Products mentioned in this document are trademarks or registered t
This device complete with part 15 of the FCC rules. Operations is subject to the following two
conditions:
holders.
Regulatory Compliance
This device complies with part 15 of the FCC rules. Operation is subject to the following two
condigions:
(1) This Device may not cause harmful interference, and (2) this device must accept any
interference received, including interference that may cause accept any interference received,
including interference that may cause undesired operation.
NOTE: The manufacturer is not responsible for any radio or TV interference caused by
unauthorized modifications to this equipment. Such modifications could void the user’s authority to
operate the equipment.
please visit http://www.fortinet.com.
Send information about errors or omissions in this document or any Fortinet technical
documentation to
Index ....................................................................................................................287
12 Fortinet Inc.
FortiWiFi-60 Installation and Configuration Guide Version 2.50
Introduction
FortiGate and FortiWiFi Antivirus Firewalls support network-based deployment of
application-level services, including antivirus protection and full-scan content filtering.
FortiGate and FortiWiFi Antivirus Firewalls improve network security, reduce network
misuse and abuse, and help you use communications resources more efficiently
without compromising the performance of your network. FortiGate and FortiWiFi
Antivirus Firewalls are ICSA-certified for firewall, IPSec, and antivirus services.
The FortiWiFi-60 Antivirus Firewall is a dedicated easily managed security device that
delivers a full suite of capabilities that include:
•application-level services such as virus protection and content filtering,
•network-level services such as firewall, intrusion detection, VPN, and traffic
shaping.
The FortiWiFi-60 Antivirus Firewall uses Fortinet’s Accelerated Behavior and Content
Analysis System (ABACAS™) technology, which leverages breakthroughs in chip
design, networking, security, and content analysis. The unique ASIC-based
architecture analyzes content and behavior in real-time, enabling key applications to
be deployed right at the network edge, where they are most effective at protecting
your networks. The FortiWiFi series complements existing solutions, such as hostbased antivirus protection, and enables new applications and services while greatly
lowering costs for equipment, administration, and maintenance.
The FortiWiFi-60 model is ideally suited for
small businesses, remote offices, retail
stores, and broadband telecommuter sites.
The FortiWiFi-60 Antivirus Firewall features
dual WAN link support for redundant internet
connections, and an integrated 4-port switch
that eliminates the need for an external hub
or switch. Networked devices connect
directly to the FortiWiFi-60 unit.
The FortiWiFi-60 provides a secure,
wireless LAN solution that combines mobility and flexibility with the enterprise-class
FortiWiFi Antivirus Firewall features. The FortiWiFi is a Wi-Fi certified, wireless LAN
transceiver that uses a two mini-PCI radios that are IEEE 802.11b and IEEE 802.11gcompliant and that can be upgraded to future radio technologies.
The FortiWiFi serves as the connection point between wireless and wired networks or
as the center point of a stand-alone wireless network. FortiWiFi-60 security features
include WEP, VPN over the wireless network, and firewall policies that can include
user authentication to control access.
PWRWLAN
INTERNAL
LINK 100 LINK 100 LINK 100 LINK 100 LINK 100 LINK 100 LINK 100
DMZ4321
WAN1 WA N2
FortiWiFi-60 Installation and Configuration Guide 13
Antivirus protectionIntroduction
Antivirus protection
FortiWiFi ICSA-certified antivirus protection scans web (HTTP), file transfer (FTP),
and email (SMTP, POP3, and IMAP) content as it passes through the FortiWiFi unit. If
a virus is found, antivirus protection removes the file containing the virus from the
content stream and forwards a replacement message to the intended recipient.
For extra protection, you can configure antivirus protection to block specified file types
from passing through the FortiWiFi unit. You can use the feature to stop files that
might contain new viruses.
If the FortiWiFi unit contains a hard disk, infected or blocked files can be quarantined.
The FortiWiFi administrator can download qua rant ine d file s so tha t th ey can be viru s
scanned, cleaned, and forwarded to the intended recipient. Y ou can also configure the
FortiWiFi unit to automatically delete quarantined files after a specified time.
The FortiWiFi unit can send email alerts to system administrators when it detects and
removes a virus from a content stream. The web and email content can be in normal
network traffic or encrypted IPSec VPN traffic.
ICSA Labs has certified that FortiGate and FortiWiFi Antivirus Firewalls:
•detect 100% of the viruses listed in the current In The Wild List (www.wildlist.org),
•detect viruses in compressed files using the PKZip format,
•detect viruses in email that has been encoded using uuencode format,
•detect viruses in email that has been encoded using MIME encoding,
•log all actions taken while scanning.
