.
If you select Reboot or ShutDown a window will open allowing you to enter the
reason for the system event. Your reason will be added to the Disk Event Log.
Disk logging will need to be enabled in the CLI. Event Logging and Admin Events
need to be enabled. For more information on Event Logging, see “Event log” on
page 416.
Figure 14: Example FortiGate-800 interface status (with no FortiAnalyzer)
INT / EXT / DMZ / HA /
1 / 2 / 3 / 4
FortiAnalyzerThe icon on the link between the FortiGate unit graphic and the
The ports on the FortiGate unit. The names and number of these
ports will vary with your unit.
The icon below the port name indicates its status by its color.
Green indicates the port is connected. Grey indicates there is no
connection.
For more information about a port’s configuration position your
mouse over the icon for that port. You will see the full name of the
interface, the IP address and netmask, the status of the link, the
speed of the interface, and the number of sent and received
packets.
FortiAnalyzer graphic indicates the status of their connection. An
‘X’ on a red icon indicates there is no connection. A check mark on
a green icon indicates there is communication between the two
units.
Select the FortiAnalyzer graphic to configure FortiAnalyzer logging
on your FortiGate unit. See “Log&Report” on page 407.
FortiGate Version 3 .0 MR4 Administration Guide
01-30004-0203-2007010247
Page 48
Status pageSystem Status
RebootSelect to shutdown and restart the FortiGate unit. You will be
ShutdownSelect to shutdown the FortiGate unit. You will be prompted for
ResetSelect to reset the FortiGate unit to factory default settings. You
prompted to enter a reason for the reboot that will be entered into
the logs.
confirmation. You will be prompted to enter a reason for the
shutdown that will be entered into the logs.
will be prompted for confirmation.
Alert Message Console
Alert messages help you track changes to your FortiGate unit. The following types
of messages can appear in the Alert Message Console:
Figure 15: Example Alert Message Console
System restartThe system restarted. The restart could be due to
Firmware upgraded by
<admin_name>
Firmware downgraded by
<admin_name>
FortiGate has reached
connection limit for <n> seconds
Found a new FortiAnalyzer
Lost the connection to
FortiAnalyzer
operator action or power off/on cycling.
The named administrator upgraded the firmware to a
more recent version on either the active or non-active
partition.
The named administrator downgraded the firmware to
an older version on either the active or non-active
partition.
The antivirus engine was low on memory for the
duration of time shown. Depending on model and
configuration, content can be blocke d or pass
unscanned under these conditions.
Shows that the FortiGate unit has either found or lost
the connection to a FortiAnalyzer unit. See “Logging
to a FortiAnalyzer unit” on page 409.
Each message shows the date and time that it was posted. If there is insufficient
space for all of the messages, select Show All to view the entire list in a new
window.
T o clear alert messages, select All and then select Clear Alert Messages at the top
of the new window. This will delete all current alert messages from your FortiGate
unit.
Statistics
The statistics section of the status page is designed to allow you to see at a glance
what is happening on your FortiGate unit with regards to network traffic and
protection.
You can quickly see the amount and type of traffic as well as any attack attempts
on your system. To investigate an area that draws your attention, simply select
Details for a detailed list of the most recent activity.
FortiGate Version 3 .0 MR4 Administration Guide
4801-30004-0203-20070102
Page 49
System Status Changing system information
The information displayed in the statistics section is saved in log files that can be
saved to a FortiAnalyzer unit, saved locally or backed up to an external source.
You can use this data to see trends in network activity or attacks over time and
deal with it accordingly.
For detailed procedures involving the statistics list, see “Viewing Statistics” on
page 54.
Figure 16: Example Statistics
Reset
SinceThe date and time when the counts were reset.
Counts are reset when the FortiGate unit reboots or when you
select to the reset icon.
Reset IconReset the Archive and Attack Log counts to zero.
SessionsThe number of communications sessions being processed by the
Content ArchiveA summary of the HTTP, e-mail, FTP, and IM/P2P traffic that has
Attack LogA summary of viruses, attacks, spam email messages and URLs
FortiGate unit. Select Details for detailed information. See “Viewing
the session list” on page 54.
passed through the FortiGate unit. The Details pages list the last 64
items of the selected type and provide links to the FortiAnalyzer unit
where the archived traffic is stored. If logging to a FortiAnalyzer unit
is not configured, the Details pages provide a link to the
Log & Report > Log Config > Log Settings page.
the unit has intercepted. The Details pages list the most recent 10
items, providing the time, source, destination and other information.
Changing system information
FortiGate administrators whose access profiles permit write access to system
configuration can change the system time, host name and the operation mod e for
the VDOM.
Configuring system time
1Go to System > Status.
2In the System Information section, select Change on the System Time line.
3Select the time zone and then either set the date and time manually or configure
synchronization with an NTP server.
FortiGate Version 3 .0 MR4 Administration Guide
01-30004-0203-2007010249
Page 50
Changing system informationSystem Status
Figure 17: Time Settings
System TimeThe current FortiGate system date and time.
RefreshUpdate the display of the current FortiGate system date and time.
Time ZoneSelect the current FortiGate system time zone.
Automatically adjust
clock for daylight
saving changes
Set TimeSelect to set the FortiGate system date and time to the values you
Synchronize with
NTP Server
ServerEnter the IP address or domain name of an NTP server. To find an
Sync IntervalSpecify how often the FortiGate unit should synchronize its time
Select to automatically adjust the FortiGate system clock when your
time zone changes between daylight saving time and standard
time.
set in the Hour, Minute, Second, Year, Month and Day fields.
Select to use an NTP server to automatically set the system date
and time. You must specify the server and synchronization interval.
NTP server that you can use, see http://www.ntp.org.
with the NTP server. For example, a setting of 1440 minutes causes
the FortiGate unit to synchronize its ti me onc e a d ay.
Changing the FortiGate unit host name
The FortiGate host name appears on the Status page and in the FortiGate CLI
prompt. The host name is also used as the SNMP system name. For information
about SNMP, see “SNMP” on page 127.
The default host name is the FortiGate unit serial number. For example
FGT8002805030003 would be a FortiGate-800 unit.
Administrators whose access profiles permit system configuration write access
can change the FortiGate unit host name.
Note: If the FortiGate unit is part of an HA cluster, you should use a unique hostname to
distinguish the unit from others in the cluster.
To change the FortiGate unit host name
1Go to System > Status.
2In the Host Name field of the System Information section, select Change.
3In the New Name field, type a new host name.
4Select OK.
The new host name is displayed in the Host Name field, and in the CLI prompt,
and is added to the SNMP System Name.
FortiGate Version 3 .0 MR4 Administration Guide
5001-30004-0203-20070102
Page 51
System Status Changing the FortiGate firmware
Changing the FortiGate firmware
FortiGate administrators whose access profiles permit maintenance read and
write access can change the FortiGate firmware.
Firmware changes either upgrade to a newer version or revert to an earlier
version. Follow the appropriate procedure for the firmware change you want to
perform:
•Upgrading to a new firmware version
•Reverting to a previous firmware version
Upgrading to a new firmware version
Use the following procedure to upgrade the FortiGate unit to a newer firmware
version.
Note: Installing firmware replaces the current antivirus and attack definitions with the
definitions included with the firmware release that you are installing. After you install new
firmware, use the procedure “To update antivirus and at tack definitions” on page 167 to
make sure that antivirus and attack definitions are up to date.
To upgrade the firmware using the web-based manager
1Copy the firmware image file to your management computer.
2Log into the web-based manager as the super admin, or a n administrator a ccount
that has system configuration read and write privileges.
3Go to System > Status.
4In the System Information section, select Update on the Firmware Version line.
5Type the p ath and filename of the firmware image file, or select Browse and locate
the file.
6Select OK.
The FortiGate unit uploads the firmware image file, upgrades to the new firmware
version, closes all sessions, restarts, and displays the FortiGate login. This
process takes a few minutes.
7Log into the web-based manager.
8Go to System > Status and check the Firmware Version to confirm that the
firmware upgrade is successfully installed.
9Update antivirus and attack definitions. For information about updating antivirus
and attack definitions, see “FortiGuard Center” on page 161.
Reverting to a previous firmware version
Use the following procedure to revert your FortiGate unit to a previous firmware
version. This also reverts the FortiGate unit to its factory default configuration and
deletes IPS custom signatures, web content lists, email filtering list s, and cha nges
to replacement messages. Back up your FortiGate unit configuration to preserve
this information. For information, see “Backup and restore” on page 157.
If you are reverting to a previous FortiOS™ version (for example, reverting from
FortiOS v3.0 to FortiOS v2.8), you might not be able to restore the previous
configuration from the backup configuration file.
FortiGate Version 3 .0 MR4 Administration Guide
01-30004-0203-2007010251
Page 52
Viewing operational historySystem Status
Note: Installing firmware replaces the current antivirus and attack definitions with the
definitions included with the firmware release that you are installing. After you install new
firmware, use the procedure “To update antivirus and attack definitions” on page 167 to
make sure that antivirus and attack definitions are up to date.
To revert to a previous firmware version using the web-based manager
1Copy the firmware image file to the management computer.
2Log into the web-based manager as the super admin, or an administrator account
that has system configuration read and write privileges.
3Go to System > Status.
4In the System Information section, select Update on the Firmware Version line.
5Type the path and filename of the firmware image file, or select Br owse and locate
the file.
6Select OK.
The FortiGate unit uploads the firmware image file, reverts to the old firmware
version, resets the configuration, restarts, and displays the FortiGate login. This
process takes a few minutes.
7Log into the web-based manager.
8Go to System > Status and check the Firmware Version to confirm that the
firmware is successfully installed.
9Restore your configuration.
For information about restoring your configuration, see “Backup and restore” on
page 157.
10Update antivirus and attack definitions.
For information about antivirus and attack definitions, se e “To update antivirus and
attack definitions” on page 167.
Viewing operational history
The System Resource History page displays six graphs representing system
resources and protection activity.
1Go to System > Status.
2Select History in the upper right corner of the System Resources section.
Time IntervalSelect the time interval that the graphs show.
CPU Usage HistoryCPU usage for the preceding interval.
Memory Usage HistoryMemory usage for the preceding interval.
Session HistoryNumber of sessions over the preceding interval.
Network Utilization HistoryNetwork utilization for the preceding interval.
Virus HistoryNumber of Viruses detected over the preceding interval.
Intrusion HistoryNumber of intrusion attempts detected over the preceding
interval.
FortiGate Version 3 .0 MR4 Administration Guide
5201-30004-0203-20070102
Page 53
System Status Manually updating FortiGuard definitions
Figure 18: Sample system resources history
Manually updating FortiGuard definitions
You can update your FortiGuard - AV and FortiGuard - Intrusion Protection
definitions at any time from the License Information section of the System Status
page.
Note: For information about configuring the FortiGate unit for auto matic AV and automatic
IPS (attack) definitions updates, see “FortiGuard Center” on page 161.
Updating the FortiGuard AV Definitions manually
1Download the latest AV definitions update file from Fortinet and copy it to the
computer that you use to connect to the web-based manager.
2Start the web-based manager and go to System > Status.
3In the License Information section, in the AV Definitions field of the FortiGuard
Subscriptions, select Update.
The Anti-Virus Definitions Update dialog box appears.
4In the Update File field, type the path and filename for the AV definitions update
file, or select Browse and locate the AV definitions update file.
5Select OK to copy the AV definitions update file to the FortiGate unit.
The FortiGate unit updates the AV definitions. This takes about 1 minute.
6Go to System > Status to confirm that the FortiGuard - AV Definitions version
information has updated.
