Fortinet 50A/50B Benutzerhandbuch

Seite von 84
FortiGate-50A/50B, FortiWiFi-50B and FortiGate-100 FortiOS 3.0 MR4 Install Guide
28
01-30004-0265-20070831
Factory defaults
Factory default DHCP server configuration
Table 7: FortiGate DHCP Server default configuration
Factory default NAT/Route mode network configuration
When the FortiGate unit is first powered on, it is running in NAT/Route mode and 
has the basic network configuration listed in 
Table 8 on page 28
. This 
configuration enables you to connect to the FortiGate unit web-based manager 
and establish the configuration required to connect the FortiGate unit to the 
network. In 
Table 8 on page 28
, HTTPS administrative access means you can 
connect to the web-based manager using HTTPS protocol through this interface. 
Ping administrative access means this interface responds to ping requests.
With the FortiGate-50 series, you can quickly configure the internal network and the 
FortiGate unit by using the factory default DHCP server settings. See 
50A
Name
internal_dhcp_server
Interface 
Internal
Default Gateway
192.168.1.99
IP Range
192.168.1.110 – 192.168.1.210
Network Mask
255.255.255.0
Lease Time
7 days
DNS Server 1
192.168.1.99
Table 8: Factory default NAT/Route mode network configuration
Administrator 
account
User name:
admin
Password:
(none)
Internal interface
IP:
192.168.1.99
Netmask:
255.255.255.0
Administrative Access:
HTTP, HTTPS, 
Ping
External interface 
(FortiGate-50A/100)
WAN1 (FortiGate-50B/ 
WiFi-50B)
IP:
192.168.100.99
Netmask:
255.255.255.0
Administrative Access:
Ping
WAN2 (FortiGate-50B/ 
WiFi-50B)
IP:
192.168.101.99
Netmask:
255.255.255.0
Administrative Access:
Ping
DMZ interface 
(FortiGate-50A/100)
IP:
10.10.10.1
Netmask:
255.255.255.0
Administrative Access:
HTTPS, Ping
WLAN interface 
(FortiWiFi-50B)
IP:
10.10.80.1
Netmask:
255.255.255.0
Administrative Access:
Ping