Installation Guide: Fortigate 100
Installation Guide: Fortigate 100
Installation Guide: Fortigate 100
POWER
INTERNAL EXTERNAL DMZ
STATUS
No part of this publication including text, examples, diagrams or illustrations may be reproduced,
transmitted, or translated in any form or by any means, electronic, mechanical, manual, optical or
otherwise, for any purpose, without prior written permission of Fortinet Inc.
Trademarks
Products mentioned in this document are trademarks or registered trademarks of their respective holders.
Regulatory Compliance
FCC Class A Part 15 CSA/CUS
Send information about errors or omissions in this document or any Fortinet technical documentation to
[email protected].
Table of Contents
Introduction ............................................................................................................ 5
Secure installation, configuration, and management .......................................................... 5
Web-based manager ...................................................................................................... 6
Command line interface .................................................................................................. 6
Setup wizard ................................................................................................................... 7
Document conventions ....................................................................................................... 7
Fortinet documentation ....................................................................................................... 8
Comments on Fortinet technical documentation............................................................. 9
Customer service and technical support........................................................................... 10
Index ...................................................................................................................... 53
Introduction
FortiGate Antivirus Firewalls improve network security, reduce network misuse and
abuse, and help you use communications resources more efficiently without
compromising the performance of your network. FortiGate Antivirus Firewalls are
ICSA-certified for firewall, IPSec, and antivirus services.
The FortiGate Antivirus Firewall is a dedicated easily managed security device that
delivers a full suite of capabilities that include:
• application-level services such as virus protection and content filtering,
• network-level services such as firewall, intrusion detection, VPN, and traffic
shaping.
The FortiGate Antivirus Firewall uses Fortinet’s Accelerated Behavior and Content
Analysis System (ABACAS™) technology, which leverages breakthroughs in chip
design, networking, security, and content analysis. The unique ASIC-based
architecture analyzes content and behavior in real-time, enabling key applications to
be deployed right at the network edge where they are most effective at protecting your
networks.
The FortiGate-100 model is an easy-to-
deploy and easy-to-administer solution that
delivers exceptional value and performance INTERNAL EXTERNAL DMZ
POWER
Web-based manager
Using HTTP or a secure HTTPS connection from any computer running Internet
Explorer, you can configure and manage the FortiGate unit. The web-based manager
supports multiple languages. You can configure the FortiGate unit for HTTP and
HTTPS administration from any FortiGate interface.
You can use the web-based manager to configure most FortiGate settings. You can
also use the web-based manager to monitor the status of the FortiGate unit.
Configuration changes made using the web-based manager are effective immediately
without resetting the firewall or interrupting service. Once you are satisfied with a
configuration, you can download and save it. The saved configuration can be restored
at any time.
Setup wizard
The FortiGate setup wizard provides an easy way to configure the basic initial settings
for the FortiGate unit. The wizard walks through the configuration of a new
administrator password, FortiGate interfaces, DHCP server settings, internal servers
(web, FTP, etc.), and basic antivirus settings.
Document conventions
This guide uses the following conventions to describe command syntax.
• Angle brackets < > to indicate variables.
For example:
execute restore config <filename_str>
You enter:
execute restore config myfile.bak
<xxx_str> indicates an ASCII string that does not contain new-lines or carriage
returns.
<xxx_integer> indicates an integer string that is a decimal (base 10) number.
<xxx_octet> indicates a hexadecimal string that uses the digits 0-9 and letters
A-F.
<xxx_ipv4> indicates a dotted decimal IPv4 address.
<xxx_v4mask> indicates a dotted decimal IPv4 netmask.
<xxx_ipv4mask> indicates a dotted decimal IPv4 address followed by a dotted
decimal IPv4 netmask.
<xxx_ipv6> indicates a dotted decimal IPv6 address.
<xxx_v6mask> indicates a dotted decimal IPv6 netmask.
<xxx_ipv6mask> indicates a dotted decimal IPv6 address followed by a dotted
decimal IPv6 netmask.
• Vertical bar and curly brackets {|} to separate alternative, mutually exclusive
required keywords.
For example:
set opmode {nat | transparent}
You can enter set opmode nat or set opmode transparent.
• Square brackets [ ] to indicate that a keyword or variable is optional.
For example:
show system interface [<name_str>]
To show the settings for all interfaces, you can enter show system interface.
To show the settings for the internal interface, you can enter show system
interface internal.
• A space to separate options that can be entered in any combination and must be
separated by spaces.
