No part of this publication including text, examples, diagrams or illustrations may be reproduced,
transmitted, or translated in any form or by any means, electronic, mechanical, manual, optical or
otherwise, for any purpose, without prior written permission of Fortinet Inc.
FortiGate-50R Installation and Configuration Guide
Version 2.50 MR2
18 August 2003
Trademarks
Products mentioned in this document are trademarks or registered trademarks of their respective
holders.
Regulatory Compliance
FCC Class A Part 15 CSA/CUS
For technical support, please visit http://www.fortinet.com.
Send information about errors or omissions in this document or any Fortinet technical documentation to
techdoc@fortinet.com.
Index .................................................................................................................... 233
10 Fortinet Inc.
FortiGate-50R Installation and Configuration Guide Version 2.50 MR2
Introduction
The FortiGate-50 Antivirus Firewall is an
easy-to-deploy and easy-to-administer
solution that delivers exceptional value
and performance for small office and
home office (SOHO) applications.
The FortiGate-50R is limited to a
maximum of 10 users.
Your FortiGate-50 is a dedicated easily managed security device that delivers a full
suite of capabilities that include:
•application-level services such as virus protection, web content filtering, email
filtering, and network intrusion detection (NIDS).
•network-level services such as firewall, intrusion detection, VPN, and traffic
shaping.
NAT/Route mode and Transparent mode
The FortiGate can operate in NAT/Route mode or Transparent mode.
NAT/Route mode
In NAT/Route mode, the FortiGate-50 is installed as a privacy barrier between the
internal network and the Internet. The firewall provides network address translation
(NAT) to protect the internal private network. You can control whether firewall policies
run in NAT mode or route mode. NAT mode policies route allowed connections
between firewall interfaces, performing network address translation to hide addresses
on the protected internal networks. Route mode policies route allowed connections
between firewall interfaces without performing network address translation.
Transparent mode
Transparent Mode provides firewall protection to a pre-existing network with public
addresses. The internal and external network interfaces of the FortiGate unit must be
in the same subnet and the FortiGate unit can be inserted into your network at any
point without the need to make any changes to your network.
FortiGate-50R Installation and Configuration Guide 11
About this documentIntroduction
About this document
This installation and configuration guide describes how to install and configure the
FortiGate-50. This document contains the following information:
•Getting started describes unpacking, mounting, and powering on the FortiGate.
•NAT/Route mode installation describes how to install the FortiGate if you are
planning on running it in NAT/Route mode.
•Transparent mode installation describes how to install the FortiGate if you are
planning on running it in Transparent mode.
•System status describes how to view the current status of your FortiGate unit and
related status procedures including installing updated FortiGate firmware, backing
up and restoring system settings, and switching between Transparent and
NAT/Route mode.
•Virus and attack definitions updates and registration describes configuring
automatic virus and attack definition updates. This chapter also contains
procedures for connecting to the FortiGate tech support webs site and for
registering your FortiGate unit.
•Network configuration describes configuring interfaces, configuring routing, and
configuring the FortiGate as a DHCP server for your internal network.
•System configuration describes system administration tasks available from the
System > Config web-based manager pages. This chapter describes setting
system time, adding and changed administrative users, configuring SNMP, and
editing replacement message
•Firewall configuration describes how to configure firewall policies to control traffic
through the FortiGate unit and apply content protection profiles to content traffic.
•Users and authentication describes how to add user names to the FortiGate user
database and how to configure the FortiGate to connect to a RADIUS server to
authenticate users.
•IPSec VPN describes how to configure FortiGate IPSec VPN.
•PPTP and L2TP VPN describes how to configure PPTP and L2TP VPNs between
the FortiGate and a windows client.
•Network Intrusion Detection System (NIDS) describes how to configure the
FortiGate NIDS to detect and prevent network attacks.
•Antivirus protection describes how use the FortiGate to protect your network from
viruses and worms.
•Web filtering describes how to configure web content filtering to prevent unwanted
Web content from passing through the FortiGate.
•Email filter describes how to configure email filtering to filter unwanted email
content.
•Logging and reporting describes how to configure logging and alert email to track
activity through the FortiGate.
•The Glossary defines many of the terms used in this document.
12Fortinet Inc.