Updating the FortiGuard IPS Definitions manually
1Download the latest attack definitions update file from Fortinet and copy it to the
computer that you use to connect to the web-based manager.
2Start the web-based manager and go to System > Status.
FortiGate Version 3 .0 MR4 Administration Guide
01-30004-0203-2007010253
Page 54
Viewing StatisticsSystem Status
3In the License Information section, in the IPS Definitions field of the FortiGuard
Subscriptions, select Update.
The Intrusion Prevention System Definitions Update dialog box appears.
4In the Update File field, type the path and filename for the attack definitions
update file, or select Browse and locate the attack definitions update file.
5Select OK to copy the attack definitions update file to the FortiGate unit.
The FortiGate unit updates the attack definitions. This takes about 1 minute.
6Go to System > Status to confirm that the IPS Definitions version information has
updated.
Viewing Statistics
The System Status Statistics provide information about sessions, content
archiving and network protection activity.
Viewing the session list
The session list displays information about the current communications sessions
on the FortiGate unit.
T o view the session list
1Go to System > Status.
2In the Statistics section, select Details on the Sessions line.
Figure 19: Session list
Virtual DomainSelect a virtual domain to list the sessions being processed by that
Refresh Update the session list.
Page up View previous page in the session list.
Page down View the next page in the session list.
LineEnter the line number of the session to start the displayed session list.
Clear All Filters Select to reset any display filters that may have been set.
Filter Icon
virtual domain. Select All to view sessions being processed by all virtual
domains.
This is only available if multiple virtual domains are enabled.
For example if there are 5 sessions and you enter 3, only the sessions
numbered 3, 4 and 5 will be displayed.
The number following the ‘/’ is the number of active sessions on the
FortiGate unit.
The icon at the top of all columns except #, and Expiry. When
selected it brings up the Edit Filter dialog allowing you to set the
display filters by column.
ProtocolThe service protocol of the connection, for example, udp, tcp, or icmp.
Source Address The source IP address of the connection.
FortiGate Version 3 .0 MR4 Administration Guide
5401-30004-0203-20070102
Page 55
System Status Viewing Statistics
Source PortThe source port of the connection.
Destination
Address
Destination Port The destination port of the connection.
Policy IDThe number of the firewall policy allowing this session or blank if the
Expiry (sec)The time, in seconds, before the connection expires.
Delete iconStop an active communication session. Your access profile must
The destination IP address of the connection.
session involves only one FortiGate interface (admin session, for
example).
include read and write access to System Configuration.
Viewing the Content Archive information
From the Statistics section of the System Status page, you can view statistics
about HTTP, email, FTP and IM traffic through the FortiGate unit. You can select
the Details link beside each traffic type to view more information.
You can select Reset on the header of the Statistics section to clear the content
archive and attack log information and reset the counts to zero.
Viewing archived HTTP content information
1Go to System > Status.
2In the Content Archive section, select Details for HTTP.
Date and TimeThe time when the URL was accessed.
FromThe IP address from which the URL was accessed.
URLThe URL that was accessed.
Viewing archived Email content information
1Go to System > Status.
2In the Content Archive section, select Details for Email.
Date and TimeThe time that the email passed through the FortiGate unit.
FromThe sender’s email address.
ToThe recipient’s email address.
SubjectThe subject line of the email.
FortiGate Version 3 .0 MR4 Administration Guide
01-30004-0203-2007010255
Page 56
Viewing StatisticsSystem Status
Viewing archived FTP content information
1Go to System > Status.
2In the Content Archive section, select Details for FTP.
Date and TimeThe time of access.
DestinationThe IP address of the FTP server that was accessed.
UserThe User ID that logged into the FTP server.
DownloadsThe names of files that were downloaded.
UploadsThe names of files that were uploaded.
Viewing archived IM content information
1Go to System > Status.
2In the Content Archive section, select Details for IM.
Date / TimeThe time of access.
ProtocolThe protocol used in this IM session.
KindThe kind of IM traffic this transaction is.
LocalThe local address for this transaction.
RemoteThe remote address for this transaction
DirectionIf the file was sent or received.
Viewing the Attack Log
From the Statistics section of the System Status page, you can view statistics
about the network attacks that the FortiGate unit has stopped. You can select the
Details link beside each attack type to view more information.
You can select Reset on the header of the Statistics section to clear the content
archive and attack log information and reset the counts to zero.
Viewing viruses caught
1Go to System > Status.
2In the Attack Log section, select Details for AV.
Date and TimeThe time when the virus was detected.
FromThe sender’s email address or IP address.
FortiGate Version 3 .0 MR4 Administration Guide
5601-30004-0203-20070102
Page 57
System Status Viewing Statistics
ToThe intended recipient’s email address or IP address.
ServiceThe service type, such as POP or HTTP.
VirusThe name of the virus that was detected.
Viewing attacks blocked
1Go to System > Status.
2In the Attack Log section, select Details for IPS.
Date and TimeThe time that the attack was detected.
FromThe source of the attack.
ToThe target host of the attack.
ServiceThe service type.
AttackThe type of attack that was detected and prevented.
Viewing spam email detected
1Go to System > Status.
2In the Attack Log section, select Details for Spam.
Date and TimeThe time that the spam was detected.
From->To IPThe sender and intended recipient IP addresses.
From->To Email AccountsThe sender and intended recipient email addresses.
ServiceThe service type, such as SMTP, POP or IMAP.
SPAM TypeThe type of spam that was detected.
Viewing URLs blocked
1Go to System > Status.
2In the Attack Log section, select Details for Web.
Date and TimeThe time that the attempt to access the URL was detected.
FromThe host that attempted to view the URL.
URL BlockedThe URL that was blocked.
FortiGate Version 3 .0 MR4 Administration Guide
01-30004-0203-2007010257
Page 58
Topology viewerSystem Status
Topology viewer
The Topology viewer provides a way to diagram and document the networks
connected to your FortiGate unit. It is available on all FortiGate units except
models numbered 50 and 60.
The Topology Viewer window
The Topology window consists of a large “canvas” upon which you can draw a
network topology diagram for your FortiGate installation.
Figure 20: Topology viewer
View/edit controls
Text object
Subnet object
Main viewport
Viewport
control
Main viewport and viewport control
The main viewport is a portion of the total drawing area. It corresponds to the dark
rectangle in the viewport control. You can drag the main viewport rectangle within
the viewport control to determine which pa rt of the drawing area the main viewport
displays. The “+” and “-” buttons in the viewport control have the same function as
the Zoom in and Zoom out edit controls.
The FortiGate unit is a permanent part of the topology diagram. You can move it,
but not delete it.
FortiGate Version 3 .0 MR4 Administration Guide
5801-30004-0203-20070102
Page 59
System Status Topology viewer
View and edit controls
The toolbar at the top left of the Topology page shows controls for viewing and
editing topology diagrams.
Table 3: View/Edit controls for Topology Viewer
Refresh the displayed diagram.
Zoom in. Select to show a smaller portion of the drawing area in the
main viewport, making objects appear larger.
Zoom out. Select to show a larger portion of the drawing area in the
main viewport, making objects appear smaller.
Edit. Select this button to begin editing the diagram.
The toolbar expands to show the editing controls described below:
Save any changes made to the diagram. You need to save changes
before you switch to any other page in the web-based manager.
Add a subnet object to the diagram. The subnet object is based on
the firewall address you select. The object has the name of the
firewall address and is connected by a line to the interface
associated with that address.
You can also create a new firewall address using this control, but it
must be associated with a specific interface. For more information
about firewall addresses, see “Firewall Address” on page 235.
Insert Text. Select this control and then click on the diagram where
you want to place the text object. Type the text and then click outside
the text box.
Delete. Select the object to delete and then select this control or
press the Delete key.
Customize. Select to change the colors and the thickness of lines
used in the drawing. See “Customizing the topology diagram” on
page 60.
Drag. Select this control and then drag objects in the diagram to
arrange them as needed.
Scroll. Select this control and then drag the drawing background to
move the main viewport within the drawing area. This has the same
effect as moving the main viewport rectangle in the viewport control.
Select. Select this control and then drag the mouse pointer to create
a selection rectangle. Objects in the rectangle are selected when you
release the mouse button.
Exit. Select this button to finish editing the diagram.
The toolbar contracts to show only the Refresh and Zoom controls.
FortiGate Version 3 .0 MR4 Administration Guide
01-30004-0203-2007010259
Page 60
Customizing the topology diagram
Select the Customize button to open the Topology Customization window. Modify
the settings as needed and select OK when you are finished.
Figure 21: Topology Customization window
System Status
PreviewA simulated topology diagram showing the effect of the selected
Canvas SizeThe size of the drawing in pixels.
Resize to ImageIf you selected an image as Backgrou nd, resize the diagram to fit
BackgroundOne of:
Background ColorSelect the color of the diagram background.
Image pathIf you selected Upload My Image for Background, enter the path to
Exterior ColorSelect the color of the border regi on outside your diagram.
Line ColorSelect the color of connecting lines between subnet objects and
Line WidthSelect the thickness of con necting lines.
Reset to DefaultReset all settings to default.
appearance options.
within the image.
Solid - a solid color selected in Background Color
U.S. Map - a map of the United States.
World Map - a map of the world.
Upload My Image - upload the image from Image Path.
you image, or use the Browse button to find it.
interfaces.
FortiGate Version 3 .0 MR4 Administration Guide
6001-30004-0203-20070102
Page 61
Using virtual domains Virtual domains
Using virtual domains
This section describes how to use virtual domains to operate your FortiGate unit
as multiple virtual units, providing separate firewall and routing services to multiple
networks.
The following topics are included in this section:
•Virtual domains
•Enabling VDOMs
•Configuring VDOMs and global settings
Virtual domains
Virtual domains (VDOMs) enable a FortiGate unit to function as multiple
independent units. A single FortiGa te unit is then flexible enough to ser ve multiple
departments of an organization, separate organizations or be the basis for a
service provider’s managed security service.
VDOMs provide separate security domains that allow separate zones, user
authentication, firewall policies, routing, and VPN configurations. Using VDOMs
can also simplify administration of complex configurations because you do not
have to manage as many routes or firewall policies at one time . See “VDOM
configuration settings” on page 62.
To configure and use VDOMs, you must enable virtual domain configuration. See
“Enabling VDOMs” on page 64.
When you create and configure a VDOM, you must assign interfaces or VLAN
subinterfaces to it. Optionally, you can assign an administrator account that can
log in only to that VDOM. If the VDOM is created to serve an organization, this
enables the organization to manage its conf iguration independently.The operating
mode, NAT/Route or Transparent, is independently selectable for each VDOM.
When a packet enters a VDOM, it is confined to tha t VDOM. In a VDOM, yo u can
create firewall policies for connections between VLAN subinterfaces or zones in
the VDOM. Packets do not cross the virtua l domain border internally. To travel
between VDOMs a packet must pass through a firewall on a physical interface.
The packet then arrives at another VDOM on a different interface where it must
pass through another firewall before entering. Both VDOMs are on the same
FortiGate unit.The one exception is if you configure inter-VDOM routing using CL I
commands.
The remainder of FortiGate functionality is global. It applies to all VDOMs. This
means that there is one intrusion prevention configuration, one antivirus
configuration, one web filter configuration, one protection profile configuration,
and so on. As well, VDOMs share firmware versions, antivirus and attack
databases. For a complete list of shared configuration settings, see “Global
configuration settings” on page 63.