For example:
set allowaccess {ping https ssh snmp http telnet}
You can enter any of the following:
set allowaccess ping
set allowaccess ping https ssh
set allowaccess https ping ssh
set allowaccess snmp
In most cases to make changes to lists that contain options separated by spaces,
you need to retype the whole list including all the options you want to apply and
excluding all the options you want to remove.
Fortinet documentation
Information about FortiGate products is available from the following FortiGate User
Manual volumes:
• FortiGate QuickStart Guide
Each QuickStart Guide provides the basic information required to connect and
install a FortiGate model.
• FortiGate Installation Guide
Each Installation Guide provides detailed information required to install a FortiGate
model. Includes hardware reference, default configuration, installation procedures,
connection procedures, and basic configuration procedures.
• FortiGate Administration Guide
Each Administration Guide describes how to configure a FortiGate model.
Configuration information includes how to use FortiGate firewall policies to control
traffic flow through the FortiGate unit and how to configure VPN, IPS, antivirus,
web filtering, spam filtering. The administration guide also describes how to use
protection profiles to apply intrusion prevention, antivirus protection, web content
filtering, and spam filtering to traffic passing through the FortiGate unit.
• FortiGate CLI Reference Guide
Describes how to use the FortiGate CLI and contains a reference to all FortiGate
CLI commands.
• FortiGate Log Message Reference Guide
Describes the structure of FortiGate log messages and provides information on all
log messages generated by the FortiGate unit.
• FortiGate High Availability Guide
Contains in-depth information about FortiGate High Availability and the FortiGate
Clustering Protocol (FGCP).
The FortiGate online help also contains procedures for using the FortiGate web-based
manager to configure and manage the FortiGate unit. For a complete list of FortiGate
documentation visit Fortinet Technical Support at http://support.fortinet.com.
Getting started
This section describes unpacking, setting up, and powering on a FortiGate Antivirus
Firewall unit. This section includes:
• Package contents
• Mounting
• Turning the FortiGate unit power on and off
• Connecting to the web-based manager
• Connecting to the command line interface (CLI)
• Factory default FortiGate configuration settings
• Planning the FortiGate configuration
• Next steps
Package contents
The FortiGate-100 package contains the following items:
• FortiGate-100 Antivirus Firewall
• one orange crossover ethernet cable (Fortinet part number CC300248)
• one gray regular ethernet cable (Fortinet part number CC300249)
• one null modem cable (Fortinet part number CC300247)
• FortiGate-100 Quick Start Guide
• CD containing the FortiGate user documentation
• one power cable and AC adapter
Front
Ethernet Cables:
Orange - Crossover
Grey - Straight-through
POWER
INTERNAL EXTERNAL DMZ
STATUS
Null-Modem Cable
(RS-232)
Back
FortiGate-100
STATUS
QuickStart Guide
Mounting
The FortiGate-100 unit can be installed on any stable surface. Make sure that the unit
has at least 1.5 in. (3.75 cm) of clearance on each side to allow for adequate air flow
and cooling.
Dimensions
• 10.25 x 6.13 x 1.75 in. (26 x 15.6 x 4.5 cm)
Weight
• 1.75 lb. (0.8 kg)
Power requirements
• DC input voltage: 12 V
• DC input current: 5 A
Environmental specifications
• Operating temperature: 32 to 104°F (0 to 40°C)
• Storage temperature: -13 to 158°F (-25 to 70°C)
• Humidity: 5 to 95% non-condensing
Note: You can use the web-based manager with recent versions of most popular web
browsers. The web-based manager is fully supported for Internet Explorer version 4.0 or higher.
Note: The following procedure describes how to connect to the CLI using Windows
HyperTerminal software. You can use any terminal emulation program.
The factory default firewall configuration is the same in NAT/Route and Transparent
mode.
Strict To apply maximum protection to HTTP, FTP, IMAP, POP3, and SMTP traffic.
You may not use the strict protection profile under normal circumstances but
it is available if you have problems with viruses and require maximum
screening.
Scan To apply antivirus scanning and file quarantining to HTTP, FTP, IMAP,
POP3, and SMTP content traffic.
Web To apply antivirus scanning and web content blocking to HTTP content
traffic. You can add this protection profile to firewall policies that control
HTTP traffic.
Unfiltered To apply no scanning, blocking or IPS. Use if you do not want to apply
content protection to content traffic. You can add this protection profile to
firewall policies for connections between highly trusted or highly secure
networks where content does not need to be protected.
