Fortinet FortiGate FortiGate-5002FB2 Quick Start Manual

PWR
IPM
USB
5
3 4 5 6
CONSOLE
162
ALT
ON/OFF
RESET
Ethernet
Cable
RAM DIMs
RJ-45 to
DB-9 Serial Cable
PWR
IPM
USB
5
3 4 5 6
CONSOLE
STATUS
162
ALT
ON/OFF
RESET
QuickStart Guide
FortiGate-5002FB2
QuickStart Guide
Copyright 2003 Fortinet Incorporated. All rights reserved. Trademarks Products mentioned in this document are trademarks.
01-28005-00 43-2 0041111
PWR
IPM
USB
5
3 4 5 6
CONSOLE
STATUS
162
ALT ON/OFF
RESET
Connector Type Speed Protocol Description
1, 2 (enhanced ports)
RJ-45 1000Base-T Ethernet
Copper gigabit connection to 10/100/1000 copper networks. The ports are enhanced with a Small Packet Performance (SPP) Co-processor. The SPP significantly increases the firewall performance of small packets that are smaller than 512 bytes used by applications such as web access and email.
3, 4, 5, 6 RJ-45 1000Base-T Ethernet
Copper gigabit connection to 10/100/1000 copper networks. The ports are not enhanced with the SPP. Use these ports for applications supporting larger packet sizes such as FTP transfers, file copies and server-based access.
CONSOLE RJ-45 9600 bps
RS-232 serial
Serial connection to the command line interface.
FortiGate-5002FB2 normal operating LED indicators
LED State Description
PWR Green The FortiGate-5002FB2 module is on.
STATUS
Green Normal operation.
Red The FortiGate-5002FB2 is booting or a fault condition exists.
IPM
Blue
The FortiGate-5002FB2 is ready to be hot-swapped (or card is ready to be removed from the chassis).
Flashing Blue
The FortiGate-5002FB2 is changing from hot swap to running mode or from running mode to hot swap.
Off
Normal operation. The FortiGate-5002FB2 module is in contact with the backplane of the FortiGate-5000 series chassis.
Ports 1 - 6
Green
The correct cable is connected to the copper 10/100/1000 interface and the connected equipment has power.
Flashing Network activity at this interface.
Amber The interface is connected at 1000 Mbps.
Install the FortiGate-5002FB2 module into a FortiGate 5020, 5050 or 5140 chassis and connect the network cables. Always wear an ESD wrist strap or ankle strap to avoid static discharges.
NAT/Route mode
In NAT/Route mode, each FortiGate-5002FB2 module is visible to the networks that it is connected to. All of its interfaces are on different subnets. Each interface that is connected to a network must be configured with an IP address that is valid for that network.
You would typically use NAT/Route mode when the FortiGate-5002FB2 module is deployed as a gateway between private and public networks. In its default NAT/Route mode configuration, the module functions as a firewall. Firewall policies control communications through the FortiGate-5002FB2 module. No traffic can pass through the FortiGate-5002FB2 module until you add firewall policies.
In NAT/Route mode, firewall policies can operate in NAT mode or in Route mode. In NAT mode, the FortiGate-5002FB2 module performs network address translation
before IP packets are sent to the destination network. In route mode, no translation takes place.
Transparent mode
In Transparent mode, the FortiGate-5002FB2 module is invisible to the network. All of its interfaces are on the same subnet. You only have to configure a management IP address so that you can make configuration changes.
You would typically use the FortiGate-5002FB2 module in Transparent mode on a private network behind an existing firewall or behind a router. In its default Transparent mode configuration, the unit functions as a firewall. No traffic can pass through the FortiGate-5002FB2 module until you add firewall policies.
You can connect up to six network segments to the FortiGate-5002FB2 module to control traffic between these network segments.
FortiGate-5002FB2 Module
in NAT/Route mode
Route mode policies controlling traffic between internal networks.
Internal network
DMZ network
Port 1
192.168.1.99
Port 3
10.10.10.1
192.168.1.3
10.10.10.2
Port 2
204.23.1.5
NAT mode policies controlling
traffic between internal and
external networks.
Internet
PWR
IPM
USB
5
3 4 5 6
CONSOLE
STATUS
162
ALT
ON/OFF
RESET
Internal network
192.168.1.3
FortiGate-5002FB2 Module
in Transparent mode
192.168.1.2
Management IP
Port 1
Port 2
192.168.1.1
Transparent mode policies controlling traffic between
internal and external networks
204.23.1.5
(firewall, router)
Gateway to
public network
Internet
PWR
IPM
USB
5
3 4 5 6
CONSOLE
STATUS
162
ALT ON/OFF
RESET
Before beginning to configure the FortiGate-5002FB2 module, you need to plan how to integrate the unit into your network. Your configuration plan is dependent upon the operating mode that you select: NAT/Route mode (the default) or Transparent mode.