FortiGate Version 3.0 MR4 Administration Guide
01-30004-0203-2007010261
Page 62
Virtual domainsUsing virtual domains
By default, your FortiGate unit supports a maximum of 10 VDOMs in any
combination of NAT/Route and Transparent modes. For FortiGate models
numbered 3000 and higher, you can purchase a license key to increase the
maximum number of VDOMs to 25, 50, 100 or 250. For more information see
“License” on page 172.
If virtual domain configuration is enabled and you log in as the default super
admin, you can go to System > Status and look at Virtual Domain in the License
Information section to see the maximum number of virtual domains supported on
your FortiGate unit.
By default, each FortiGate unit has a VDOM named root. This VDOM includes all
of the FortiGate physical interfaces, VLAN subinterfaces, zones, firewall policies,
routing settings, and VPN settings.
Management systems such as SNMP, logging, alert email, FDN-based updates
and NTP-based time setting use addresses and routing in the man agement
VDOM to communicate with the network. They can connect only to network
resources that communicate with the management virtual domain. The
management VDOM is set to root by default, but can be changed. For more
information see “Changing the Management VDOM” on page 67
Once you add a VDOM you can configure it by adding VLAN subinterfaces,
zones, firewall policies, routing settings, and VPN settings. You can also move
physical interfaces from the root VDOM to other VDOMs and move VLAN
subinterfaces from one VDOM to another. For more information on VLANs, see
“VLAN overview” on page 96.
For more information on VDOMs, see the FortiGate VLANs and VDOMs Guide.
VDOM configuration settings
The following configuration settings are exclusively part of a virtual domain and
are not shared between virtual domains. A regular administrator for the VDOM
sees only these settings. The default super admin can also access these settings,
but must first select which VDOM to configure.
•System settings
•Zones
•DHCP services
•Operation mode (NAT/Route or Transpa rent)
•Management IP (Transparent mode)
•Router configuration
•Firewall settings
•Policies
•Addresses
•Service groups and custom services
•Schedules
•Virtual IPs
•IP pools
•VPN configuration
•IPSec
•PPTP
•SSL
FortiGate Version 3 .0 MR4 Administration Guide
6201-30004-0203-20070102
Page 63
Using virtual domains Virtual domains
•User settings
•Users
•User groups
•RADIUS and LDAP servers
•Microsoft Windows Active Directory servers
•P2P Statistics (view/reset)
•Logging configuration, log access and log reports
Global configuration settings
The following configuration settings affect all virtual domains. When virtual
domains are enabled, only the default super admin can access global settings.
•System settings
•Physical interfaces and VLAN subinterfaces
(Each physical interface or VLAN subinterface belongs to only one VDOM.
Each VDOM can use or configure only its own interfaces.)
•DNS settings
•Host name, System time, Firmware version (on System Status page)
•Idle and authentication timeout
•Web-based manager language
•LCD panel PIN, where applicable
•Dead gateway detection
•HA configuration
•SNMP configuration
•Replacement messages
•Administrators
(Each administrator belongs to only one VDOM. Each VDOM can configure
only its own administrators.)
•Access profiles
•FortiManager configuration
•Configuration backup and restore
•FDN update configuration
•Bug reporting
•Firewall
•Predefined services
•Protection Profiles
•VPN certificates
•Antivirus configuration
•Intrusion Prevention configuration
•Web filter configuration
•Antispam configuration
•IM configuration
•Statistics
•User lists and policies
FortiGate Version 3 .0 MR4 Administration Guide
01-30004-0203-2007010263
Page 64
Enabling VDOMsUsing virtual domains
Enabling VDOMs
Using the default admin administration account, you can enable multiple VDOM
operation on the FortiGate unit.
To enable virtual domains
1Log in to the web-based manager as admin.
2Go to System > Status.
3In System Information, next to Virtual Domain select Enable.
The FortiGate unit logs you off. You can now log in again as admin.
When virtual domains are enabled, the web-based manager and the CLI are
changed as follows:
•Global and per-VDOM configurations are separated.
•A new VDOM entry appears under System.
•Only the admin account can view or configure global options.
•The admin account can configure all VDOM configurations.
•The admin account can connect through any interface in the root VDOM or
though any interface that belongs to a VDOM for wh ich a regular a dministr ator
account has been assigned.
•A regular administrator account can configure only the VDOM to which it is
assigned and can access the FortiGate unit only through an interface that
belongs to that VDOM.
When virtual domains are enabled, you can see what the current virtual domain is
by looking at the bottom left of the screen. It will say Current VDOM: followed by
the name of the virtual domain.
Configuring VDOMs and global settings
When Virtual Domains are enabled, only the default super admin account can:
•configure global settings
•create or delete VDOMs
•configure multiple VDOMs
•assign interfaces to a VDOM
•assign an administrator to a VDOM
A VDOM is not useful unless it contains at least two physical interfaces or virtual
subinterfaces for incoming and outgoing traffic. Only the super admin can assign
interfaces or subinterfaces to VDOMs. A regular administrator accoun t can create
a VLAN subinterface on a physical interface within their own VDOM.
Only the super admin can configure a VDOM unless you create and assign a
regular administrator to that VDOM. Only the super admin can assign an
administrator to a VDOM. An administrator account whose access profile provides
read and write access to Admin Users can create additional administrators in its
own VDOM.
FortiGate Version 3 .0 MR4 Administration Guide
6401-30004-0203-20070102
Page 65
Using virtual domains Configuring VDOMs and global settings
Working with VDOMs and global settings
When you log in as admin and virtual domains are enabled you are automatically
in global configuration, as demonstrated by the VDOM option under System.
Select System > VDOM to work with virtual domains.
Figure 22:VDOM list
Create NewSelect to add a new VDOM. Enter the new VDOM name and
ManagementChange the management VDOM to the selected VDOM. The
DeleteDelete the selected VDOM.
SwitchSelect to enter that VDOM.
NameThe name of the VDOM.
Operation ModeThe VDOM operation mode, eithe r NAT or Transparent.
InterfacesThe interfaces associated with this VDOM, including virtual
Management Virtual
Domain
select OK.
The VDOM must not have the same name as an existing VDOM,
VLAN or zone. The VDOM name can be a maximum of 11
characters long without spaces.
management VDOM is indicated in brackets. The default
management VDOM is root.
If more than one VDOM is selected when Set Management is
selected, the VDOM appearing first in the table will be assigned
as the management VDOM. For more information see “Changing
the Management VDOM” on page 67.
You cannot delete the root VDOM.
You can see which VDOM you are currently in by looking at the
left side of the screen at the bottom where the name of the VDOM
is displayed. The global settings screen does not have any
VDOM name in this location.
interfaces.
Indicates which VDOM is the management domain. All non-
management domains are indicated with a “no”.
Adding interfaces to a VDOM
A VDOM must contain at least two interfaces. These can be physical or virtual
interfaces such as VLAN subinterfaces. By default, all physical interfaces are in
the root virtual domain.
As of FortiOS v3.0 MR1, inter-VDOM routing enables you to communicate
between VDOMs internally without using a physical interface. This feature is only
configurable with the CLI. For information on configuring inter-VDOM interfaces,
see the FortiGate CLI Reference and the FortiGate VLANs and VDOMs Guide.
FortiGate Version 3 .0 MR4 Administration Guide
01-30004-0203-2007010265
Page 66
Configuring VDOMs and global settingsUsing virtual domains
VLAN subinterfaces often need to be in a different VDOM than their physical
interface. To do this, the super admin must first create th e VDOM , th en cr ea te the
VLAN subinterface, and assign it to the required VDOM.
System > Network > Interfaces is only in global settings, and is not available
within any VDOM. For information on creating VLAN subinterfaces, see “Adding
VLAN subinterfaces” on page 98.
Assigning an interface to a VDOM
The following procedure describes how to reassign an existing interface from one
virtual domain to another. It assumes VDOMs are enabled and more than one
VDOM exists.
You cannot delete a VDOM if it is used in any configurations, such as having an
interface in that VDOM. You cannot remove an interface from a VDOM if the
interface is included in of any of the following configurations:
•DHCP server
•zone
•routing
•firewall policy
•IP pool
•proxy arp (only accessible through the CLI)
Delete these items or modify them to remove the interface before proceeding.
Note: An interface or subinterface is available for reassigning or removing once the delete
icon is displayed. Until then, the interface is used in a configuration somewhere.
To assign an interface to a VDOM
1Log in as admin.
2Go to System > Network > Interface.
3Select Edit for the interface that you want to reassign.
4Select the new Virtual Domain for the interface.
5Configure other settings as required and select OK. For more information on the
other interfaces settings see “Interface settings” on page 72.
The interface is assigned to the VDOM. Existing firewall IP pools and virtual IP
addresses for this interface are deleted. You should manually delete any routes
that include this interface, and create new routes for this interface in the new
VDOM. Otherwise your network traffic will not be properly routed.
Assigning an administrator to a VDOM
If you are creating a VDOM to serve an organization that will be administering its
own resources, you need to create an administrator account for that VDOM.
A VDOM admin can change configuration settings within that VDOM but cannot
make changes that affect other VDOMs on the FortiGate unit.
FortiGate Version 3 .0 MR4 Administration Guide
6601-30004-0203-20070102
Page 67
Using virtual domains Configuring VDOMs and global settings
A regular administrator assigned to a VDOM can log in to the web -based manager
or the CLI only on interfaces that belong to that VDOM. The super admin can
connect to the web-based manager or CLI thro ugh an y interface on th e Fo rtiGate
unit that permits management access. Only the super admin or a regular
administrator of the root domain can log in by connecting to the con sole interface.
To assign an administrator to a VDOM
1Log in as the super admin.
Virtual domains must be enabled.
2Go to System > Admin >Administrators.
3Create and/or configure the new administrator account as required.
For detailed information about configuring an administrator account, see
“Configuring an administrator account” on page 146.
4While configuring this admin account, select the VDOM this administrator
manages from the Virtual Domain list.
5Select Apply .
Changing the Management VDOM
The management VDOM on your FortiGate unit is where some default types of traffic
originate. These types of traffic include:
•SNMP
•logging
•alert email
•FDN-based updates
•NTP-based time setting
Before you change the management VDOM, ensure virtual domains are enabled.
Only one VDOM can be the management VDOM at any given time. If you
accidently select more than one VDOM when setting the management VDOM, the
VDOM closest to the top of the list will become the management VDOM.
Note: You cannot change the management VDOM if any administrators are using RADIUS
authentication.
To change the management VDOM
1Go to System > VDOM.
2Select the VDOM that will be the new management VDOM.
3Select Management to apply the changes.
Management traffic will now originate from the new management VDOM.
FortiGate Version 3 .0 MR4 Administration Guide
01-30004-0203-2007010267
Page 68
Configuring VDOMs and global settingsUsing virtual domains
FortiGate Version 3 .0 MR4 Administration Guide
6801-30004-0203-20070102
Page 69
System Network Interface
System Network
This section describes how to configure your FortiGate unit to operate in your
network. Basic network settings include configuring FortiGate interfaces and DNS
settings. More advanced configuration includes adding VLAN subinterfaces and
zones to the FortiGate network configuration.
The following topics are included in this section:
•Interface
•Zone
•Network Options
•Routing table (Transparent Mode)
•Configuring the modem interface
•VLAN overview
•VLANs in NAT/Route mode
•VLANs in Transparent mode
•FortiGate IPv6 support
Interface
Note: Where you can enter both an IP address and a netmask in the same field, you can
use the short form of the netmask. For example, 192.168.1.100/255.255.255.0 can also be
entered as 192.168.1.100/24.