NAT/Route mode
In NAT/Route mode, the FortiGate unit is visible to the network. Like a router, all its
interfaces are on different subnets. The following interfaces are available in
NAT/Route mode:
• External is the interface to the external network (usually the Internet).
• Internal is the interface to the internal network.
• DMZ is the interface to the DMZ network.
You can add firewall policies to control whether communications through the
FortiGate unit operate in NAT or Route mode. Firewall policies control the flow of
traffic based on the source address, destination address, and service of each packet.
In NAT mode, the FortiGate unit performs network address translation before it sends
the packet to the destination network. In Route mode, there is no address translation.
You typically use NAT/Route mode when the FortiGate unit is operating as a gateway
between private and public networks. In this configuration, you would create NAT
mode firewall policies to control traffic flowing between the internal, private network
and the external, public network (usually the Internet).
If you have multiple internal networks, such as a DMZ network in addition to the
internal, private network, you could create route mode firewall policies for traffic
flowing between them.
Internal network
192.168.1.3
FortiGate-100 Unit Internal
in NAT/Route mode 192.168.1.1
External
204.23.1.5 Route mode policies
Internet INTERNAL EXTERNAL DMZ
POWER controlling traffic between
STATUS
internal networks.
FortiGate-100 Unit
External in NAT/Route mode
204.23.1.5
Internal network
Internet INTERNAL EXTERNAL DMZ
POWER
STATUS
192.168.1.3
DMZ Internal
64.83.32.45 192.168.1.1
Transparent mode
In Transparent mode, the FortiGate unit is invisible to the network. Similar to a
network bridge, all FortiGate interfaces must be on the same subnet. You only have to
configure a management IP address so that you can make configuration changes.
The management IP address is also used for antivirus and attack definition updates.
You typically use the FortiGate unit in Transparent mode on a private network behind
an existing firewall or behind a router. The FortiGate unit performs firewall functions,
IPSec VPN, virus scanning, IPS, web content filtering, and Spam filtering.
STATUS
192.168.1.3
(firewall, router) External 192.168.1.2 Internal
Management IP
You can connect up to three network segments to the FortiGate unit to control traffic
between these network segments.
• External can connect to the external firewall or router.
• Internal can connect to the internal network.
• DMZ can connect to another network segment.
Configuration options
Once you have selected Transparent or NAT/Route mode operation, you can
complete the configuration plan and begin to configure the FortiGate unit.
You can use the web-based manager GUI, the command line interface (CLI) for the
basic configuration of the FortiGate unit. You can use the web-based manager setup
wizard for easy configuration of a few more advanced settings.
Web-based manager
You can configure most basic and advanced setting from the web-based manager
GUI.
CLI
If you are configuring the FortiGate unit to operate in NAT/Route mode, you can add
the administration password and all interface addresses using the CLI. You can also
add DNS server IP addresses and a default route for the external interface.
Additionally, you can use the CLI to configure the external interface for either a
manual (static) or a dynamic (DHCP or PPPoE) address. You can change the
configuration of the FortiGate DHCP server to supply IP addresses for the computers
on your internal network.
If you are configuring the FortiGate unit to operate in Transparent mode, you can use
the CLI to switch to Transparent mode. Then you can add the administration
password, the management IP address and gateway, and the DNS server addresses.
Setup wizard
If you are configuring the FortiGate unit to operate in NAT/Route mode (the default),
you can use the setup wizard to:
• add the administration password
• configure the internal interface address
• choose either a manual (static) or a dynamic (DHCP or PPPoE) address for the
external interface
• add a default route for the external interface
• add the DNS server IP addresses
• add the DHCP server settings and IP addresses
• add various internal server IP addresses including web, IMAP, POP3, SMTP, and
FTP servers
• set the antivirus protection to high, medium, or none
If you are configuring the FortiGate unit to operate in Transparent mode, you can
switch to Transparent mode from the web-based manager and then use the setup
wizard to add the administration password, the management IP address and gateway,
and the DNS server addresses.
Next steps
Now that your FortiGate unit is operating, you can proceed to configure it to connect to
networks:
• If you are going to operate the FortiGate unit in NAT/Route mode, go to
“NAT/Route mode installation” on page 25.
• If you are going to operate the FortiGate unit in Transparent mode, go to
“Transparent mode installation” on page 37.
• If you are going to operate the or more FortiGate units in HA mode, go to “High
availability installation” on page 45.
• the web-based manager GUI is a complete interface for configuring most settings.
See “Using the web-based manager” on page 26.
• the command line interface (CLI) is a complete text-based interface for configuring
all settings. See “Using the command line interface” on page 28.