Web content filtering
Web content filtering can scan all HTTP content protocol streams for URLs or web
page content. If there is a match between a URL on the URL block list, or a web page
contains a word or phrase that is in the content block list, the FortiWiFi unit blocks the
web page. The blocked web page is replaced with a message that you can edit using
the FortiWiFi web-based manager.
Y ou can configure URL blocking to block all or some of the pages on a web site. Using
this feature, you can deny access to parts of a web site without denying access to it
completely.
To prevent unintentionally blocking legitimate web pages, you can add URLs to an
exempt list that overrides the URL blocking and content blocking lists.
Web content filtering also includes a script filter feature that can block unsecure web
content such as Java applets, cookies, and ActiveX.
You can use the Cerberian URL blocking to block unwanted URLs.
14Fortinet Inc.
Introduction Email filtering
Email filtering
Email filtering can scan all IMAP and POP3 email content for unwanted senders or
unwanted content. If there is a match between a sender address pattern on the email
block list, or an email contains a word or phrase in the banned word list, the FortiWiFi
adds an email tag to the subject line of the email. The recipient can use the mail client
software to filter messages based on the email tag.
You can configure email blocking to tag email from all or some senders within
organizations that are known to send spam email. To prevent unintentionally tagging
email from legitimate senders, you can add sender address patterns to an exempt list
that overrides the email block and banned words lists.
Firewall
The FortiWiFi ICSA-certified firewall protects your computer networks from Internet
threats. ICSA has granted FortiWiFi firewalls version 4.0 firewall certification,
providing assurance that FortiWiFi firewalls successfully screen and secure corporate
networks against a range of threats from public or other untrusted networks.
After basic installation of the FortiWiFi unit, the firewall allows users on the protected
network to access the Internet while blocking Internet access to internal networks. You
can configure the firewall to put controls on access to the Internet from the protected
networks and to allow controlled access to internal networks.
FortiWiFi policies include a range of options that:
•control all incoming and outgoing network traffic,
•control encrypted VPN traffic,
•apply antivirus protection and web content filtering,
•block or allow access for all policy options,
•control when individual policies are in effect,
•accept or deny traffic to and from individual addresses,
•control standard and user defined network services individually or in groups,
•require users to authenticate before gaining access,
•include traffic shaping to set access priorities and guarantee or limit bandwidth for
each policy,
•include logging to track connections for individual policies,
•include Network Address Translation (NAT) mode and Route mode policies,
•include mixed NAT and Route mode policies.
The FortiWiFi firewall can operate in NAT/Route mode or Transparent mode.
FortiWiFi-60 Installation and Configuration Guide 15
Network intrusion detectionIntroduction
NAT/Route mode
In NAT/Route mode, you can create NAT mode policies and Route mode policies.
•NAT mode policies use network address translation to hide the addresses in a
more secure network from users in a less secure network.
•Route mode policies accept or deny connections between networks without
performing address translation.
Transparent mode
Transparent mode provides the same basic firewall protection as NAT mode. Packets
that the FortiWiFi unit receives are forwarded or blocked according to firewall policies.
The FortiWiFi unit can be inserted in the network at any point without having to make
changes to your network or its components. However, VPN and some advanced
firewall features are available only in NAT/Route mode.
Network intrusion detection
The FortiWiFi Network Intrusion Detection System (NIDS) is a real-time network
intrusion detection sensor that detects and prevents a variety of suspicious network
activity. NIDS uses atta ck signatures to identify more than 1000 attacks. You can
enable and disable the attacks that the NIDS detects. You can also write user-defined
detection attack signatures.
NIDS prevention detects and prevents many common denial of service and packetbased attacks. You can enable and disable prevention attack signatures and
customize attack signature thresholds and other parameters.
To notify system administrators of the attack, the NIDS records the attack and any
suspicious traffic to the attack log, and can be configured to send alert emails.
Fortinet updates NIDS attack definitions periodically. You can download and install
updated attack definitions manually or you can configure the FortiWiFi unit to
automatically check for and download attack definition updates.
VPN
Using FortiWiFi virtual private networking (VPN), you can provide a secure connection
between widely separated office networks or securely link telecommuters or travellers
to an office network.
16Fortinet Inc.