In NAT/Route mode, go to System > Network > Interface to configure FortiGate
interfaces. You can
•modify the configuration of a physical interfa ce
•add and configure VLAN subinterfaces
•configure an ADSL interface
•aggregate several physical interfaces into an IEEE 802.3ad interface (models
800 and higher only)
•combine physical interfaces into a redundant interface
•add wireless interfaces (WiFi-60A and WiFi-60AM models only)
Note: Unless stated otherwise, in this section the term interface can refer to a physical
FortiGate interface or to a FortiGate VLAN subinterface.
For information about VLANs, see “FortiGate units and VLANs” on page 96.
FortiGate Version 3.0 MR4 Administration Guide
01-30004-0203-2007010269
Page 70
InterfaceSystem Network
Figure 23: Interface list - regular administrator view
Figure 24: Interface list - admin view with virtual domains enabled
Create New Select Create New to create a VLAN subinterface.
On models 800 and higher, you can also create an IEEE 802.3ad
aggregated interface.
Switch ModeSelect to change between switch mode and interface mode. Switch
show backplane
interfaces
Description icon The toolti p for this icon displays the Description field for this interface.
mode has the internal ports all on one interface. Interface mode gives
each port its own configurable interface.
Before switching modes, all references to ‘internal’ interfaces must be
removed.
This option is visible only on models 100A and 200A for Rev2.0 and
higher. For more information see “Switch Mode” on page 71.
Select to make the two backplane interfaces visible as port9 and port10.
Once visible these interfaces can be treated as regular physical
interfaces.
This option is available only on 5000 models.
FortiGate Version 3 .0 MR4 Administration Guide
7001-30004-0203-20070102
Page 71
System Network Interface
NameThe names of the physical interfaces on your FortiGate unit.
The name and number of a physical interface depends on the model.
Some names indicate the default function of the interface such as
Internal, External and DMZ. Other names are generic such as port1.
FortiGate models numbered 50 and 60 provide a modem interface. See
“Configuring the modem interface” on page 91.
The oob/ha interface is the FortiGate model 4000 out of band
management interface. Y ou can connect to this interface to manage the
FortiGate unit. This interface is also available as an HA heartbeat
interface.
On FortiGate 60ADSL units, you can configure the ADSL interface. See
“Configuring an ADSL interface” on page 74.
On FortiGate models 800 and higher, if you combine several interfaces
into an aggregate interface, only the aggregate interface is listed, not
the component interfaces. The same is true for redundant interfaces.
See “Creating an 802.3ad aggregate interface” on page 75 or “Creating
a redundant interface” on page 76.
If you have added VLAN subinterfaces, they also appear in the name
list, below the physical or aggregated interface to which they have been
added. See “VLAN overview” on page 96.
If virtual domain configuration is enabled, you can view information only
for the interfaces that are in your own virtual domain, unless you are the
super admin.
If you have Interface Mode enabled on a FortiGate model 100A or 200A
Rev2.0 or higher you will see multiple internal interfaces.
IP/NetmaskThe current IP address/netmask of the interface.
AccessThe administrative access configuration for the interface.
See “Additional configuration for interfaces” on page 83.
Virtual DomainThe virtual domain to which the interface belongs. This column is visible
StatusThe administrative status for the interface.
Delete, edit, and
view icons
only to the super admin and only when virtual domain configuration is
enabled.
If the administrative status is a green arrow, the interface is up and can
accept network traffic. If the administrative status is a red arrow, the
interface is administratively down and cannot accept traffic. To change
the administrative status, select Bring Down or Bring Up.
Delete, edit, or view an entry.
Switch Mode
The internal interface on 100A and 200A FortiGate models is a four port switch.
Normally the internal interface is configured as one interface shared by all four
ports. Switch mode allows you to configure each interface on the switch
separately with their own interfaces.
Switch mode has two states - switch mode and interface mode. Switch mode is
the default mode with only one interface for the entire switch. Interface mode
allows you to configure each of the internal interfaces separately. This allows you
to assign different subnets and netmasks to each of the internal interfaces.
Switch mode is only available on 100A and 200A models of Rev2.0 and higher.
Selecting the Switch Mode control on the System > Network > Interface screen
takes you to the Switch Mode Management screen.
Caution: Before you are able to switch between Switch Mode and Interface Mode all
references to ‘internal’ interfaces must be removed. This includes references such as
!
firewall policies, VDOM interface assignments, VLANS, and routing.
FortiGate Version 3 .0 MR4 Administration Guide
01-30004-0203-2007010271
Page 72
InterfaceSystem Network
Figure 25: Switch Mode Management
Switch ModeSelect Switch Mode. Only one internal interface is displayed. This
Interface ModeSelect Interface Mode. All internal interfaces on the switch are
OKSelect to save your changes and return to the Interface screen.
CancelSelect to discard your changes and return to the Interface screen.
Interface settings
Go to System > Network > Interface. Select Create New to create a new
interface. To edit an existing interface, select the Edit icon for that interface.
You cannot create a virtual IPSec interface here, but you can specify its endpoint
addresses, enable administrative access and provide a description. For more
information, see “Configuring a virtual IPSec interface” on page 82.
Figure 26: Create New Interface settings
is the default mode.
displayed as individually configurable interfaces.
Figure 27: Edit Interface settings
FortiGate Version 3 .0 MR4 Administration Guide
7201-30004-0203-20070102
Page 73
System Network Interface
NameEnter a name for the interface.
You cannot change the name of an existing interface.
TypeOn models 800 and higher, you can create VLAN, 802.3ad Aggregate,
InterfaceSelect the name of the physical interface on which to create the VLAN.
Physical
Interface
Members
VLAN IDEnter the VLAN ID that matches the VLAN ID of the packets to be
Virtual Domain Select the virtual domain to which this VLAN subinterface belongs.
Addressing
mode
IP/NetmaskEnter the IP address/subnet mask in the IP/Netmask field. The IP
DDNSSelect DDNS to configure a Dynamic DNS service for this interface.
Ping ServerT o enable dead gateway detection, enter the IP address of the next hop
Administrative
Access
HTTPSAllow secure HTTPS connections to the web-based manager through
and Redundant interfaces.
On models WiFi-60A and WiFi-60AM, you can create wireless interfaces
and VLAN subinterfaces.
On the 60ADSL model, you can configure an ADSL interface.
Other models support creation of VLAN interfaces only and have no
Type fi el d .
To configure an ADSL interface, see “Configuring an ADSL interface” on
page 74.
To create a VLAN subinterface, see “FortiGate units and VLANs” on
page 96.
To create an aggregate interface, see “Creating an 802.3ad aggregate
interface” on page 75.
To create a redundant interface, see“Creating a redundant interface” on
page 76.
To create a wireless interface, see “Creating a wireless interface” on
page 77.
You cannot change the type of an existing interface.
Once created, the VLAN subinterface is listed below its physical
interface in the Interface list.
You cannot change the interface of an existing VLAN subinterface.
This field is only displayed when Type is set to VLAN.
Move the interfaces to be included in the 802.3ad aggregate or
Redundant interface from the Available interfaces list to the Selected
interfaces list.
This field is only displayed when Type is set to either 802.3ad aggregate
or Redundant interface.
received by this VLAN subinterface. You cannot change the VLAN ID of
an existing VLAN subinterface.
The VLAN ID can be any number between 1 and 4096 and must match
the VLAN ID added by the IEEE 802.1Q-compliant router or switch
connected to the VLAN subinterface. See “VLAN overview” on page 96.
This field is only displayed when Type is set to VLAN.
This is available to the super admin account when virtual domain
configuration is enabled. See “Using virtual doma ins” on page 61.
To configure a static IP address for the interface, select Manual.
Y ou can also configure the interface for dynamic IP address assignment.
See “Configuring DHCP on an interface” on page 78 or “Configuring an
interface for PPPoE or PPPoA” on page 80.
address must be on the same subnet as the network to which the
interface connects.
Two interfaces cannot have IP addresses on the same subnet.
This field is only available when Manual addressing mode is selected.
Additional fields are displayed. See “Configuring Dynamic DNS service
for an interface” on page 81.
router on the network connected to the interface and select Enable. See
“Dead gateway detection” on page 89.
Select the types of administrative access permitted on this interface.
this interface.
FortiGate Version 3 .0 MR4 Administration Guide
01-30004-0203-2007010273
Page 74
InterfaceSystem Network
PINGInterface responds to pings. Use this sett ing to verify your installation
HTTPAllow HTTP connections to the web-based manager through this
SSHAllow SSH connections to the CLI through this interface.
SNMPAllow a remote SNMP manager to request SNMP information by
TELNETAllow Telnet connections to the CLI through this interface. Telnet
MTUTo change the MTU, select Override default MTU value (1 500) and
LogSelect Log to record logs for any traffic to or from the interface. T o record
Secondary IP
Address
DescriptionOptionally, enter a description up to 63 characters long.
and for testing.
interface. HTTP connections are not secure and can be intercepted by a
third party.
connecting to this interface. See “Configuring SNMP” on page 127.
connections are not secure and can be intercepted by a third party.
enter the MTU size based on the addressing mode of the interface
• 68 to 1 500 bytes for static mode
• 57 6 to 1 500 byte s for DHCP mode
• 57 6 to 1 492 bytes for PPPoE mode
• up to 16 110 bytes for jumbo frames (FortiGate models numbered
3000 and higher)
This field is available only on physical interfaces. VLANs inherit the
parent interface MTU size by default.
For more information on MTU and jumbo frames, see “Interface MTU
packet size” on page 84.
logs you must also enable traffic log for a logging location and set the
logging severity level to Notification or lower. Go to Log&Report > Log Config to configure logging locations and types. For information about
logging see “Log&Report” on page 407.
Select the blue arrow to expand or hide this section and add additional
IP addresses to this interface. See “Secondary IP Addresses” on
page 85.
Note: In Transparent mode, if you change the MTU of an interface, you must change the
MTU of all interfaces to match the new MTU.
Configuring an ADSL interface
The information that you need to provide for the ADSL interface depends on the
addressing mode your ISP requires you to use. Static addressing using IPOA or
EOA requires only an IP address and netmask. If you are usin g dyn ami c
addressing, you need to configure it as described in “Configuring DHCP on an
interface” on page 78 or “Configuring an interface for PPPoE or PPPoA” on
page 80.
To configure an ADSL interface, your FortiGate unit cannot be in Transparent
mode.
Go to System > Network > Interface. Select Create New or select the Edit icon
of an existing interface. In the Addressing mode section, select IPoA or EoA.
FortiGate Version 3 .0 MR4 Administration Guide
7401-30004-0203-20070102
Page 75
System Network Interface
Figure 28: Settings for an ADSL interface
Address modeSelect the addressing mode that your ISP specifies.
IPOAIP over ATM. Enter the IP address and netmask that your
EOAEthernet over ATM, also known as Bridged mode. Enter
DHCPSee
PPPoESee “Configuring an interface for PPPoE or PPPoA”
ISP provides.
the IP address and netmask that your ISP provides.
“Configuring DHCP on an interface” on page 78.
on page 80.
PPPoASee “Configuring an interface for PPPoE or PPPoA”
on page 80.
GatewayEnter the default gateway.
Connect to ServerEnable Connect to Server so that the interface
Virtual Circuit Identification Enter the VPI and VCI values your ISP provides.
MUX Ty peSelect the MUX type: LLC Encap or VC Encap.
automatically attempts to connect. Disable this option if
you are configuring the interface offline.
Your ISP must provide this information.
Creating an 802.3ad aggregate interface
You can aggregate (combine) two or more physical interfaces to increase
bandwidth and provide some link redundancy. This has the benefit of higher
bandwidth but has more potential points of failure than redundant interfaces. The
interfaces must connect to the same next-hop routing destination.