Introduction Document conventions
Document conventions
This guide uses the following conventions to describe CLI command syntax.
•angle brackets < > to indicate variable keywords
For example:
execute restore config <filename_str>
You enter restore config myfile.bak
<xxx_str> indicates an ASCII string variable keyword.
<xxx_integer> indicates an integer variable keyword.
<xxx_ip> indicates an IP address variable keyword.
•vertical bar and curly brackets {|} to separate alternative, mutually exclusive
required keywords
For example:
set system opmode {nat | transparent}
You can enter set system opmode nat or set system opmode
transparent
•square brackets [ ] to indicate that a keyword is optional
For example:
get firewall ipmacbinding [dhcpipmac]
You can enter get firewall ipmacbinding or
get firewall ipmacbinding dhcpipmac
FortiGate-50R Installation and Configuration Guide 13
Fortinet documentationIntroduction
Fortinet documentation
Information about FortiGate products is available from the following FortiGate User
Manual volumes:
•Volume 1: FortiGate Installation and Configuration Guide
Describes installation and basic configuration for the FortiGate unit. Also describes
how to use FortiGate firewall policies to control traffic flow through the FortiGate
unit and how to use firewall policies to apply antivirus protection, web content
filtering, and email filtering to HTTP, FTP and email content passing through the
FortiGate unit.
•Volume 2: FortiGate VPN Guide
Contains in-depth information about FortiGate IPSec VPN using certificates, preshared keys and manual keys for encryption. Also contains basic configuration
information for the Fortinet Remote VPN Client, detailed configuration information
for FortiGate PPTP and L2TP VPN, and VPN configuration examples.
•Volume 3: FortiGate Content Protection Guide
Describes how to configure antivirus protection, web content filtering, and email
filtering to protect content as it passes through the FortiGate unit.
•Volume 4: FortiGate NIDS Guide
Describes how to configure the FortiGate NIDS to detect and protect the FortiGate
unit from network-based attacks.
•Volume 5: FortiGate Logging and Message Reference Guide
Describes how to configure FortiGate logging and alert email. Also contains the
FortiGate log message reference.
•Volume 6: FortiGate CLI Reference Guide
Describes the FortiGate CLI and contains a reference to all FortiGate CLI
commands.
The FortiGate online help also contains procedures for using the FortiGate web-based
manager to configure and manage your FortiGate unit.
Comments on Fortinet technical documentation
You can send information about errors or omissions in this document or any Fortinet
technical documentation to techdoc@fortinet.com.
14Fortinet Inc.
Introduction Customer service and technical support
Customer service and technical support
For antivirus and attack definition updates, firmware updates, updated product
documentation, technical support information, and other resources, please visit the
Fortinet technical support web site at http://support.fortinet.com.
You can also register FortiGate Antivirus Firewalls from http://support.fortinet.com and
modify your registration information at any time.
Fortinet email support is available from the following addresses:
amer_support@fortinet.com For customers in the United States, Canada, Mexico, Latin
apac_support@fortinet.com For customers in Japan, Korea, China, Hong Kong, Singapore,
eu_support@fortinet.comFor customers in the United Kingdom, Scandinavia, Mainland
America and South America.
Malaysia, all other Asian countries, and Australia.
Europe, Africa, and the Middle East.
For information on Fortinet telephone support, see http://support.fortinet.com.
When requesting technical support, please provide the following information:
•Your name
•Company name
•Location
•Email address
•Telephone number
•FortiGate unit serial number
•FortiGate model
•FortiGate FortiOS firmware version
•Detailed description of the problem
FortiGate-50R Installation and Configuration Guide 15
Customer service and technical supportIntroduction
16Fortinet Inc.
FortiGate-50R Installation and Configuration Guide Version 2.50 MR2
Getting started
This chapter describes unpacking, setting up, and powering on your FortiGate
Antivirus Firewall. When you have completed the procedures in this chapter, you can
proceed to one of the following:
•If you are going to operate the FortiGate unit in NAT/Route mode, go to
“NAT/Route mode installation” on page 33.
•If you are going to operate the FortiGate unit in Transparent mode, go to
“Transparent mode installation” on page 41.