Introduction Secure installation, configuration, and management
VPN features include the following:
•Industry standard and ICSA-certified IPSec VPN, including:
•IPSec, ESP security in tunnel mode,
•DES, 3DES (triple-DES), and AES hardware accelerated encryption,
•HMAC MD5 and HMAC SHA1 authentication and data integrity,
•AutoIKE key based on pre-shared key tunnels,
•IPSec VPN using local or CA certificates,
•Manual Keys tunnels,
•Diffie-Hellman groups 1, 2, and 5,
•Aggressive and Main Mode,
•Replay Detection,
•Perfect Forward Secrecy,
•XAuth authentication,
•Dead peer detection.
•PPTP for easy connectivity with the VPN standard supported by the most popular
operating systems.
•L2TP for easy connectivity with a more secure VPN standard, also supported by
many popular operating systems.
•Firewall policy based control of IPSec VPN traffic.
•IPSec NAT traversal so that remote IPSec VPN gateways or clients behind a NAT
can connect to an IPSec VPN tunnel.
•VPN hub and spoke using a VPN concentrator to allow VPN traffic to pass from
one tunnel to another through the FortiWiFi unit.
•IPSec Redundancy to create a redundant AutoIKE key IPSec VPN connection to a
remote network.
Secure installation, configuration, and management
The first time you power on the FortiWiFi unit, it is already configured with default IP
addresses and security policies. Connect to the web-based manager, set the
operating mode, and use the Setup wizard to customize FortiWiFi IP addresses for
your network, and the FortiWiFi unit is ready to protect your network. You can then
use the web-based manager to customiz e ad va nc ed Fo rtiWiFi features.
You can also create a basic configuration using the FortiWiFi command line interface
(CLI).
Web-based manager
Using HTTP or a secure HTTPS connection from any computer running Internet
Explorer, you can configure and manage the FortiWiFi unit. The web-based manager
supports multiple languages. You can configure the FortiWiFi unit for HTTP and
HTTPS administration from any FortiWiFi interface.
FortiWiFi-60 Installation and Configuration Guide 17
Secure installation, configuration, and managementIntroduction
You can use the web-based manager to configure most FortiWiFi settings. You can
also use the web-based manager to monitor the status of the FortiWiFi unit.
Configuration changes made using the web-based manager are effective immediately
without resetting the firewall or interrupting service. Once you are satisfied with a
configuration, you can download and save it. The saved configuration can be restored
at any time.
Figure 1: The FortiWiFi web-based manager and setup wizard
Command line interface
You can access the FortiWiFi command line interface (CLI) by connecting a
management computer serial port to the FortiWiFi RS-232 serial console connector.
You can also use Telnet or a secure SSH connection to connect to the CLI from any
network that is connected to the FortiWiFi unit, including the Internet.
The CLI supports the same configuration and monitoring functionality as the
web-based manager. In addition, you can use the CLI for advanced configuration
options that are not available from the web-based manager.
This Installation and Configuration Guide contains information about basic and
advanced CLI commands. For a more complete description about connecting to and
using the FortiWiFi CLI, see the FortiGate CLI Reference Guide.
18Fortinet Inc.
Introduction Document conventions
Logging and reporting
The FortiWiFi unit supports logging for various categories of traffic and configuration
changes. You can configure logging to:
•report traffic that connects to the firewall,
•report network services used,
•report traffic that was permitted by firewall policies,
•report traffic that was denied by firewall policies,
•report events such as configuration changes and other management events, IPSec
tunnel negotiation, virus detection, attacks, and web page blocking,
•report attacks detected by the NIDS,
•send alert email to system administrators to report virus incidents, intrusions, and
firewall or VPN events or violations.
Logs can be sent to a remote syslog server or a WebTrends NetIQ Security Reporting
Center and Firewall Suite server using the WebTrends enhanced log format. Some
models can also save logs to an optional internal hard drive. If a hard drive is not
installed, you can configure most FortiWiFi units to log the most recent events and
attacks detected by the NIDS to the system memory.
Document conventions
This guide uses the following conventions to describe CLI command syntax.
•angle brackets < > to indicate variable keywords
For example:
execute restore config <filename_str>
You enter restore config myfile.bak
<xxx_str> indicates an ASCII string variable keyword.
<xxx_integer> indicates an integer variable keyword.
<xxx_ip> indicates an IP address variable keyword.