FortiGate firmware on models 800 and higher implements
for link aggregation.
An interface is available for aggregation only if
•it is a physical interface, not a VLAN interface
•it is not already part of an aggregated or redundant interface
•it is in the same VDOM as the aggregated interface
•it has no defined IP address and is not configured for DHCP or PPPoE
•it has no DHCP server or relay configured on it
•it does not have any VLAN subinterfaces
•it is not referenced in any firewall policy, VIP, IP Pool or multicast policy
•it is not an HA heartbeat interface
•it is not one of the FortiGate 5000 series backplane interfaces
When an interface is included in an aggregate interface, it is not listed on the
System > Network > Interface page. It is no longer individually configurable and
is not available for inclusion in firewall policies, VIPs, IP pools or routing.
IEEE standard 802.3ad
FortiGate Version 3 .0 MR4 Administration Guide
01-30004-0203-2007010275
Page 76
InterfaceSystem Network
Figure 29: Settings for an 802.3ad aggregate interface
To create an 802.3ad Aggregate interface
1Go to System > Network > Interface.
2Select Create New.
3In the Name field, enter a name for the aggregated interface.
The interface name must not be the same as any other interface, zone or VDOM.
4From the Type list, select 802.3ad Aggregate.
5One at a time, in the Available Interfaces list, select each interface that you want
to include in the aggregate interface and then select the right arrow button to
move it to the Selected Interfaces list.
6If this interface operates in NAT/Route mode, you need to configure addressing
for it. For information about dynamic addressing, see:
•“Configuring DHCP on an interface” on page 78
•“Configuring an interface for PPPoE or PPPoA” on page 80
7Configure other interface options as required.
8Select OK.
Creating a redundant interface
You can combine two or more physical interfaces to provide link r edundan cy. This
feature allows you to connect to two or mo re switches to ensure connectivity in the
event one physical interface or the equipment on that interface fails.
Redundant links differ from link aggregation in that traffic is only going over one
interface at any time (no matter how many ar e in the redu nd an t link ), bu t
redundant interfaces allow for more robust configurations with fewer possible
points of failure. This is important in a fully meshed HA configuration.
FortiGate firmware on models 800 and higher implements redundant interfaces.
An interface is available to be in a redundant interface only if
•it is a physical interface, not a VLAN interface
•it is not already part of an aggregated or redundant interface
•it is in the same VDOM as the redundant interface
•it has no defined IP address and is not configured for DHCP or PPPoE
•it has no DHCP server or relay configured on it
•it does not have any VLAN subinterfaces
FortiGate Version 3 .0 MR4 Administration Guide
7601-30004-0203-20070102
Page 77
System Network Interface
•it is not referenced in any firewall policy, VIP, IP Pool or multicast policy
•it is not monitored by HA
When an interface is included in a redundant interface, it is not listed on the
System > Network > Interface page. It is no longer individually configurable and
is not available for inclusion in firewall policies, VIPs, IP pools or routing.
Figure 30: Settings for a redundant interface
To create a redundant interface
1Go to System > Network > Interface.
2Select Create New.
3In the Name field, enter a name for the redundant interface.
The interface name must not be the same as any other interface, zone or VDOM.
4From the Type list, select Redundant Interface
5One at a time, in the Available Interfaces list, select each physical interface that
you want to include in the redundant interface and then select the right arrow
button to move it to the Selected Interfaces list. The interfaces you add will be
used in the order they appear in the Selected Interfaces list. For example if the
first interface in the list fails, the second interface is used.
6If this interface operates in NAT/Route mode, you need to configure addressing
for it. For information about dynamic addressing, see:
•“Configuring DHCP on an interface” on page 78
•“Configuring an interface for PPPoE or PPPoA” on page 80
7Configure other interface options as required.
8Select OK.
Creating a wireless interface
On FortiWiFi-60A and FortiWiFi-60AM models, you can create wireless WLAN
interfaces. (To create a wireless interface on a FortiWiFi-60 unit, see “System
wireless settings (FortiWiFi-60)” on page 107.)
1Go to System > Network > Interface.
2Select Create New.
3In the Name field, enter a name for the wireless interface.
The interface name must not be the same as any other interface, zone or VDOM.
4From the Type list, select Wireless.
FortiGate Version 3 .0 MR4 Administration Guide
01-30004-0203-2007010277
Page 78
InterfaceSystem Network
5In the Wireless Settings section, enter the following information:
Figure 31: Wireless interface settings
SSIDEnter the wireless network name that the FortiWiFi-60 unit
SSID BroadcastSelect if you want the unit to broadcast its SSID. (Access
Security ModeTo use WEP, select WEP64 or WEP128. To use WPA
KeyFor a 64-bit WEP key, enter 10 hexadecimal digits (0-9 a-
Pre-shared KeyFor WPA Pre-shared Key security mode, enter the pre-
RADIUS Server NameFor WPA Radius security mode, choose the Radius server
Data EncryptionThis applies to WPA mode. Select either TKIP or AES
RTS ThresholdThe Request to Send (RTS) threshold sets the time the
Fragmentation ThresholdSet the maximum size of a data packet before it is broken
broadcasts. Users who want to use the wireless network
must configure their computers to connect to the network
that broadcasts this network name.
Point mode only)
(available in Access Point mode only), select WPA Preshared Key or WPA_Radius. Users of the FortiWiFi-60
wireless network must configure their computers with the
same settings.
f). For a 128-bit WEP key, enter 26 hexadecimal digits (0-9
a-f). Users of the wireless network must configure their
computers with the same key.
shared key. Users of the wireless network should
configure their computers with the same key.
name from the list. The Radius server must be configured
in User > Radius. For more information, see “RADIUS
servers” on page 322.
(WP A2) data encryption.
unit waits for Clear to Send (CTS) acknowledgement from
another wireless device.
into two or more packets. Reducing the threshold can
improve performance in environments that have high
interference.
6Configure other interface options as required.
7Select OK.
Configuring DHCP on an interface
If you configure an interface to use DHCP, the FortiGate unit automatically
broadcasts a DHCP request. The interface is configured with the IP address and
optionally DNS server addresses and default gateway address that the DHCP
server provides.
Go to System > Network > Interface. Select Create New or select the Edit icon
of an existing interface. In the Addressing mode section, select DHCP.
FortiGate Version 3 .0 MR4 Administration Guide
7801-30004-0203-20070102
Page 79
System Network Interface
Figure 32: Interface DHCP settings
Figure 33: ADSL interface DHCP settings
StatusDisplays DHCP status messages as the FortiGate unit connects to
Obtained
IP/Netmask
RenewSelect to renew the DHCP license for this interface.
Expiry DateThe time and date when the leased IP address and netmask is no
Default
Gateway
DistanceEnter the administrative distance for the default gateway retrieved
Retrieve default
gateway from server
the DHCP server and gets addressing information. Select Status
to refresh the addressing mode status message.
This is only displayed if you selected Edit.
Status can be one of:
•initializing - No activity.
• connecting - The interface is attempting to connect to the
DHCP server.
• connected - The interface retrieves an IP address, netmask,
and other settings from the DHCP server.
•failed - The interface was unable to retrieve an IP address and
other information from the DHCP server.
The IP address and netmask leased from the DHCP server.
This is only displayed if Status is connected.
This is only displayed if Status is connected.
longer valid.
This is only displayed if Status is connected.
The IP address of the gateway defined by the DHCP server.
This is only displayed if Status is connected, and if Receive default
gateway from server is selected,.
from the DHCP server. The administrative distance, an integer
from 1-255, specifies the relative priority of a route when there are
multiple routes to the same destination. A lower administrative
distance indicates a more preferred route. The default distance for
the default gateway is 1.
Enable Retrieve default gateway from server to retrieve a default
gateway IP address from the DHCP server. The default gateway is
added to the static routing table.
FortiGate Version 3 .0 MR4 Administration Guide
01-30004-0203-2007010279
Page 80
InterfaceSystem Network
Override internal DNS Enable Override internal DNS to use the DNS addresses retrieved
Connect to serverEnable Connect to Server so that the interface automatically
from the DHCP server instead of the DNS server IP addresses on
the DNS page.
On models numbered 100 and lower, you should also enable
Obtain DNS server address automatically in System > Network > Options. See “DNS Servers” on page 89.
attempts to connect to a DHCP server. Disable this option if you
are configuring the interface offline.
Configuring an interface for PPPoE or PPPoA
If you configure the interface to use PPPoE or PPPoA, the FortiGate unit
automatically broadcasts a PPPoE
Server if you are configuring the FortiGate unit offline and you do not want the
FortiGate unit to send the PPPoE
FortiGate units support many of the PPPoE RFC features (RFC 2516) including
unnumbered IPs, initial discovery timeout and PPPoE Active Discovery Terminate
(PADT).
PPPoA is only available on FortiGate models that support ADSL.
Go to System > Network > Interface. Select Create New or select the Edit icon
of an existing interface. In the Addressing mode section, select PPPoE
Figure 34: Interface PPPoE settings
or PPPoA request. You can disable Connect to
or PPPoA request.
or PPPoA.
Figure 35: ADSL interface PPPoE or PPPoA settings
FortiGate Version 3 .0 MR4 Administration Guide
8001-30004-0203-20070102
Page 81
System Network Interface
StatusDisplays PPPoE or PPPoA status messages as the FortiGate unit
initializing No activity.
connecting The interface is attempting to connect to the PPPoE or PPPoA server.
connected The interface retrieves an IP address, netmask, and other settings
failedThe interface was unable to retrieve an IP address and other
Reconnect Select to reconnect to the PPPoE or PPPoA server.
User NameThe PPPoE or PPPoA account user name.
PasswordThe PPPoE or PPPoA account password.
Unnumbered IPSpecify the IP address for the interface. If your ISP has assigned you a
Initial Disc
Timeout
Initial PADT
timeout
DistanceEnter the administrative distance for the default gateway retrieved from
Retrieve default
gateway from
server
Override internal
DNS
Connect to server Enable Connect to Server so that the interface automatically attempts
connects to the PPPoE or PPPoA server and gets addressing
information. Select Status to refresh the addressing mode status
message.
This is only displayed if you selected Edit.
Status can be one of the following 4 messages.
from the PPPoE server.
When the status is connected, PPPoE or PPPoA connection
information is displayed.
information from the PPPoE or PPPoA server.
This is only displayed if Status is connected.
block of IP addresses, use one of them. Otherwise, this IP address can
be the same as the IP address of another interface or can be any IP
address.
Initial discovery timeout. The time to wait before starting to retry a
PPPoE or PPPoA discovery. Set Initial Disc Timeout to 0 to disable.
Initial PPPoE Active Discovery Terminate (PADT) timeout in seconds.
Use this timeout to shut down the PPPoE or PPPoA session if it is idle
for this number of seconds. PADT must be supported by your ISP. Set
initial PADT timeout to 0 to disable.
the PPPoE or PPPoA server. The administrative distance, an integer
from 1-255, specifies the relative priority of a route when there are
multiple routes to the same destination. A lower administrative
distance indicates a more preferred route. The default distance for the
default gateway is 1.
Enable Retrieve default gateway from server to retrieve a default
gateway IP address from a PPPoE server. The default gateway is
added to the static routing table.
Enable Override internal DNS to replace the DNS server IP addresses
on the System DNS page with the DNS addresses retrieved from the
PPPoE or PPPoA server.
to connect to a PPPoE or PPPoA server when you select OK or Apply .
Disable this option if you are configuring the interface offline.