This chapter describes:
•Package contents
•Mounting
•Powering on
•Connecting to the web-based manager
•Connecting to the command line interface (CLI)
•Factory default FortiGate configuration settings
•Planning your FortiGate configuration
•FortiGate model maximum values matrix
•Next steps
FortiGate-50R Installation and Configuration Guide 17
Package contentsGetting started
Package contents
The FortiGate-50 package contains the following items:
•the FortiGate-50 Antivirus Firewall
•one orange cross-over ethernet cable
•one gray regular ethernet cable
•one null-modem cable
•FortiGate-50 QuickStart Guide
•A CD containing the FortiGate user documentation
•one AC adapter
Figure 1: FortiGate-50 package contents
Front
Ethernet Cables:
INTERNAL EXTERNAL
POWER
STATUS
Orange - Crossover
Grey - Straight-through
Mounting
Null-Modem Cable
(RS-232)
AC Adapter
FortiGate-50
POWER
INTERNAL EXTERNAL
STATUS
QuickStart Guide
Copyright 2003 Fortinet Incorporated. All rights reserved.
Trademarks
Products mentioned in this document are trademarks.
Documentation
Power
Connection
ConsoleDC+5V 3A
RS-232 Serial
Connection
Internal
Interface
External
External
Interface
External
Interface
Back
Internal
Internal
Interface
Status
LED
Power
LED
USER MANUAL
The FortiGate-50 unit can be installed on any stable surface. Make sure that the
appliance has at least 1.5 in. (3.75 cm) of clearance on each side to allow for
adequate air flow and cooling.
Dimensions
•8.63 x 6.13 x 1.38 in. (21.9 x 15.6 x 3.5 cm)
Weight
•1.5 lb. (0.68 kg)
Power requirements
•DC input voltage: 5 V
•DC input current: 3 A
18Fortinet Inc.
Getting started Powering on
Environmental specifications
•Operating temperature: 32 to 104°F (0 to 40°C)
•Storage temperature: -13 to 158°F (-25 to 70°C)
•Humidity: 5 to 95% non-condensing
Powering on
To power on the FortiGate-50 unit:
1Connect the AC adapter to the power connection at the back of the FortiGate-50 unit.
2Connect the AC adapter to a power outlet.
The FortiGate-50 unit starts up. The Power and Status lights light. The Status light
flashes while the FortiGate-50 unit is starting up and remains lit when the system is up
and running.
Table 1: FortiGate-50 LED indicators
LEDStateDescription
PowerGreenThe FortiGate unit is powered on.
OffThe FortiGate unit is powered off.
StatusFlashing
Internal
External
(Front)
Internal
External (Back)
Green
GreenThe FortiGate unit is running normally.
OffThe FortiGate unit is powered off.
Green The correct cable is in use, and the connected equipment has
Flashing
Green
OffNo link established.
GreenThe correct cable is in use, and the connected equipment has
Flashing
Amber
OffNo link established.
The FortiGate unit is starting up.
power.
Network activity at this interface.
power.
Network activity at this interface.
FortiGate-50R Installation and Configuration Guide 19
Connecting to the web-based managerGetting started
Connecting to the web-based manager
Use the following procedure to connect to the web-based manager for the first time.
Configuration changes made with the web-based manager are effective immediately
without the need to reset the firewall or interrupt service.
To connect to the web-based manager, you need:
•a computer with an ethernet connection,
•Internet Explorer version 4.0 or higher,
•a crossover cable or an ethernet hub and two ethernet cables.
Note: You can use the web-based manager with recent versions of most popular web browsers.
The web-based manager is fully supported for Internet Explorer version 4.0 or higher.
Connecting to the web-based manager
1Set the IP address of the computer with an ethernet connection to the static IP
address 192.168.1.2 and a netmask of 255.255.255.0.
You can also configure the management computer to obtain an IP address
automatically using DHCP. The FortiGate DHCP server assigns the management
computer an IP address in the range 192.168.1.1 to 192.168.1.254.
2Using the crossover cable or the ethernet hub and cables, connect the Internal
interface of the FortiGate unit to the computer ethernet connection.
3Start Internet Explorer and browse to the address https://192.168.1.99.
The FortiGate login is displayed.
4Type admin in the Name field and select Login.