•vertical bar and curly brackets {|} to separate alternative, mutually exclusive
required keywords
For example:
set system opmode {nat | transparent}
You can enter set system opmode nat or set system opmode
transparent
•square brackets [ ] to indicate that a keyword is optional
For example:
get firewall ipmacbinding [dhcpipmac]
You can enter get firewall ipmacbinding or
get firewall ipmacbinding dhcpipmac
FortiWiFi-60 Installation and Configuration Guide 19
Fortinet documentationIntroduction
Fortinet documentation
Information about FortiGate and FortiWiFi products is available from the following
User Manual volumes:
•Volume 1: FortiWiFi-60 Installation and Configuration Guide
Describes installation and basic configuration for the FortiWiFi unit. Also describes
how to use FortiWiFi firewall policies to control traffic flow through the FortiWiFi
unit and how to use firewall policies to apply antivirus protection, web content
filtering, and email filtering to HTTP, FTP, and email content passing through the
FortiWiFi unit.
•Volume 2: FortiGate VPN Guide
Contains in-depth information about FortiGate IPSec VPN using certificates, preshared keys and manual keys for encryption. Also contains basic configuration
information for the Fortinet Remote VPN Client, detailed configuration information
for FortiGate PPTP and L2TP VPN, and VPN configuration examples.
•Volume 3: FortiGate Content Protection Guide
Describes how to configure antivirus protection, web content filtering, and email
filtering to protect content as it passes through the FortiGate unit.
•Volume 4: FortiGate NIDS Guide
Describes how to configure the FortiGate NIDS to detect and protect the FortiGate
unit from network-based attacks.
•Volume 5: FortiGate Logging and Message Reference Gu ide
Describes how to configure FortiGate logging and alert email. Also contains the
FortiGate log message reference.
•Volume 6: FortiGate CLI Reference Guide
Describes the FortiGate CLI and contains a reference to all FortiGate CLI
commands.
The FortiWiFi online help also contains procedures for using the FortiWiFi web-based
manager to configure and manage the FortiWiFi unit.
Comments on Fortinet technical documentation
You can send information about errors or omissions in this document, or any Fortinet
technical documentation, to techdoc@fortinet.com.
20Fortinet Inc.
Introduction Customer service and technical support
Customer service and technical support
For antivirus and attack definition updates, firmware updates, updated product
documentation, technical support information, and other resources, please visit the
Fortinet technical support web site at http://support.fortinet.com.
You can also register FortiWiFi Antivirus Firewalls from http://support.fortinet.com and
change your registration information at any time.
Fortinet email support is available from the following addresses:
amer_support@fortinet.com For customers in the United States, Canada, Mexico, Latin
apac_support@fortinet.com For customers in Japan, Korea, China, Hong Kong, Singapore,
eu_support@fortinet.comFor customers in the United Kingdom, Scandinavia, Mainland
America and South America.
Malaysia, all other Asian countries, and Australia.
Europe, Africa, and the Middle East.
For information on Fortinet telephone support, see http://support.fortinet.com.
When requesting technical support, please provide the following information:
•Your name
•Company name
•Location
•Email address
•Telephone number
•FortiWiFi unit serial number
•FortiWiFi model
•FortiWiFi FortiOS firmware version
•Detailed description of the problem
FortiWiFi-60 Installation and Configuration Guide 21
Customer service and technical supportIntroduction
22Fortinet Inc.
FortiWiFi-60 Installation and Configuration Guide Version 2.50
Getting started
This chapter describes unpacking, setting up, and powering on a FortiWiFi Antivirus
Firewall unit. When you have completed the procedures in this chapter, you can
proceed to one of the following:
•If you are going to operate the FortiWiFi unit in NAT/Route mode, go to “NAT/Route
mode installation” on page 41.
•If you are going to operate the FortiWiFi unit in Transparent mode, go to
“Transparent mode installation” on page 59.
This chapter describes:
•Warnings
•Package contents
•Mounting
•Powering on
•Connecting to the web-based manager
•Connecting to the command line interface (CLI)
•Factory default FortiWiFi configuration settings
•Planning the FortiWiFi configuration
•FortiGate model maximum values matrix
•Next steps
Warnings
Caution: To comply with FCC radio frequency (RF) exposure limits, dipole antennas should be
!
located at a minimum of 7.9 inches (20 cm) or more from the body of all persons.
Caution: Do not operate a wireless network device near unshielded blasting caps or in an
explosive environment unless the device has been modified to be especially qualified for such
!
use.
