Fortinet fortigate-200a Installationsanweisungen

Seite von 68
Factory defaults 
FortiGate-200A, FortiGate-300A, FortiGate-400A, and FortiGate-500A FortiOS 3.0 MR4 Install Guide
01-30004-0268-20070712
27
Factory defaults
The FortiGate unit ships with a factory default configuration. The default 
configuration allows you to connect to and use the FortiGate web-based manager 
to configure the FortiGate unit onto the network. To configure the FortiGate unit to 
the network, you add an administrator password, change the network interface IP 
addresses, add DNS server IP addresses, and, if required, configure basic 
routing. 
If you plan to operate the FortiGate unit in Transparent mode, you can switch to 
Transparent mode from the factory default configuration and then configure the 
FortiGate unit onto the network in Transparent mode. 
Once you complete the network configuration, you can perform additional 
configuration tasks such as setting system time, configuring virus and attack 
definition updates, and registering the FortiGate unit. 
The factory default firewall configuration includes a single network address 
translation (NAT) policy that allows users on your internal network to connect to 
the external network, and stops users on the external network from connecting to 
the internal network. You can add more firewall policies to provide more control of 
the network traffic passing through the FortiGate unit.
The factory default protection profiles can be used to apply different levels of 
antivirus protection, web content filtering, spam filtering, and IPS to the network 
traffic that is controlled by firewall policies. 
The following topics are included in this section:
Factory default NAT/Route mode network configuration
When the FortiGate unit is first powered on, it is running in NAT/Route mode and 
has the basic network configuration listed in 
configuration allows you to connect to the FortiGate unit web-based manager and 
establish the configuration required to connect the FortiGate unit to the network. 
In 
, HTTPS administrative access means you can connect to 
the web-based manager using HTTPS protocol through this interface. Ping 
administrative access means this interface responds to ping requests.