The Register Now window is displayed. Use the information on this window to register
your FortiGate unit so that Fortinet can contact you for firmware updates. You must
also register to receive updates to the FortiGate virus and attack definitions.
20Fortinet Inc.
Getting started Connecting to the command line interface (CLI)
Figure 2: FortiGate login
Connecting to the command line interface (CLI)
As an alternative to the web-based manager, you can install and configure the
FortiGate unit using the CLI. Configuration changes made with the CLI are effective
immediately without the need to reset the firewall or interrupt service.
To connect to the FortiGate CLI, you need:
•a computer with an available communications port,
•the null modem cable included in your FortiGate package,
•terminal emulation software such as HyperTerminal for Windows.
Note: The following procedure describes how to connect to the CLI using Windows
HyperTerminal software. You can use any terminal emulation program.
To connect to the CLI:
1Connect the null modem cable to the communications port of your computer and to
the FortiGate Console port.
2Make sure that the FortiGate unit is powered on.
3Start HyperTerminal, enter a name for the connection, and select OK.
4Configure HyperTerminal to connect directly to the communications port on the
computer to which you have connected the null modem cable and select OK.
5Select the following port settings and select OK.
FortiGate-50R Installation and Configuration Guide 21
Factory default FortiGate configuration settingsGetting started
Bits per second 9600
Data bits8
ParityNone
Stop bits1
Flow controlNone
6Press Enter to connect to the FortiGate CLI.
The following prompt appears:
FortiGate-50 login:
7Type admin and press Enter twice.
The following prompt appears:
Type ? for a list of commands.
For information on how to use the CLI, see the FortiGate CLI Reference Guide.
Factory default FortiGate configuration settings
The FortiGate unit is shipped with a factory default configuration. This default
configuration allows you to connect to and use the FortiGate web-based manager to
configure the FortiGate unit onto your network. To configure the FortiGate unit onto
your network you add an administrator password, change network interface IP
addresses, add DNS server IP addresses, and configuring routing if required.
If you are planning on operating the FortiGate unit in Transparent mode, you can
switch to transparent mode from the factory default configuration and then configure
the FortiGate unit onto your network in Transparent mode.
Once the network configuration is complete, you can perform additional configuration
tasks such as setting system time, configuring virus and attack definition updates, and
registering the FortiGate unit.
The factory default firewall configuration includes a single network address translation
(NAT) policy that allows users on your internal network to connect to the external
network, and stops users on the external network from connecting to the internal
network. You can add more policies to provide more control of the network traffic
passing through the FortiGate unit.
The factory default content profiles can be used to quickly apply different levels of
antivirus protection, web content filtering, and email filtering to the network traffic
controlled by firewall policies.
Getting started Factory default FortiGate configuration settings
Factory Default DHCP configuration
When the FortiGate unit is first powered on, the external interface is configured to
receive its IP address by connecting to a DHCP server. If your ISP provides IP
addresses using DHCP, no other configuration is required for this interface.
The FortiGate unit can also function as a DHCP server for your internal network. You
can configure the TCP/IP settings of the computers on your internal network to obtain
an IP address automatically from the FortiGate unit DHCP server. For more
information about the FortiGate DHCP server, see “Providing DHCP services to your
internal network” on page 99.
Table 2: FortiGate DHCP Server default configuration
When the FortiGate unit is first powered on, it is running in NAT/Route mode and has
the basic network configuration listed in Ta bl e 3. This configuration allows you to
connect to the FortiGate unit web-based manager and establish the configuration
required to connect the FortiGate unit to your network. In Table 3 HTTPS
management access means you can connect to the web-based manager using this
interface. Ping management access means this interface responds to ping requests.
The factory default firewall configuration is the same in NAT/Route and Transparent
mode.