FortiWiFi-60 Installation and Configuration Guide 23
Package contentsGetting started
Package contents
The FortiWiFi-60 package contains the following items:
•FortiWiFi-60 Antivirus Firewall
•one orange crossover ethernet cable
•one gray regular ethernet cable
•one null modem cable
•FortiWiFi-60 Quick Start Guide
•CD containing the FortiGate and FortiWiFi user documentation
•one power cable and AC adapter
Figure 2: FortiWiFi-60 package contents
Front
Back
PWRWLAN
Power
WLAN
LED
LED
Ethernet Cables:
Orange - Crossover
Grey - Straight-through
INTERNAL
DMZ4321
LINK 100 LINK 100 LINK 100 LINK 100 LINK 100 LINK 100 LINK 100
Internal
Interface
WAN1 WAN2
WAN 1,2
DMZ
Interface
Interface
Null-Modem Cable
(RS-232)
DC+12V
Console
Power
Connection
RS-232 Serial
Connection
Power Cable Power Supply
USB
USB
WAN2 WAN1 DMZ
WAN2
WAN1
Documentation
DMZ
INTERNAL
PWR WLAN
LINK 100LINK 100 LINK 100 LINK 100 LINK 100 LINK 100LINK 100
QuickStart Guide
Copyright 2003 Fortinet Incorporated. All rights reserved.
Trademarks
Products mentioned in this document are trademarks.
Internal Interface,
switch connectors
FortiWiFi-60
DMZ4321
WAN1 WAN2
1234
Internal
1,2,3,4
Mounting
The FortiWiFi-60 unit can be installed on any stable surface. Make sure that the
appliance has at least 1.5 in. (3.75 cm) of clearance on each side to allow for
adequate air flow and cooling.
Dimensions
•8.63 x 6.13 x 1.38 in. (21.9 x 15.6 x 3.5 cm)
Weight
•1.5 lb. (0.68 kg)
Power requirements
•DC input voltage: 12 V
•DC input current: 3 A
24Fortinet Inc.
Getting started Powering on
Environmental specifications
•Operating temperature: 32 to 104°F (0 to 40°C)
•Storage temperature: -13 to 158°F (-25 to 70°C)
•Humidity: 5 to 95% non-condensing
Wireless Connectivity
•Antenna type: Dual external fixed antenna
•Antenna range: 802.11b/g:2.4GHz
•Antenna Gain: 5dBi
Basic WiFi installation guidelines
Because the FortiWiFi-60 is a radio device, it is susceptible to common causes of
interference that can reduce throughput and range. Follow these basic guidelines to
ensure the best possible performance:
•Install the access point in an area where large steel structures such as shelving
units, bookcases, and filing cabinets do not block the radio signals to and from the
access point.
•Install the access point away from microwave ovens. Microwave ovens operate on
the same frequency as the access point and can cause signal interference.
Powering on
To power on the FortiWiFi-60 unit
1Connect the AC adapter to the power connection at the back of the FortiWiFi-60 unit.
2Connect the AC adapter to the power cable.
3Connect the power cable to a power outlet.
The FortiWiFi-60 unit starts. The Power and WAN LEDS light.
Table 1: FortiWiFi-60 LED indicators
LEDStateDescription
PowerGreenThe FortiWiFi unit is powered on.
OffThe FortiWiFi unit is powered off.
WANGreenTraffic on WAN link.
Link
(Internal
DMZ
WAN1
WAN2)
100
(Internal
DMZ
WAN1
WAN2)
Green The correct cable is in use and the connected
equipment has power.
Flashing GreenNetwork activity at this interface.
OffNo link established.
GreenThe interface is connected at 100 Mbps.
FortiWiFi-60 Installation and Configuration Guide 25
Connecting to the web-based managerGetting started
Connecting to the web-based manager
Use the following procedure to connect to the web-based manager for the first time.
Configuration changes made with the web-based manager are effective immediately
without resetting the firewall or interrupting service.
To connect to the web-based manager, you need:
•a computer with an ethernet connection,
•Internet Explorer version 4.0 or higher,
•an ethernet cable.
•a crossover cable or an ethernet hub and two ethernet cables.
Note: You can use the web-based manager with recent versions of most popular web browsers.
The web-based manager is fully supported for Internet Explorer version 4.0 or higher.
To connect to the web-based manager
1Set the IP address of the computer with an ethernet connection to the static IP
address 192.168.1.2 and a netmask of 255.255.255.0.
You can also configure the management computer to obtain an IP address
automatically using DHCP. The FortiWiFi DHCP server assigns the management
computer an IP address in the range 192.168.1.1 to 192.168.1.254.
2Using the ethernet cable, connect the internal interface of the FortiWiFi unit to the
computer ethernet connection.
3Start Internet Explorer and browse to the address https://192.168.1.99 (remember to
include the “s” in https://).
