Fortinet FortiGate FortiGate-5001 Quick Start Manual

4 1000Base-SX
SFP Transceivers
FortiGate-5001 Antivius Firewall module
PWR
STA IPM
CONSOLE
USB
Ethernet
Cable
Null-Modem
Cable (RS-232)
QuickStart Guide
FortiGate-5001
QuickStart Guide
Copyright 2003 Fortinet Incorporated. All rights reserved. Trademarks Products mentioned in this document are trademarks.
PWR
STAIPM
CONSOLE
USB
1 2 3 4 5 6 7 8
01-28005-0043-20041111
RAM DIMs
PWR
STA IPM
CONSOLE
USB
1 2 3 4 5 6 7 8
1 2 3 4
Gigabit Fiber
5 6 7 8
10/100/1000 Copper
RS-232 Serial
Connection
USB
Extraction
Lever
Mounting
Knot
Mounting
Knot
Extraction
Lever
Lockdown
Thumbscrew
Connector Type Speed Protocol Description
1, 2, 3, 4 LC SFP 1000Base-SX Ethernet
Multimode fiber optic connections to gigabit optical networks. The FortiGate-5001 is shipped with 4 Small Formfactor Pluggable (SFP) connectors that you must insert into the cage sockets 1-4 on the FortiGate-5001 front panel. You can optionally use the 1000Base-LX (single-mode fiber) or 1000Base-TX (copper cable) SFP transceivers.
5, 6, 7, 8 RJ-45 1000Base-T Ethernet
Copper gigabit connection to 10/100/1000 copper networks.
CONSOLE DB-9 9600 bps
RS-232 serial
Serial connection to the command line interface.
FortiGate-5001 normal operating LED indicators
LED State Description
PWR Green The FortiGate-5001 module is on.
STA
Green Normal operation.
Red The FortiGate-5001 is booting or a fault condition exists.
IPM
Blue
The FortiGate-5001 is ready to be hot-swapped (or card is ready to be removed from the chassis).
Flashing Blue
The FortiGate-5001 is changing from hot swap to running mode or from running mode to hot swap.
Off
Normal operation. The FortiGate-5001 module is in contact with the backplane of the FortiGate-5000 series chassis.
1, 2, 3, 4
Green
The correct optical fiber patch cable is connected to the gigabit fiber interface.
Flashing Network activity at the gigabit fiber interface.
5, 6, 7, 8
Green
The correct cable is connected to the copper 10/100/1000 interface and the connected equipment has power.
Flashing Network activity at this interface.
Amber The interface is connected at 1000 Mbps.
Install the FortiGate-5001 module into a FortiGate 5020, 5050 or 5140 chassis and connect the network cables. Always wear an ESD wrist strap or ankle strap to avoid static discharges.
NAT/Route mode
In NAT/Route mode, each FortiGate-5001 module is visible to the networks that it is connected to. All of its interfaces are on different subnets. Each interface that is connected to a network must be configured with an IP address that is valid for that network.
You would typically use NAT/Route mode when the FortiGate-5001 module is deployed as a gateway between private and public networks. In its default NAT/Route mode configuration, the module functions as a firewall. Firewall policies control communications through the FortiGate-5001 module. No traffic can pass through the FortiGate-5001 module until you add firewall policies.
In NAT/Route mode, firewall policies can operate in NAT mode or in Route mode. In NAT mode, the FortiGate-5001 module performs network address translation before IP packets are sent to the destination network. In route mode, no translation takes place.
Transparent mode
In Transparent mode, the FortiGate-5001 module is invisible to the network. All of its interfaces are on the same subnet. You only have to configure a management IP address so that you can make configuration changes.
You would typically use the FortiGate-5001 module in Transparent mode on a private network behind an existing firewall or behind a router. In its default Transparent mode configuration, the unit functions as a firewall. No traffic can pass through the FortiGate-5001 module until you add firewall policies.
You can connect up to eight network segments to the FortiGate-5001 module to control traffic between these network segments.
FortiGate-5001 Module
in NAT/Route mode
Route mode policies controlling traffic between internal networks.
Internal network
DMZ network
Port 1
192.168.1.99
Port 3
10.10.10.1
192.168.1.3
10.10.10.2
Port 2
204.23.1.5
NAT mode policies controlling
traffic between internal and
external networks.