Table 5: Factory default firewall configuration
Internal
Address
External
Address
Recurring
Schedule
Firewall
Policy
Internal_All
External_All
AlwaysThe schedule is valid at all times. This means that
Int->ExtFirewall policy for connections from the internal
SourceInternal_AllThe policy source address. Internal_All means that
Destination External_AllThe policy destination address. External_All means
ScheduleAlwaysThe policy schedule. Always means that the policy
ServiceANYThe policy service. ANY means that this policy
ActionACCEPTThe policy action. ACCEPT means that the policy
; NATNAT is selected for the NAT/Route mode default
IP: 0.0.0.0Represents all of the IP addresses on the internal
Mask: 0.0.0.0
IP: 0.0.0.0Represents all of the IP addresses on the external
Mask: 0.0.0.0
network.
network.
the firewall policy is valid at all times.
network to the external network.
the policy accepts connections from any internal IP
address.
that the policy accepts connections with a
destination address to any IP address on the
external network.
is valid at any time.
processes connections for all services.
allows connections.
policy so that the policy applies network address
translation to the traffic processed by the policy.
NAT is not available for Transparent mode policies.
24Fortinet Inc.
Getting started Factory default FortiGate configuration settings
Traffic ShapingTraffic shaping is not selected. The policy does not
AuthenticationAuthentication is not selected. Users do not have to
; Antivirus & Web FilterAntivirus & Web Filter is selected.
Content
Profile
Log TrafficLog Traffic is not selected. This policy does not
Factory default content profiles
You can use content profiles to apply different protection settings for content traffic
controlled by firewall policies. You can use content profiles for:
•Antivirus protection of HTTP, FTP, IMAP, POP3, and SMTP network traffic
•Web content filtering for HTTP network traffic
•Email filtering for IMAP and POP3 network traffic
•Oversized file and email blocking for HTTP, FTP, POP3, SMTP, and IMAP network
traffic
•Passing fragmented emails in IMAP, POP3, and SMTP email traffic
Using content profiles you can build up protection configurations that can be easily
applied to different types of Firewall policies. This allows you to customize different
types and different levels of protection for different firewall policies.
For example, while traffic between internal and external addresses might need strict
protection, traffic between trusted internal addresses might need moderate protection.
You can configure policies for different traffic services to use the same or different
content profiles.
apply traffic shaping to the traffic controlled by the
policy. You can select this option to control the
maximum or minimum amount of bandwidth
available to traffic processed by the policy.
authenticate with the firewall before connecting to
their destination address. You can configure user
groups and select this option to require users to
authenticate with the firewall before they can
connect through the firewall.
ScanThe scan content profile is selected. The policy
scans all HTTP, FTP, SMTP, POP3, and IMAP
traffic for viruses. See “Scan content profile” on
page 26 for more information about the scan
content profile. You can select one of the other
content profiles to apply different levels of content
protection to traffic processed by this policy.
record messages to the traffic log for the traffic
processed by this policy. You can configure
FortiGate logging and select Log Traffic to record all
connections through the firewall that are accepted
by this policy.
Content profiles can be added to NAT/Route mode and Transparent mode policies.
FortiGate-50R Installation and Configuration Guide 25
Factory default FortiGate configuration settingsGetting started
Strict content profile
Use the strict content profile to apply maximum content protection to HTTP, FTP,
IMAP, POP3, and SMTP content traffic. You would not use the strict content profile
under normal circumstances, but it is available if you are having extreme problems
with viruses and require maximum content screening protection.
Use the scan content profile to apply antivirus scanning to HTTP, FTP, IMAP, POP3,
and SMTP content traffic.
Table 7: Scan content profile
OptionsHTTPFTPIMAPPOP3SMTP
Antivirus Scan;;;;;
File Block
Web URL Block
Web Content Block
Web Script Filter
Web Exempt List
Email Block List
Email Exempt List
Email Content Block
Oversized File/Email Blockpasspasspasspasspass
Pass Fragmented Emails
26Fortinet Inc.
Getting started Factory default FortiGate configuration settings
Web content profile
Use the web content profile to apply antivirus scanning and Web content blocking to
HTTP content traffic. You can add this content profile to firewall policies that control
HTTP traffic.
Table 8: Web content profile
OptionsHTTPFTPIMAPPOP3SMTP
Antivirus Scan;
File Block
Web URL Block;
Web Content Block;
Web Script Filter
Web Exempt List
Email Block List
Email Exempt List
Email Content Block
Oversized File/Email Blockpasspasspasspasspass
Pass Fragmented Emails
Unfiltered content profile
Use the unfiltered content profile if you do not want to apply any content protection to
content traffic. You can add this content profile to firewall policies for connections
between highly trusted or highly secure networks where content does not need to be
protected.