Web-based manager and Setup Wizard
Using the Setup Wizard you can configure basic configuration settings by stepping through the wizard pages and filling in the information required.
The FortiGate web-based manager is an easy to use management tool.
Use it to configure the administrator password, interface addresses, the default gateway address, and the DNS server addresses. To
configure advanced settings, see the online help and Documentation CD-ROM. Requirements:
• An Ethernet connection between the FortiGate-5002FB2 and a management computer.
• Internet Explorer version 6.0 or higher on the management computer.
Command Line Interface (CLI)
The CLI is a full-featured management tool. Use it to configure the administrator
password, the interface addresses, the default gateway address, and the DNS server addresses. To configure advanced settings, see the FortiGate CLI Reference Guide on the Documentation CD-ROM.
Requirements:
• The serial connection between the FortiGate-5002FB2 module and a management computer.
• A terminal emulation application (HyperTerminal for Windows) on the management computer.
Choose between two different tools to configure the FortiGate-5002FB2 module.
QuickStart Guide
FortiGate-5002FB2
Check that the package contents are complete.
To install the FortiGate-5002FB2 module
1. Install the RAM DIMMs into the module by pushing the RAM DIM gently until the locking mechanism locks down the DIM.
2. Extend the extraction levers on the module.
3. Carefully slide the module into a chassis slot.
The module is seated properly
when it touches the chassis up to the extraction levers.
4. Lock the extraction levers by pushing them towards each other.
5. If power is supplied to the chassis, the FortiGate-5002FB2 module powers on when the extraction levers are closed.
6. Tighten the mounting knots on the left and right sides of the front panel.
7. The power switch is built-in to the left side extraction lever. Ensure that the lockdown thumbscrew is tightened to ensure that power is not interrupted.
Checking the package contents
Checking the package contents
1
Installing the FortiGate-5002FB2
2
Planning the configuration
3
Choosing a configuration tool
4
© Copyright 2005 Fortinet Incorporated. All rights reserved.
Trademarks
Products mentioned in this document are trademarks or registered trademarks of their respective holders.
Regulatory Compliance
FCC Class A Part 15 CSA/CUS 8 November 2005
For technical support please visit http://www.fortinet.com.
01-28008-0167-20051108
Refer to the Documentation CD-ROM for information on how to control traffic, and how to configure HA, antivirus protection, Web content filtering, Spam filtering, intrusion prevention (IPS), and virtual private networking (VPN).
PWR
IPM
USB
5
3
4 5 6
CONSOLE
STATUS
162
ALT
ON/OFF
RESET
3 4 5 6
10/100/1000 Copper
RJ-45 Serial
Connection
USB
Extraction
Lever
Mounting
Knot
Mounting
Knot
Extraction
Lever
1, 2
10/100/100 Copper
with SSP Co-Processor
NAT/Route mode Transparent mode
The management IP address and netmask must be valid for the network that the FortiGate-5002FB2 module is connected to.
General settings
A default gateway is required for the FortiGate unit to route connections to the Internet.
Port 1
IP:
____.____.____.____
Netmask:
____.____.____.____
Port 2
IP:
____.____.____.____
Netmask:
____.____.____.____
Port 3
IP:
____.____.____.____
Netmask:
____.____.____.____
Port 4
IP:
____.____.____.____
Netmask:
____.____.____.____
Port 5
IP:
____.____.____.____
Netmask:
____.____.____.____
Port 6
IP:
____.____.____.____
Netmask:
____.____.____.____
Management IP:
IP:
____.____.____.____
Netmask:
____.____.____.____
Administrator password:
Network Settings:
Default Gateway:
____.____.____.____
Primary DNS Server:
____.____.____.____
Secondary DNS Server:
____.____.____.____
3. To access the FortiGate web-based manager, start Internet Explorer and browse to https://192.168.1.99 (remember to include the “s” in https://).
4. Type admin in the Name field and select Login.
Web-based manager and Setup Wizard
Use these tables to record your FortiGate-5002FB2 configuration. You can record NAT/Route or Transparent mode settings and general settings that apply to both modes.
NAT/Route mode
Using the Setup Wizard
To configure the FortiGate-5002FB2 module using the Setup Wizard, select the Easy Setup Wizard button.