Internet
PWR
STAIPM
CONSOLE
USB
1 2 3 4 5 6 7 8
Internal network
192.168.1.3
FortiGate-5001 Module
in Transparent mode
192.168.1.2
Management IP
Port 1
Port 2
192.168.1.1
Transparent mode policies controlling traffic between
internal and external networks
204.23.1.5
(firewall, router)
Gateway to
public network
Internet
PWR
STAIPM
CONSOLE
USB
1 2 3 4 5 6 7 8
Before beginning to configure the FortiGate-5001 module, you need to plan how to integrate the unit into your network. Your configuration plan is dependent upon the operating mode that you select: NAT/Route mode (the default) or Transparent mode.
Web-based manager and Setup Wizard
Using the Setup Wizard you can configure basic configuration settings by stepping through the wizard pages and filling in the information required.
The FortiGate web-based manager is an easy to use management tool.
Use it to configure the administrator password,
interface addresses, the default gateway address, and the DNS server addresses. To configure advanced settings, see the online help and Documentation CD-ROM.
Requirements:
• An Ethernet connection between the FortiGate-5001 and a management computer.
• Internet Explorer version 6.0 or higher on the management computer.
Command Line Interface (CLI)
The CLI is a full-featured management tool. Use it to configure the administrator password, the
interface addresses, the default gateway address, and the DNS server addresses. To configure advanced settings, see the FortiGate CLI Reference Guide on the Documentation CD-ROM.
Requirements:
• The serial connection between the FortiGate-5001 module and a management computer.
• A terminal emulation application (HyperTerminal for Windows) on the management computer.
Choose between two different tools to configure the FortiGate-5001 module.
QuickStart Guide
FortiGate-5001
Check that the package contents are complete.
To install the FortiGate-5001 module
1. Install the RAM DIMMs into the module by pushing the RAM DIM gently until the locking mechanism locks down the DIM.
2. Extend the extraction levers on the module.
3. Carefully slide the module into a chassis slot.
The module is seated
properly when it touches the chassis up to the extraction levers.
4. Lock the extraction levers by pushing them towards each other.
5. If power is supplied to the chassis, the FortiGate-5001 module powers on when the extraction levers are closed.
6. Tighten the mounting knots on the left and right sides of the front panel.
7. The power switch is built-in to the left side extraction lever. Ensure that the lockdown thumbscrew is tightened to ensure that power is not interrupted.
8. Install SFP transceivers and connect the network cables.
Checking the package contents
Checking the package contents
1
Installing the FortiGate-5001
2
Planning the configuration
3
Choosing a configuration tool
4
© Copyright 2004 Fortinet Incorporated. All rights reserved.
Trademarks
Products mentioned in this document are trademarks or registered trademarks of their respective holders.
Regulatory Compliance
FCC Class A Part 15 CSA/CUS 19 November 2004
For technical support please visit http://www.fortinet.com.
PWR
STA IPM
CONSOLE
USB
1 2 3 4 5 6 7 8
01-28005-0124-20041119
Refer to the Documentation CD-ROM for information on how to control traffic, and how to configure HA, antivirus protection, Web content filtering, Spam filtering, intrusion prevention (IPS), and virtual private networking (VPN).
NAT/Route mode
Transparent mode
The management IP address and netmask must be valid for the network that the FortiGate-5001 module is connected to.
General settings
A default gateway is required for the FortiGate unit to route connections to the Internet.
Port 1
IP:
____.____.____.____
Netmask:
____.____.____.____
Port 2
IP:
____.____.____.____
Netmask:
____.____.____.____
Port 3
IP:
____.____.____.____
Netmask:
____.____.____.____
Port 4
IP:
____.____.____.____
Netmask:
____.____.____.____
Port 5
IP:
____.____.____.____
Netmask:
____.____.____.____
Port 6
IP:
____.____.____.____
Netmask:
____.____.____.____
Port 7
IP:
____.____.____.____
Netmask:
____.____.____.____
Port 8
IP:
____.____.____.____
Netmask:
____.____.____.____
Management IP:
IP:
____.____.____.____
Netmask:
____.____.____.____
Administrator password:
Network Settings:
Default Gateway:
____.____.____.____
Primary DNS Server:
____.____.____.____
Secondary DNS Server:
____.____.____.____
3. To access the FortiGate web-based manager, start Internet Explorer and browse to https://192.168.1.99 (remember to include the “s” in https://).
4. Type admin in the Name field and select Login.
Web-based manager and Setup Wizard
Use these tables to record your FortiGate-5001 configuration. You can record NAT/Route or Transparent mode settings and general settings that apply to both modes.
NAT/Route mode
Using the Setup Wizard
To configure the FortiGate-5001 module using the Setup Wizard, select the Easy Setup Wizard button and follow the prompts.
Using the web-based manager To change the administrator password
1. Go to System > Admin > Administrators.
2. Select Change Password for the admin administrator and enter a new password.
To configure interfaces
1. Go to System > Network > Interface.
2. Select the edit icon for each interface to configure.
3. Set the addressing mode for the interface. (see the online help for information.)
•For manual addressing, enter the IP address and netmask for the interface.