Configuring Dynamic DNS service for an interface
When the FortiGate unit has a static domain name and a dyna m ic public IP
address, you can use a DDNS service to update Internet DNS servers when the
IP address for the domain changes.
Dynamic DNS is available only in NAT/Route mo de.
Go to System > Network > Interface. Select Create New or select the Edit icon
of an existing interface. Enable DDNS, just below the Addressing mode section,
and configure the DDNS service using the information they have provided to yo u.
FortiGate Version 3 .0 MR4 Administration Guide
01-30004-0203-2007010281
Page 82
InterfaceSystem Network
If at any time your Fortigate unit cannot contact the DDNS server, it will retry three
times at one minute intervals and then change to retrying at three minute intervals.
This is to prevent flooding the DDNS server.
Figure 36: DDNS service configuration
ServerSelect a DDNS server to use. The client software for these services is built
DomainThe fully qualified domain name of the DDNS service.
Username The user name to use when connecting to the DDNS server.
Password The password to use when connecting to the DDNS server.
into the FortiGate firmware. The FortiGate unit can connect only to one of
these services.
Configuring a virtual IPSec interface
You create a virtual IPSec interface by selecting IPSec Interface Mode in
VPN > IPSec > Auto Key or VPN > IPSec > Manual Key when you create a
VPN. You also select a physical or VLAN interface from the Local Interface list.
The virtual IPSec interface is listed as a subinterface of that interface in
System > Network > Interface. For more information, see
•“Overview of IPSec interface mode” on page 285
•“Auto Key” on page 287 or “Manual Key” on page 296
Go to System > Network > Interface and select Edit on an IPSec interface to:
•configure IP addresses for the local and remote endpoints of the IPSec
interface so that you can run dynamic routing over the interface or use ping to
test the tunnel
•enable administrative access through the IPSec interface
•enable logging on the interface
•enter a description for the interface
Figure 37: Virtual IPSec interface settings
FortiGate Version 3 .0 MR4 Administration Guide
8201-30004-0203-20070102
Page 83
System Network Interface
NameThe name of the IPSec interface.
Virtual DomainSelect the VDOM of the I PSec interface.
IP
Remote IP
Administrative
Access
HTTPSAllow secure HTTPS connections to the web-based manager
PINGInterface responds to pings. Use this setting to verify your
HTTPAllow HTTP connections to the web-based manager through this
SSHAllow SSH connections to the CLI through this interface.
SNMPAllow a remote SNMP manager to request SNMP information by
TELNETAllow Telnet connections to the CLI through this interface. Telnet
LogSelect Log to record logs for any traffic to or from the interface. To
DescriptionOptionally, enter a description up to 63 characters long.
If you want to use dynamic routing with the tunnel or be able to ping
the tunnel interface, enter IP addresses for the local and remote
ends of the tunnel. These two addresses must not be used
anywhere else in the network.
Select the types of administrative access permitted on this
interface.
through this interface.
installation and for testing.
interface. HTTP connections are not secure and can be intercepted
by a third party.
connecting to this interface. See “Configuring SNMP” on page 127.
connections are not secure and can be intercepted by a third party.
record logs you must also enable traffic log for a logging location
and set the logging severity level to Notification or lower. Go to
Log&Report > Log Config to configure logging locations and
types. For information about logging see “Log&Report” on
page 407.
Additional configuration for interfaces
Once the interface is selected with the basic settings configured, some additional
configuration may be considered. Additional configuration for an interface consists
of setting:
•Administrative access to an interface
•Interface MTU packet size
•Traffic logging for an interface
•Secondary IP Addresses
Administrative access to an interface
For a VDOM running in NAT/Route mode, you can control administrative access
to the interfaces in that VDOM.
You can allow remote administration of the FortiGate unit. However, allowing
remote administration from the Internet could compromise the security of the
FortiGate unit. You should avoid this unless it is required for you r configuration. To
improve the security of a FortiGate unit that allows remote ad ministration from the
Internet:
Use secure administrative user passwords.
Change these passwords regularly.
Enable secure administrative access to this interface using only HTTPS or SSH.
FortiGate Version 3 .0 MR4 Administration Guide
01-30004-0203-2007010283
Page 84
InterfaceSystem Network
Do not change the system idle timeout from the default value of 5 minutes (see
“Settings” on page 153).
For more information on configuring administrative access in Transparent mode,
see “Operation mode and VDOM management access” on page 141.
To control administrative access to an interface
1Go to System > Network > Interface.
2Choose an interface and select Edit.
3Select the Administrative Access methods for the interface.
4Select OK to save the changes.
Interface MTU packet size
To improve network performance, you can change the maximum tra nsmission unit
(MTU) of the packets that the FortiGate unit transmits. Ideally, the MTU should be
the same as the smallest MTU of all the networks between the FortiGate unit and
the destination of the packets. If the packets that the FortiGate unit sends are
larger, they are broken up or fragmented, which slows down transmission.
Experiment by lowering the MTU to find an MTU size for best network
performance.
FortiGate models numbered 3000 and higher support jumbo frames. Some
models support a limit of 9 000 bytes while others support 16 110 bytes. Jumbo
frames can be up to 9 000 bytes or 16110, much larger than standard Ethernet
frames. Standard Ethernet frames (packets) can be a maximum of 1 500 bytes
including header information. As new Ethernet stan dards have been imple mented
(such as Gigabit Ethernet), 1 500-byte frames have been kept for backward
compatibility.
To be able to send jumbo frames over a route, all Ethernet devices on that route
must support jumbo frames. Otherwise your jumbo frames are not recog nized and
they are dropped.
If you have standard ethernet and jumbo frame traffic on the same interface,
routing alone cannot route them to different routes based only on frame size.
However you can use VLANs to make sure the jumbo frame traffic is routed over
network devices that support jumbo frames. VLANs will inherit the MTU size from
the parent interface. You will need to configure the VLAN to include both ends of
the route as well as all switches and router s along the route. For more information
on VLAN configurations, see the VLAN and VDOM guide.
To change the MTU size of the packets leaving an interf ace
1Go to System > Network > Interface.
2Choose a physical interface and select Edit.
3Select Override default MTU value (1500).
4Set the MTU size.
If you select an MTU size larger than your FortiGate unit supports, an error
message will indicate this. In this situation, try a smaller MTU size until the value is
supported. Supported maximums are 16110, 9000, and 1500.
FortiGate Version 3 .0 MR4 Administration Guide
8401-30004-0203-20070102
Page 85
System Network Interface
Note: If you change the MTU, you need to reboot the FortiGate unit to update the MTU
value of VLAN subinterfaces on the modified interface.
Note: In Transparent mode, if you change the MTU of an interface, you must change the
MTU of all interfaces to match the new MTU.
Traffic logging for an interface
You can enable traffic logging for any interface. See “Traffic log” on page 415 for
more information.
Secondary IP Addresses
An interface can be assigned more than one IP address. You can create and
apply separate firewall policies for each IP address on an interface. You can also
forward traffic and use RIP or OSPF routing with secondary IP addresses.
There can be up to 32 secondary IP addresses per interface. Primary and
secondary IP addresses can share the same ping generator.
The following restrictions must be in place before you are able to assign a
secondary IP address.
•A primary IP address must be assigned to the interface first.
•The interface must use manual addressing mode.
•By default, IP addresses cannot be part of the same subnet. To allow interface
subnet overlap use the CLI command:
config system global
(global)# set allow-interface-subnet-overlap enable
(global)#end
Secondary IP addresses cannot terminate a VPN tunnel.
You can use the CLI command config system interface to add a
secondary IP address to an interface. For more information, see config secondaryip under system interface in the
Figure 38: Adding Secondary IP Addresses
FortiGate CLI Reference.
FortiGate Version 3 .0 MR4 Administration Guide
01-30004-0203-2007010285
Page 86
InterfaceSystem Network
IP/NetmaskEnter the IP address/subnet mask in the IP/Netmask field. The IP
Ping ServerTo enable dead gateway detection, enter the IP address of the
Administrative
Access
HTTPSAllow secure HTTPS connections to the web-based manager
PINGSecondary IP responds to pings. Use this setting to verify your
HTTPAllow HTTP connections to the web-based manager through this
SSHAllow SSH connections to the CLI through this secondary IP.
SNMPAllow a remote SNMP manager to request SNMP information by
TELNETAllow Telnet connections to the CLI through this secondary IP.
AddSelect Add to add the configured secondary IP address to the
Secondary IP tableA table that shows all the secondary IP addresses that have been
#The number of the secondary IP address. There can be up to 32
IP/Netmask The IP address and netmask for this secondary IP.
Ping Server The IP address of the ping server for this address. The ping
EnableIndicates if the ping server option is selected.
AccessThe administrative access methods for this address. They can be
Delete Icon Select to remove this secondary IP entry.
address must be on the same subnet as the network to which the
interface connects.
Two interfaces cannot have IP addresses on the same subnet.
This field is only available when Manual addressing mode is
selected.
next hop router on the network connected to the interface and
select Enable. See “Dead gateway detection” on page 89.
Multiple addresses can share the same ping server. This field is
optional.
Select the types of administrative access permitted on the
secondary IP. These can be different from the primary address.
through this secondary IP.
installation and for testing.
secondary IP. HTTP connections are not secure and can be
intercepted by a third party.
connecting to this secondary IP. See “Configuring SNMP” on
page 127.
Telnet connections are not secure and can be intercepted by a
third party.
secondary IP table shown below.
Addresses in this table are not added to the interface until you
select OK or Apply at the bottom of this screen.
added to this interface.
These addresses are not permanently added to the interface until
you select OK or Apply at the bottom of the screen. Otherwise
some addresses may be removed from the table due to the above
restrictions.
additional IP addresses on an interface.
server can be shared by multiple addresses.
The ping server is optional.
different from the primary IP address.
Note: It is recommended that after adding a secondary IP, you return to the secondary IP
table and verify your new address is listed. If not, one of the restrictions prevented the
address from being added.
FortiGate Version 3 .0 MR4 Administration Guide
8601-30004-0203-20070102
Page 87
System Network Zone
Zone
Y o u can use zones to group rela ted interfaces and VLAN subinterfaces. Gro uping
interfaces and VLAN subinterfaces into zones simplifies policy creation. If you
group interfaces and VLAN subinterfaces into a zone, you can configure policies
for connections to and from this zone, but not between interfaces in the zone.
You can add zones, rename and edit zones, and delete zones from the zone list.
When you add a zone, you select the names of the interfaces and VLAN
subinterfaces to add to the zone.
Zones are added to virtual domains. If you have added multiple virt ual domains to
your FortiGate configuration, make sure you are configuring the correct virtual
domain before adding or editing zones.
Figure 39: Zone list
Zone settings
Create NewSelect Create New to create a new zone.
NameThe names of the zones that you have added.
Block intra-zone
traffic
Interface Members The names of the interfaces added to the zone. Interface names
Edit/View iconsEdit or view a zone.
Delete iconDelete a zone.
Displays Y es if traf fic between interfaces in the same zone is blocked
and No if traffic between interfaces in the same zone is not blocked.
depend on the FortiGate model.
Go to System > Network > Zone to configure zones. Select Create New or select
the Edit icon for a zone to modify that zone.
Figure 40: Zone options
NameEnte r the name to identify the zone.
Block intra-zone
traffic
Interface members Select the interfaces that are part of this zone. This list includes
FortiGate Version 3 .0 MR4 Administration Guide
01-30004-0203-2007010287
Select Block intra-zone traffic to block traffic between interfaces or
VLAN subinterfaces in the same zone.
configured VLANs.