Table 9: Unfiltered content profile
OptionsHTTPFTPIMAPPOP3SMTP
Antivirus Scan
File Block
Web URL Block
Web Content Block
Web Script Filter
Web Exempt List;
Email Block List
Email Exempt List;;
Email Content Block
Oversized File/Email Blockpasspasspasspasspass
Pass Fragmented Emails;;;
FortiGate-50R Installation and Configuration Guide 27
Planning your FortiGate configurationGetting started
Planning your FortiGate configuration
Before beginning to configure the FortiGate unit, you need to plan how to integrate the
unit into your network. Among other things, you have to decide whether or not the unit
will be visible to the network, which firewall functions it will provide, and how it will
control the traffic flowing between its interfaces.
Your configuration plan is dependent upon the operating mode that you select. The
FortiGate unit can be configured in either of two modes: NAT/Route mode (the default)
or Transparent mode.
NAT/Route mode
In NAT/Route mode, the unit is visible to the network. Like a router, all of its interfaces
are on different subnets. The following interfaces are available in NAT/Route mode:
•External is the interface to the external network (usually the Internet).
•Internal is the interface to the internal network.
You can add security policies to control whether communications through the
FortiGate unit operate in NAT mode or in route mode. Security policies control the flow
of traffic based on each packet’s source address, destination address and service. In
NAT mode, the FortiGate performs network address translation before the packet is
sent to the destination network. In route mode, no translation takes place.
By default, the FortiGate unit has a NAT mode security policy that allows users on the
internal network to securely download content from the external network. No other
traffic is possible until you have configured more security policies.
You would typically use NAT/Route mode when the FortiGate unit is used as a
gateway between private and public networks. In this configuration, you would create
NAT mode policies to control traffic flowing between the internal, private network and
the external, public network (usually the Internet).
Figure 3: Example NAT/Route mode network configuration
Transparent mode
In Transparent mode, the FortiGate unit is invisible to the network. Similar to a
network bridge, all of FortiGate interfaces must be on the same subnet. You only have
to configure a management IP address so that you can make configuration changes.
The management IP address is also used for antivirus and attack definition updates.
You would typically use the FortiGate unit in Transparent mode on a private network
behind an existing firewall or behind a router. The FortiGate unit performs firewalling
as well as antivirus and content scanning but not VPN.
28Fortinet Inc.
Getting started Planning your FortiGate configuration
Figure 4: Example Transparent mode network configuration
Configuration options
Once you have selected Transparent or NAT/Route mode operation, you can
complete your configuration plan, and begin configuring the FortiGate unit.
You can use the web-based manager setup wizard or the command line interface
(CLI) for the basic configuration of the FortiGate unit.
Setup Wizard
If you are configuring the FortiGate unit to operate in NAT/Route mode (the default),
the Setup Wizard prompts you to add the administration password and the internal
interface address. The Setup Wizard also prompts you to choose either a manual
(static) or a dynamic (DHCP or PPPoE) address for the external interface. Using the
wizard, you can also add DNS server IP addresses and a default route for the external
interface.
In NAT/Route mode you can also change the configuration of the FortiGate DHCP
server to supply IP addresses for the computers on your internal network. You can
also configure the FortiGate to allow Internet access to your internal Web, FTP, or
email servers.
If you are configuring the FortiGate unit to operate in Transparent mode, you can
switch to Transparent mode from the web-based manager and then use the Setup
Wizard to add the administration password, the management IP address and
gateway, and the DNS server addresses.
CLI
If you are configuring the FortiGate unit to operate in NAT/Route mode, you can add
the administration password and the Internal interface address. You can also use the
CLI to configure the external interface for either a manual (static) or a dynamic (DHCP
or PPPoE) address. Using the CLI, you can also add DNS server IP addresses and a
default route for the external interface.
In NAT/Route mode you can also change the configuration of the FortiGate DHCP
server to supply IP addresses for the computers on your internal network.
If you are configuring the FortiGate unit to operate in Transparent mode, you can use
the CLI to switch to Transparent mode, Then you can add the administration
password, the management IP address and gateway, and the DNS server addresses.
FortiGate-50R Installation and Configuration Guide 29
FortiGate model maximum values matrixGetting started