•For DHCP addressing, select DHCP and any required settings.
•For PPPoE addressing, select PPPoE, and enter the username and password and any other required settings.
To configure the Primary and Secondary DNS server IP addresses
1. Go to System > Network > DNS, enter the Primary and Secondary DNS IP addresses that you recorded above and select Apply.
To configure a Default Gateway
1. Go to Router > Static and select Edit icon for the static route.
2. Set Gateway to the Default Gateway IP address that you recorded above and select OK.
Transparent mode
To switch from NAT/route mode to transparent mode
1. Go to System > Status, select Change beside Operation Mode, and select OK.
2. Change the IP address of the management computer to 10.10.10.2 and use Internet Explorer to browse to https://10.10.10.1.
Using the Setup Wizard
To configure the FortiGate-5001 module using the Setup Wizard, select the Easy Se tup Wizard button and follow the prompts.
Using the web-based manager To change the administrator password using the web-based manager
1. Go to System > Admin > Administrators.
2. Select Change Password for the admin administrator and enter a new password.
To configure the management interface using the web-based manager
1. Go to System > Network > Management.
2. Enter the Management IP address and netmask that you recorded above.
3. Select administrative access options if required and select OK.
To configure the Primary and Secondary DNS server IP addresses
1. Go to System > Network > DNS, enter the Primary and Secondary DNS IP addresses that you recorded above and select Apply.
To configure a Default Gateway
1. Go to System > Network > Management.
2. Set Default Gateway to the Default Gateway IP address that you recorded above and select OK.
Select the
Easy Setup Wizard
NAT/Route mode
1. Configure Port 1.
config system interface
edit port1
set mode static set ip <intf_ip> <netmask_ip>
end
2. Repeat to configure each interface, for example, to configure Port 2:
config system interface
edit port2
set mode static set ip <intf_ip> <netmask_ip>
end
3. Configure the primary and secondary DNS server IP addresses.
config system dns
set primary <dns-server_ip> set secondary <dns-server_ip>
end
4. Configure the default gateway.
config router static
edit 1
set gateway <gateway_ip>
end
Transparent mode
1. Change from NAT/Route mode to Transparent mode.
config system global
set opmode transparent
end
2. Wait a moment and then log in again at the prompt.
3. Configure the Management IP address.
config system manageip
set ip <mng_ip> <netmask>
end
Configure the DNS server IP address.
config system dns
set primary <dns-server_ip> set secondary <dns-server_ip>
end
4. Configure the default route.
config router static
edit 1
set gateway <gateway_ip>
end
Using the Command Line Interface
1. Use the serial cable to connect the FortiGate Console port to the management computer serial port.
2. Start a terminal emulation program (HyperTerminal) on the management computer. Use these settings: Baud Rate (bps) 9600, Data bits 8, Parity None, Stop bits 1, and Flow Control None.
3. At the Login: prompt, type admin and press Enter twice (no password required).
1. Connect Port 1 to the same network as a management computer.
2. Configure the management computer to be on the same subnet as Port 1. To do this, change the IP address of the management computer to 192.168.1.2 and the netmask to 255.255.255.0.
Note: If you change the IP address of Port 1 (NAT/Route mode) or management IP address (Transparent mode), you must use this address to reconnect to the web-based manager and Setup Wizard. You
might also have to change the IP address of the management computer to be on the same subnet as the new IP address.
Collecting information
5
Configuring the FortiGate-5001
6
Congratulations! You have finished configuring the basic settings. Your network is now protected
from Internet-based threats. To explore the full range of configuration options, see the online help or the Documentation CD-ROM.
Completing the configuration
7
• To restart the unit, go to System > Maintenance > ShutDown and select Reboot.
• To reset the unit, go to System > Maintenance > Shutdown and select Reset to factory default.
CLI:
execute reboot
Restarting the FortiGate-5001
Should you mistakenly change a network setting and cannot connect to the unit, reboot the unit and try again or to set the unit back to factory defaults and start over again.
CLI:
execute factoryreset
Technical support
Fortinet Technical Support Web site: http://support.fortinet.com Fortinet email support:
amer_support@fortinet.com For customers in the United States, Canada, Mexico, Latin
America and South America.
apac_support@fortinet.com For customers in Japan, Korea, China, Hong Kong,
Singapore, Malaysia, all other Asian countries, and Australia.
eu_support@fortinet.com For customers in the United Kingdom, Scandinavia,
Mainland Europe, Africa, and the Middle East.
Loading...