• the setup wizard provides easy, fast configuration of the most basic settings to get
the unit up and running quickly. See “Using the setup wizard” on page 31.
The method that you choose depends on the complexity of the configuration, access
and equipment, and the type of interface you are most comfortable using.
Administrator Password:
IP: _____._____._____._____
Internal
Netmask: _____._____._____._____
IP: _____._____._____._____
External
Netmask: _____._____._____._____
IP: _____._____._____._____
DMZ
Netmask: _____._____._____._____
Default Gateway: _____._____._____._____
Interface connected to
external network (usually
external):
Network settings A default route consists of a default gateway and the name of the
interface connected to the external network (usually the Internet).
The default gateway directs all non-local traffic to this interface and
to the external network.
Primary DNS Server: _____._____._____._____
Secondary DNS Server: _____._____._____._____
User name:
Password:
4 Select OK.
To configure interfaces
• For manual addressing, enter the IP address and netmask for the interface.
• For DHCP addressing, select DHCP and any required settings.
• For PPPoE addressing, select PPPoE, and enter the username and password and
any other required settings.
For information about how to configure these and other interface settings, see the
FortiGate online help or the FortiGate Administration Guide.
5 Select OK.
Note: If you change the IP address of the interface you are connecting to, you must connect
through a web browser again using the new address. Browse to https:// followed by the new IP
address of the interface. If the new IP address of the interface is on a different subnet, you may
have to change the IP address of your computer to the same subnet.
4 Select OK.
To configure interfaces
3 Set the IP address and netmask of the external interface to the external IP address
and netmask that you recorded in Table 5 on page 26.
4 Use the same syntax to set the IP address of each FortiGate interface as required.
The CLI lists the IP address, netmask, and other settings for each of the FortiGate
interfaces.
Example
Add a default route to configure where the FortiGate unit sends traffic that should be
sent to an external network (usually the Internet). Adding the default route also
defines which interface is connected to an external network. The default route is not
required if the interface connected to the external network is configured using DHCP
or PPPoE.
Example
If the default gateway IP is 204.23.1.2 and this gateway is connected to the external
interface:
If you are configuring the FortiGate unit to operate in NAT/Route mode (the default),
you can use the setup wizard to:
Table 7 lists the additional settings that you can configure with the setup wizard. See
Table 5 on page 26 and Table 6 on page 26 for other settings.
2 Follow the instructions on the wizard pages and use the information that you gathered
in Table 5 on page 26 and Table 7 on page 31 to fill in the wizard fields.
3 Select the Next button to step through the wizard pages.
4 Confirm the configuration settings, and then select Finish and Close.
Note: If you use the setup wizard to configure internal server settings, the FortiGate unit adds
port forwarding virtual IPs and firewall policies for each server. For example, for each server
located on the Internal network the FortiGate unit adds an External->Internal firewall policy.
Note: You can also connect both the external and DMZ interfaces to different Internet
connections to provide a redundant connection to the Internet.
Web Server
Mail Server
Hub or Switch
Internal
Hub or Switch
FortiGate-100 External
Public Switch
or Router
Internet
Next steps
You can use the following information to configure FortiGate system time, to register
the FortiGate unit, and to configure antivirus and attack definition updates.
Refer to the FortiGate Administration Guide for complete information on configuring,
monitoring, and maintaining the FortiGate unit.
3 Enter the IP address or domain name of the NTP server that the FortiGate unit can
use to set its time and date.
4 Specify how often the FortiGate unit should synchronize its time with the NTP server.
5 Select Apply.
Administrator Password:
IP: _____._____._____._____
Netmask: _____._____._____._____
Default Gateway: _____._____._____._____
Management IP
The management IP address and netmask must be valid for the network
from which you will manage the FortiGate unit. Add a default gateway if the
FortiGate unit must connect to a router to reach the management
computer.
Primary DNS Server: _____._____._____._____
DNS Settings
Secondary DNS Server: _____._____._____._____
2 Set the management IP address and netmask to the IP address and netmask that you
recorded in Table 8 on page 38. Enter:
Example
Example
2 Set the default route to the default gateway that you recorded in Table 8 on page 38.
Enter:
Example
If the default gateway IP is 204.23.1.2 and this gateway is connected to port2:
config router static
edit 1
set dst 0.0.0.0 0.0.0.0
set gateway 204.23.1.2
set device port2
end
Hub or Switch
Internal
Hub or Switch
FortiGate-100 External
Public Switch
or Router
Internet
Next steps
You can use the following information to configure FortiGate system time, to register
the FortiGate unit, and to configure antivirus and attack definition updates.