The FortiWiFi login is displayed.
4Type admin in the Name field and select Login.
The Register Now window is displayed. Use the information in this window to register
your FortiWiFi unit so that Fortinet can contact you for firmware updates. You must
also register to receive updates to the FortiWiFi virus and attack definitions.
Figure 3: FortiWiFi login
26Fortinet Inc.
Getting started Connecting to the command line interface (CLI)
Connecting to the command line interface (CLI)
As an alternative to the web-based manager, you can install and configure the
FortiWiFi unit using the CLI. Configuration changes made with the CLI are effective
immediately without resetting the firewall or interrupting service.
To connect to the FortiWiFi CLI, you need:
•a computer with an available communications port,
•the null modem cable included in your FortiWiFi package,
•terminal emulation software such as HyperTerminal for Windows.
Note: The following procedure describes how to connect to the CLI using Windows
HyperTerminal software. You can use any terminal emulation program.
To connect to the CLI
1Connect the null modem cable to the communications port of your computer and to
the FortiWiFi Console port.
2Make sure that the FortiWiFi unit is powered on.
3Start HyperTerminal, enter a name for the connection, and select OK.
4Configure HyperTerminal to connect directly to the communications port on the
computer to which you have connected the null modem cable and select OK.
5Select the following port settings and select OK.
Bits per second 9600
Data bits8
ParityNone
Stop b its1
Flow controlNone
6Press Enter to connect to the FortiWiFi CLI.
The following prompt is displayed:
FortiWiFi-60 login:
7Type admin and press Enter twice.
The following prompt is displayed:
Type ? for a list of commands.
For information about how to use the CLI, see the FortiGate CLI Reference Guide.
FortiWiFi-60 Installation and Configuration Guide 27
Factory default FortiWiFi configuration settingsGetting started
Factory default FortiWiFi configuration settings
The FortiWiFi unit is shipped with a factory default configuration. The default
configuration allows you to connect to and use the FortiWiFi web-based manager to
configure the FortiWiFi unit onto the network. To configure the FortiWiFi unit onto the
network you add an administrator password, change network interface IP addresses,
add DNS server IP addresses, and configure routing, if required.
If you plan to operate the FortiWiFi unit in Transparent mode, you can switch to
Transparent mode from the factory default configuration and then configur e th e
FortiWiFi unit onto the network in Transparent mode.
Once the network configuration is complete, you can perform additional configuration
tasks such as setting system time, configuring virus and attack definition updates, and
registering the FortiWiFi unit.
The factory default firewall configuration includes a single network address translation
(NAT) policy that allows users on your internal network to connect to the external
network, and stops users on the external network from connecting to the internal
network. You can add more policies to provide more control of the network traffic
passing through the FortiWiFi unit.
The factory default content profiles can be used to apply different levels of antivirus
protection, web content filtering, and email filtering to the network traffic that is
controlled by firewall policies.
When the FortiWiFi unit is first powered on, the WAN1 interface is configured to
receive its IP address by connecting to a DHCP server. If your ISP provides IP
addresses using DHCP, no other configuration is required for this interface.
The FortiWiFi unit can also function as a DHCP server for your internal network. You
can configure the TCP/IP settings of the computers on your internal network to obtain
an IP address automatically from the FortiWiFi unit DHCP server. For more
information about the FortiWiFi DHCP server, see “Configuring DHCP services” on
page 126.
28Fortinet Inc.
Getting started Factory default FortiWiFi configuration settings
Table 2: FortiWiFi Internal interface DHCP Server default configuration
Enable DHCP;
Starting IP192.168.1.101
Ending IP192.168.1.200
Netmask255.255.255.0
Lease Duration7 days
Default Route192.168.1.99
DNS IP192.168.1.99
WINS IP192.168.1.99
Table 3: FortiWiFi WLAN interface DHCP Server default configuration
Enable DHCP;
Starting IP192.168.2.101
Ending IP192.168.2.200
Netmask255.255.255.0
Lease Duration7 days
Default Route192.168.2.99
DNS IP192.168.2.99
WINS IP192.168.2.99
When the FortiWiFi unit is first powered on, it is running in NAT/Route mode and has
the basic network configuration listed in Table 4. This configuration allows you to
connect to the FortiWiFi unit web-based manager and establish the configuration
required to connect the FortiWiFi unit to the network. In Table 4 HTTPS management
access means you can connect to the web-based manager using this interface. Ping
management access means this interface responds to ping requests.
T able 4: Fact ory defaul t NAT/Route mode network configuration