Page 88
Network OptionsSystem Network
Network Options
Network options include DNS server and dead gateway detection settings. These
options are set on the Configuring Network Options screen.
Go to System > Network > Options to configure DNS servers and Dead
Gateway Detection settings.
Figure 41: Networking Options - FortiGate models 200 and higher
Figure 42: Networking Options - models numbered 100 and lower
Obtain DNS server address
automatically
Use the following DNS server
addresses
Primary DNS ServerEnter the primary DNS server IP address.
Secondary DNS Server Enter the secondary DNS server IP address.
Local Domain NameEnter the domain name to append to addresses with no
This option applies only to FortiGate models 100 and
lower.
When DHCP is used on an interface, also obtain the DNS
server IP address. Available only in NAT/Route mode. Y ou
should also enable Override internal DNS in the DHCP
settings of the interface. See “Configuring DHCP on an
interface” on page 78.
This option applies only to FortiGate models 100 and
lower.
Use the specified Primary and Secondary DNS server
addresses.
domain portion when performing DNS lookups.
FortiGate Version 3 .0 MR4 Administration Guide
8801-30004-0203-20070102
Page 89
System Network Network Options
DNS Servers
Enable DNS forwarding from T his option applies only to FortiGate models 100 and
lower operating in NAT/Route mode.
Select the interfaces that forward DNS requests they
receive to the DNS servers that you configured.
Dead Gateway DetectionDead gateway detecti on confirms connectivity using a
ping server added to an interface configuration. For
information about adding a ping server to an interface, see
“Dead gateway detection” on page 89.
Detection IntervalEnter a number in seconds to specify how often the
FortiGate unit pings the target.
Fail-over DetectionEnter the number of times that the ping test fails before
the FortiGate unit assumes that the gateway is no longer
functioning.
Several FortiGate functions use DNS, including alert email and URL blocking. You
can specify the IP addresses of the DNS servers to which your FortiGate unit
connects. DNS server IP addresses are usually supplied by your ISP.
You can configure FortiGate models numbered 100 and lower to obtain DNS
server addresses automatically. To obtain these addresses automatically, at least
one FortiGate unit interface must use the DHCP or PPPoE addressin g mode. See
“Configuring DHCP on an interface” on page 78 or “Configuring an interface for
PPPoE or PPPoA” on page 80.
FortiGate models 100 and lower can provide DNS Forwardin g on thei r in te rfaces.
Hosts on the attached network use the interface IP address as their DNS server.
DNS requests sent to the interface are forwarded to the DNS server addresses
that you configured or that the FortiGate unit obtained automatically.
Dead gateway detection
Dead gateway detection periodically pings a ping server to confirm network
connectivity. Typically, the ping server is the next-hop router that leads to an
external network or the Internet. The ping period (Detection Interval) and the
number of failed pings that is considered to indicate a loss of connectivity (Failover Detection) are set in System > Network > Options.
To apply dead gateway detection to an interface, you must configure a ping server
on it.
To add a ping server to an interface
1Go to System > Network > Interface.
2Choose an interface and select Edit.
3Set Ping Server to the IP address of the next hop router on the network conne cted
to the interface.
4Select the Enable check box.
5Select OK to save the changes.
FortiGate Version 3 .0 MR4 Administration Guide
01-30004-0203-2007010289
Page 90
Routing table (Transparent Mode)System Network
Routing table (Transparent Mode)
In Transparent mode, go to System > Network > Routing Table to add static
routes from the FortiGate unit to local routers.
Figure 43: Routing table
Create NewAdd a new route.
#Route number.
IPThe destination IP address for this route.
MaskThe netmask for this route.
GatewayThe IP address of the next hop router to which this route directs traffic.
DistanceThe the relative preferability of this route. 1 is most preferred.
Delete iconRemove a route.
View/edit iconEdit or view a route.
Move To iconChange the position of a route in the list.
Transparent mode route settings
Go to System > Network > Routing Table and select Create New to add a route.
You can also select the Edit icon of an existing rout e to modi fy it.
Figure 44: Transparent mode route options
Destination IP
/Mask
GatewayEnter the IP address of the next hop router to which this route directs
DistanceThe relative preferability of this route. 1 is most preferred.
Enter the destination IP address and netmask for this route.
To create a default route, set the Destination IP and Mask to 0.0.0.0.
traffic. For an Internet connection, the next hop routing gateway routes
traffic to the Internet.
FortiGate Version 3 .0 MR4 Administration Guide
9001-30004-0203-20070102
Page 91
System Network Configuring the modem interface
Configuring the modem interface
On FortiGate models with modem support, you can use the modem as either a
backup interface or a standalone interface in NAT/Route mode.
•In redundant (backup) mode, the modem interface automatically takes over
from a selected ethernet interface when that ethernet interface is unavailable.
•In standalone mode, the modem interface is the conne ction from the FortiGate
unit to the Internet.
When connecting to the ISP, in either configuration, the FortiGate unit modem can
automatically dial up to three dialup accounts until th e mo de m connects to an ISP.
FortiGate models 50AM and 60M have a built-in modem. For these models, you
can configure modem operation in the web-based manager. See “Configuring
modem settings”.
Models 50A and 60 can connect to an external modem through a USB-to-serial
converter. For these mo dels, you m ust configur e modem ope ration u sing the CLI.
See the system modem command in the
Note: The modem interface is not the AUX port which is a port that is used for a remote
console connection - it has no associated interface. The AUX port is only available on
FortiGate models 1000A, 1000AFA2, and 3000A. For more information, see the config system aux command in the FortiGate CLI Reference.
FortiGate CLI Reference.
Configuring modem settings
Configure modem settings so that the FortiGate unit uses the modem to connect
to your ISP dialup accounts. You can configure up to three dialup accounts, select
standalone or redundant operation, and configure how the modem dials and
disconnects.
You can configure and use the modem in NAT/Route mode only.
Figure 45: Modem settings (Standalone)
FortiGate Version 3 .0 MR4 Administration Guide
01-30004-0203-2007010291
Page 92
Configuring the modem interfaceSystem Network
Figure 46: Modem settings (Redundant)
Enable ModemSelect to enable the FortiGate modem.
Modem statusThe modem status shows one of: “not active”, “connecting”,
Dial Now/Hang Up(Standalone mode only) Select Dial Now to manually connect to a
ModeSelect Standalone or Redundant mode. In Standalone mode, the
Auto-dial(Standalone mode only) Select to dial the modem automatically if
Redundant for(Redundant mode only) Select the ethernet interface fo r which the
Dial on demandSelect to dial the modem when packets are routed to the modem
Idle timeoutEnter the timeout duration in minutes. After this period of inactivity,
Holddown
Timer
Redial LimitThe maximum number of times (1-10) that the FortiGate unit
Dialup AccountConfigure up to three dialup accounts. The FortiGate unit tries
“connected”, “disconnecting” or “hung up” (Standalone mode only).
dialup account. If the modem is connected, you can select Hang
Up to manually disconnect the modem.
modem is an independent interface. In Redundant mode, the
modem is a backup facility for a selected Ethernet interface.
the connection is lost or the FortiGate unit is restarted. You cannot
select Auto-dial if Dial on demand is selected.
modem provides backup service.
interface. The modem disconnects after the idle timeout period if
there is no network activity. In S t andalone mode, you cannot select
Dial on demand if Auto-dial is selected.
the modem disconnects.
(Redundant mode only) Enter the time (1-60 seconds) that the
FortiGate unit waits before switching from the modem interface to
the primary interface, after the primary interface has been restored.
The default is 1 second. Configure a higher value if you find the
FortiGate unit switching repeatedly between the primary interface
and the modem interface.
modem attempts to reconnect to the ISP if the connection fails. The
default redial limit is 1. Select None to have no limit on redial
attempts.
connecting to each account in order until a connection can be
established.
FortiGate Version 3 .0 MR4 Administration Guide
9201-30004-0203-20070102
Page 93
System Network Configuring the modem interface
Phone NumberThe phone number required to connect to the dialup account. Do
User NameThe user name (maximum 63 characters) sent to the ISP.
PasswordThe password sent to the ISP.
To configure the modem in Redundant mode, see “Redundant mode
configuration” on page 93.
To configure the modem in Standalone mode, see “Standalone mode
configuration” on page 94.
Redundant mode configuration
The modem interface in redundant mode backs up a selected ethernet interface. If
that ethernet interface disconnects from its network, the modem automatically
dials the configured dialup accounts. When the modem connects to a dialup
account, the FortiGate unit routes IP packets normally destined for the selected
ethernet interface to the modem interface.
The FortiGate unit disconnects the modem interface and switches back to the
ethernet interface when the ethernet interface can again connect to its network.
There is an optional timeout setting, after which the modem will disconnect if there
is no network activity. This is useful in saving money on dialup connection
charges.
For the FortiGate unit to be able to switch from an ethernet interface to the
modem you must select the name of the interface in the mo dem configuration and
configure a ping server for that interface. You must also configure firewall policies
for connections between the modem interface and other FortiGate interfaces.
not add spaces to the phone number. Make sure to include
standard special characters for pauses, country codes, and other
functions as required by your modem to connect to your dialup
account.
Note: Do not add policies for connections between the modem interface and the interface
that the modem is backing up.
To configure redundant mode
1Go to System > Network > Modem.
2Select Redundant mode.
3Enter the following information:
ModeRedundant
Redundant forFrom the list, select the interface to back up.
Holddown timerEnter the number of seconds to continue using the modem after the
Redial LimitEnter the maximum number of times to retry if the ISP does not
answer.
Enter the ISP phone number, user name and password for up to
three dialup accounts.
4Select Apply .
5Configure a ping server for the ethernet interface the modem backs up.
See “To add a ping server to an interface” on page89.
FortiGate Version 3 .0 MR4 Administration Guide
01-30004-0203-2007010293
Page 94
Configuring the modem interfaceSystem Network
6Configure firewall policies for connections to the modem interface.
See “Adding firewall policies for modem connections” on page 94.
Standalone mode configuration
In standalone mode, the modem connects to a dialup account to provide a
connection to the Internet. You can configure the modem to dial when the
FortiGate unit restarts or when there are unrouted packets. You can also hang up
or redial the modem manually.
If the connection to the dialup account fails, the FortiGate unit will redial the
modem. The modem redials the number of times specified by the redial limit, or
until it connects to a dialup account.
There is an optional timeout setting, after which the modem will disconnect if there
is no network activity. This is useful in saving money on dialup connection
charges.
You must configure firewall policies for connections between the modem interface
and other FortiGate interfaces.
To operate in standalone mode
1Go to System > Network > Modem.
2Enter the following information:
ModeStandalone
Auto-dialSelect if you want the modem to dial when the FortiGate unit restarts.
Dial on demandSelect if you want the modem to connect to its ISP whenever there
Idle timeoutEnter the timeout duration in minutes. After this period of inactivity,
Redial LimitEnter the maximum number of times to retry if the ISP does not
answer.
Enter the ISP phone number, user name and password for up to
three dialup accounts.
3Select Apply.
4Configure firewall policies for connections to the modem interface.
See “Adding firewall policies for modem connections” on page 94.
Adding firewall policies for modem connections
The modem interface requires firewall addresses and policies. You can add one or
more addresses to the modem interface. For information about adding addresses,
see “To add an IP address, IP range, or FQDN, go to Firewall > Address, select
Create New.” on page 237. When you add addresses, the modem interface
appears on the policy grid.
You can configure firewall policies to control the flow of packets between the
modem interface and the other interfaces on the FortiGate unit. For information
about adding firewall policies, see “Adding a firewall policy” on page 215.