For effective scheduling and logging, the FortiGate system date and time must be
accurate. You can either manually set the system date and time or configure the
FortiGate unit to automatically keep its time correct by synchronizing with a Network
Time Protocol (NTP) server.
2 Select Refresh to display the current FortiGate system date and time.
4 Optionally, select Automatically adjust clock for daylight saving changes check box.
5 Select Set Time and set the FortiGate system date and time.
6 Set the hour, minute, second, month, day, and year as required.
7 Select Apply.
2 Select Synchronize with NTP Server to configure the FortiGate unit to use NTP to
automatically set the system time and date.
3 Enter the IP address or domain name of the NTP server that the FortiGate unit can
use to set its time and date.
4 Specify how often the FortiGate unit should synchronize its time with the NTP server.
5 Select Apply.
After purchasing and installing a new FortiGate unit, you can register the unit by going
to the System Update Support page, or using a web browser to connect to
http://support.fortinet.com and selecting Product Registration.
To register, enter your contact information and the serial numbers of the FortiGate
units that you or your organization have purchased. You can register multiple
FortiGate units in a single session without re-entering your contact information.
Active-Active Load balancing and failover HA. Each FortiGate unit in the
HA cluster actively processes connections and monitors the
status of the other FortiGate units in the cluster. The
primary FortiGate unit in the cluster controls load balancing.
Mode Active-Passive Failover HA. The primary FortiGate unit in the cluster
processes all connections. All other FortiGate units in the
cluster are passively monitor the cluster status and remain
synchronized with the primary FortiGate unit.
All members of the HA cluster must be set to the same HA mode.
The group ID range is from 0 to 63. All members of the HA cluster must have
the same group ID.
When the FortiGate units in the cluster are switched to HA mode, all of the
interfaces of all of the units in the cluster get the same virtual MAC address.
This virtual MAC address is set according to the group ID.
Group ID MAC Address
0 00-09-0f-06-ff-00
1 00-09-0f-06-ff-01
Group ID
2 00-09-0f-06-ff-02
3 00-09-0f-06-ff-03
…
63 00-09-0f-06-ff-3f
If you have more than one HA cluster on the same network, each cluster
should have a different group ID. If two clusters on the same network have
same group ID, the duplicate MAC addresses cause addressing conflicts on
the network.
The unit with the highest priority becomes the primary unit in the cluster. The
unit priority range is 0 to 255. The default unit priority is 128.
Set the unit priority to a higher value if you want the FortiGate unit to be the
Unit priority primary cluster unit. Set the unit priority to a lower value if you want the
FortiGate unit to be a subordinate unit in the cluster. If all units have the
same priority, the FortiGate unit with the highest serial number becomes the
primary cluster unit.
Override You can configure a FortiGate unit to always become the primary unit in the
Master cluster by giving it a high priority and by selecting Override master.
Internal Network
Internal WAN1
INTERNAL
LINK 100 LINK 100 LINK 100 LINK 100 LINK 100 LINK 100 LINK 100
DMZ
Router
INTERNAL
LINK 100 LINK 100 LINK 100 LINK 100 LINK 100 LINK 100 LINK 100
Internal WAN1
Internet
Index
C IP addresses
configuring from the CLI 39
CLI 6
configuring IP addresses 39 M
configuring NAT/Route mode 28
connecting to 14 management IP address
cluster transparent mode 40
connecting 49, 51
command line interface 6
N
connect NAT/Route mode
cluster 49, 51 configuration from the CLI 28
connecting NTP 34, 43
to network 32, 42 NTP server 34, 43
web-based manager 14
customer service 10 P
power requirements 12
D powering on 13
default gateway
configuring (Transparent mode) 40 S
set time 34, 43
E setup wizard 26, 31, 38, 41
environmental specifications 13 starting 27, 32, 38, 41
synchronize with NTP server 34, 43
F
T
firewall setup wizard 6, 26, 31, 38, 41
starting 27, 32, 38, 41 technical support 10
Fortinet customer service 10 time zone 34, 43
Transparent mode
H changing to 39
configuring the default gateway 40
HA management IP address 40
configuring FortiGate units for HA operation 45
connecting an HA cluster 49, 51 W
High availability 45
HTTPS 6 web-based manager 6
connecting to 14
introduction 6
I
wizard
internal network setting up firewall 26, 31, 38, 41
configuring 34 starting 27, 32, 38, 41