Using the web-based manager To change the administrator password
1. Go to System > Admin > Administrators.
2. Select Change Password for the admin administrator and enter a new password.
To configure interfaces
1. Go to System > Network > Interface.
2. Select the edit icon for each interface to configure.
3. Set the addressing mode for the interface. (see the online help for information.)
•For manual addressing, enter the IP address and netmask for the interface.
•For DHCP addressing, select DHCP and any required settings.
•For PPPoE addressing, select PPPoE, and enter the username and password and any other required settings.
To configure the Primary and Secondary DNS server IP addresses
1. Go to System > Network > DNS, enter the Primary and Secondary DNS IP addresses that you recorded above and select Apply.
To configure a Default Gateway
1. Go to Router > Static and select Edit icon for the static route.
2. Set Gateway to the Default Gateway IP address that you recorded above and select OK.
Transparent mode
To switch from NAT/route mode to transparent mode
1. Go to System > Status, select Change beside Operation Mode, and select OK.
2. Change the IP address of the management computer to 10.10.10.2 and use Internet Explorer to browse to https://10.10.10.1.
Using the Setup Wizard
To configure the FortiGate-5002 module using the Setup Wizard, select the Easy Setup Wizard button and follow the prompts.
Using the web-based manager To change the administrator password using the web-based manager
1. Go to System > Admin > Administrators.
2. Select Change Password for the admin administrator and enter a new password.
To configure the management interface using the web-based manager
1. Go to System > Network > Management.
2. Enter the Management IP address and netmask that you recorded above.
3. Select administrative access options if required and select OK.
To configure the Primary and Secondary DNS server IP addresses
1. Go to System > Network > DNS, enter the Primary and Secondary DNS IP addresses that you recorded above and select Apply.
To configure a Default Gateway
1. Go to System > Network > Management.
2. Set Default Gateway to the Default Gateway IP address that you recorded above and select OK.
Select the
Easy Setup Wizard
NAT/Route mode
1. Configure Port 1.
config system interface
edit port1
set mode static set ip <intf_ip> <netmask_ip>
end
2. Repeat to configure each interface, for example, to configure Port 2:
config system interface
edit port2
set mode static set ip <intf_ip> <netmask_ip>
end
3. Configure the primary and secondary DNS server IP addresses.
config system dns
set primary <dns-server_ip> set secondary <dns-server_ip>
end
4. Configure the default gateway.
config router static
edit 1
set gateway <gateway_ip>
end
Transparent mode
1. Change from NAT/Route mode to Transparent mode.
config system global
set opmode transparent
end
2. Wait a moment and then log in again at the prompt.
3. Configure the Management IP address.
config system manageip
set ip <mng_ip> <netmask>
end
Configure the DNS server IP address.
config system dns
set primary <dns-server_ip> set secondary <dns-server_ip>
end
4. Configure the default route.
config router static
edit 1
set gateway <gateway_ip>
end
Using the Command Line Interface
1. Use the RJ45 to DB9 cable to connect the FortiGate Console port to the management computer serial port.
2. Start a terminal emulation program (HyperTerminal) on the management computer. Use these settings: Bits Per Second 9600, Data bits 8, Parity None, Stop bits 1, and Flow Control None.
3. At the Login: prompt, type admin and press Enter twice (no password required).
1. Connect Port 1 to the same network as a management computer.
2. Configure the management computer to be on the same subnet as Port 1. To do this, change the IP address of the management computer to 192.168.1.2 and the netmask to
255.255.255.0.
Note: If you change the IP address of Port 1 (NAT/Route mode) or management IP address (Transparent mode), you must use this address to reconnect to the web-based manager and Setup Wizard. You
might also have to change the IP address of the management computer to be on the same subnet as the new IP address.
Collecting information
5
Configuring the FortiGate-5002FB2
6
Congratulations! You have finished configuring the basic settings. Your network is now protected
from Internet-based threats. To explore the full range of configuration options, see the online help or the Documentation CD-ROM.
Completing the configuration
7
• To restart the unit, go to System > Maintenance > ShutDown and select Reboot.
• To reset the unit, go to System > Maintenance > Shutdown and select Reset to factory default.
CLI:
execute reboot
Restarting the FortiGate-5002FB2
Should you mistakenly change a network setting and cannot connect to the unit, reboot the unit and try again or to set the unit back to factory defaults and start over again.
CLI:
execute factoryreset
Technical support
Fortinet Technical Support provides services designed to make sure that your Fortinet systems install quickly, configure easily, and operate reliably in your network.
Please visit the Fortinet Technical Support web site at http://support.fortinet.com to learn about the technical support services that Fortinet provides.
Loading...