FortiGate Version 3 .0 MR4 Administration Guide
9401-30004-0203-20070102
Page 95
System Network Configuring the modem interface
Connecting and disconnecting the modem
The modem must be in Standalone mode.
To connect to a dialup account
1Go to System > Network > Modem.
2Select Enable USB Modem.
3Make sure there is correct information in one or more Dialup Accounts.
4Select Apply if you make any configuration changes.
5Select Dial Now.
The FortiGate unit initiates dialing into each dialup account in turn until the
modem connects to an ISP.
To disconnect the modem
Use the following procedure to disconnect the modem from a dialup account.
1Go to System > Network > Modem.
2Select Hang Up if you want to disconnect from the dialup account.
Checking modem status
You can determine the connection status of your modem and which dialup
account is active. If the modem is connected to the ISP, you can see the IP
address and netmask.
To check the modem status, go to System > Network > Modem.
Modem status is one of the following:
not activeThe modem is not connected to the ISP.
connectingThe modem is attempting to connect to the ISP.
connectedThe modem is connecte d to the ISP.
disconnectingThe modem is disconnecting from the ISP.
hung upThe modem has disconnected from the ISP. (Standalone mode only)
A green check mark indicates the active dialup account.
The IP address and netmask assigned to the modem interface appears on the
System Network Interface page of the web-based manager.
The modem will not redial unless you select Dial Now.
FortiGate Version 3 .0 MR4 Administration Guide
01-30004-0203-2007010295
Page 96
VLAN overviewSystem Network
VLAN overview
A VLAN is group of PCs, servers, and other network devices that communicate as
if they were on the same LAN segment, independent of where they are located.
For example, the workstations and servers for an accounting d epartment co uld be
scattered throughout an office or city and connected to numerous network
segments, but still belong to the same VLAN.
A VLAN segregates devices logically instead of physically. Each VLAN is treated
as a broadcast domain. Devices in VLAN 1 can connect with other devices in
VLAN 1, but cannot connect with devices in other VLANs. The communication
among devices on a VLAN is independent of the physical network.
A VLAN segregates devices by adding 802.1Q VLAN tags to all of the pa ckets
sent and received by the devices in the VLAN. VLAN tags are 4-byte frame
extensions that contain a VLAN identifier as well as other information.
For more information on VLANs, see the FortiGate VLANs and VDOMs Guide.
Figure 47: Basic VLAN topology
Internet
VLAN 1 Network
FortiGate units and VLANs
In a typical VLAN configuration, 802.1Q-compliant VLAN layer-2 switches or
layer-3 routers or firewalls add VLAN tags to packets. Packets passing between
devices in the same VLAN can be handled by layer-2 switches. Packets p assing
between devices in different VLANs must be handled by a layer-3 device such as
router, firewall, or layer-3 switch.
Untagged packets
VLAN 1
VLAN 1
VLAN 2
VLAN Switch
Router
VLAN 2
VLAN 2 Network
FortiGate Version 3 .0 MR4 Administration Guide
9601-30004-0203-20070102
Page 97
System Network VLANs in NAT/Route mode
Using VLANs, a single FortiGate unit can provide security services and control
connections between multiple security domains. T raffic from each security domain
is given a different VLAN ID. The FortiGate unit can recognize VLAN IDs and
apply security policies to secure network and IPSec VPN traffic between security
domains. The FortiGate unit can also apply authentication, protectio n profiles, and
other firewall policy features for network and VPN traffic that is allowed to pass
between security domains.
VLANs in NAT/Route mode
Operating in NAT/Route mode, the FortiGate unit functions as a layer-3 device to
control the flow of packets between VLANs. The FortiGate unit can also remove
VLAN tags from incoming VLAN packets and forward untagged packets to other
networks, such as the Internet.
In NAT/Route mode, the FortiGate units support VLANs for constructing VLAN
trunks between an IEEE 802.1Q-compliant switch (or router) and the FortiGate
units. Normally the FortiGate unit internal interface connects to a VLAN trunk on
an internal switch, and the external interface connects to an upstream Internet
router untagged. The FortiGate unit can then apply different policies for traffic on
each VLAN that connects to the internal interface.
In this configuration, you add VLAN subinterfaces to the FortiGate internal
interface that have VLAN IDs that match the VLAN IDs of packets in the VLAN
trunk. The FortiGate unit directs packets with VLAN IDs to subinterfaces with
matching VLAN IDs.
Y ou can also define VLAN subinterfaces on all FortiGate interfaces. The FortiGate
unit can add VLAN tags to packet s leaving a VL AN sub inter fa ce or r emo ve VLAN
tags from incoming packets and add a different VLAN tags to outgoing packets .
Rules for VLAN IDs
In NAT/Route mode, two VLAN subinterfaces added to the same physical
interface cannot have the same VLAN ID. However, you can add two or more
VLAN subinterfaces with the same VLAN IDs to different physical interfaces.
There is no internal connection or link between two VLAN subinterfaces with
same VLAN ID. Their relationship is the same as the relationship between any
two FortiGate network interfaces.
Rules for VLAN IP addresses
IP addresses of all FortiGate interfaces cannot overlap. That is, the IP addresses
of all interfaces must be on different subnets. This rule applies to both physical
interfaces and to VLAN subinterfaces.
Note: If you are unable to change your existing configurations to prevent IP overlap, enter
the CLI command config system global and set allow-interface-subnet-overlap enable to allow IP address overlap. If you enter this command, multiple VLAN
interfaces can have an IP address that is part of a subnet used by another interface. This
command is recommended for advanced users only.
FortiGate Version 3 .0 MR4 Administration Guide
01-30004-0203-2007010297
Page 98
VLANs in NAT/Route modeSystem Network
Figure 37 shows a simplified NAT/Route mode VLAN configuration. In this
example, the FortiGate internal interface connects to a VLAN switch using an
802.1Q trunk and is configured with two VLAN subinterfaces (VLAN 100 and
VLAN 200). The external interface connects to the Inter net. The external inter face
is not configured with VLAN subinterfaces.
When the VLAN switch receives packets from VLAN 100 and VLAN 200, it ap plies
VLAN tags and forwards the packets to local ports and across the trunk to the
FortiGate unit. The FortiGate unit is configured with policies that allow traffic to
flow between the VLANs and from the VLANs to the exte rn al ne two r k.
Figure 48: FortiGate unit in NAT/Route mode
Internet
Untagged packets
External 172.16.21.2
FortiGate unit
Internal 192.168.110.126
VLAN 100VLAN 200
VLAN 100 Network
10.1.1.0
Adding VLAN subinterfaces
The VLAN ID of each VLAN subinterface must match the VLAN ID added by the
IEEE 802.1Q-compliant router. The VLAN ID can be any number between 1 and
4096. Each VLAN subinterface must also be configured with its own IP address
and netmask.
Note: A VLAN must not have the same name as a virtual domain or zone.
Fa 0/3
VLAN Switch
802.1Q
trunk
Fa 0/24
Fa 0/9
VLAN 200 Network
10.1.2.0
You add VLAN subinterfaces to the physical interface that receives VLAN-tagged
packets.
To add a VLAN subinterface in NAT/Route mode
1Go to System > Network > Interface.
2Select Create New to add a VLAN subinterface.
3Enter a Name to identify the VLAN subinterface.
FortiGate Version 3 .0 MR4 Administration Guide
9801-30004-0203-20070102
Page 99
System Network VLANs in Transparent mode
4Select the physical interface that receives the VLAN packets intended for this
VLAN subinterface.
5Enter the VLAN ID that matches the VLAN ID of the packets to be received by this
VLAN subinterface.
6If you are the super admin, select the virtual domain to add this VLAN
subinterface to. Otherwise, you can only create VLAN subinterfaces in your own
VDOM.
See “Using virtual domains” on page 61 for information about virtual domains.
7Configure the VLAN subinterface settings as you would for any FortiGate
interface.
See “Interface settings” on page 72.
8Select OK to save your changes.
The FortiGate unit adds the new VLAN subinterface to the interface that you
selected in step 4.
To add firewall policies for VLAN subinterfaces
Once you have added VLAN subinterfaces you can add firewall policies for
connections between VLAN subinterfaces or from a VLAN subinterface to a
physical interface.
1Go to Firewall > Address.
2Select Create New to add firewall addresses that match the source and
destination IP addresses of VLAN packets.
See “About firewall addresses” on page 235.
3Go to Firewall > Policy.
4Create or add firewall policies as required.
VLANs in Transparent mode
In Transparent mode, the FortiGate unit can apply firewall policies and services,
such as authentication, protection profiles, and other firewall features, to traffic on
an IEEE 802.1 VLAN trunk. You can insert the FortiGate unit operating in
Transparent mode into the trunk without making changes to your network. In a
typical configuration, the FortiGate internal interface accepts VLAN packets on a
VLAN trunk from a VLAN switch or router connected to internal VLANs. The
FortiGate external interface forwards tagged packets through the trunk to an
external VLAN switch or router which could be connected to the Internet. The
FortiGate unit can be configured to apply different policies for traffic on each
VLAN in the trunk.
For VLAN traffic to be able to pass between the FortiGate Internal and external
interface you would add a VLAN subinterface to the internal interface and another
VLAN subinterface to the external interface. If the se VLAN subinterfaces have the
same VLAN IDs, the FortiGate unit applies firewall policies to the traffic on this
VLAN. If these VLAN subinterfaces have different VLAN IDs, or if you add more
than two VLAN subinterfaces, you can also use firewall policies to control
connections between VLANs.
FortiGate Version 3 .0 MR4 Administration Guide
01-30004-0203-2007010299
Page 100
VLANs in Transparent modeSystem Network
If the network uses IEEE 802.1 VLAN tags to segment your network traffic, you
can configure a FortiGate unit operating in Transparent mode to provide secur ity
for network traffic passing between different VLANs. To support VLAN traffic in
Transparent mode, you add virtual domains to the FortiGate unit configuration. A
virtual domain consists of two or more VLAN subinterfaces or zones. In a virtual
domain, a zone can contain one or more VLAN subinterfaces.
When the FortiGate unit receives a VLAN tagged packet at an interface, the
packet is directed to the VLAN subinterface with matching VLAN ID. The VLAN
subinterface removes the VLAN tag and assigns a destination interface to the
packet based on its destination MAC address. The firewall policies for this source
and destination VLAN subinterface pair are applied to the packet. If the packet is
accepted by the firewall, the FortiGate unit forwards the packet to the destination
VLAN subinterface. The destination VLAN ID is added to the packet by the
FortiGate unit and the packet is sent to the VLAN trunk.
Note: There is a maximum of 255 interfaces total allowed per VDOM in Transparent mode.
This includes VLANs. If no other interfaces are configured for a VDOM, you can configure
up to 255 VLANs in that VDOM.
Figure 49: FortiGate unit with two virtual domains in Transparent mode
FortiGate unit
VLAN1
VLAN2
VLAN3
VLAN Switch
or router
Internal
VLAN1
VLAN2
VLAN3
VLAN
trunk
root virtual domain
VLAN1
New virtual domain
VLAN2
VLAN3
VLAN1
VLAN2
VLAN3
External
VLAN1
VLAN2
VLAN3
VLAN
trunk
VLAN Switch
or router
Internet
Figure 50 shows a FortiGate unit operating in Transparent mode and configured
with three VLAN subinterfaces. In this configuration the FortiGate unit could be
added to this network to provide virus scanning, web content filtering, and other
services to each VLAN.
FortiGate Version 3 .0 MR4 Administration Guide
10001-30004-0203-20070102
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.