Fortinet FortiGate-5001FA2 Verweisanleitung

Seite von 2
PWR ACC
STA IPM
CONSOLE
USB
3
4
1
2
5
6
7
8
3 and 4
Gigabit Fiber
1 and 2
Gigabit Fiber
Accelerated
5 6 7 8
10/100/1000 Copper
RS-232 Serial
Connection
USB
Extraction
Lever
Mounting
Knot
Mounting
Knot
Extraction
Lever
Lockdown
Thumbscrew
4 1000Base-SX
SFP Transceivers
QuickStart Guide
FortiGate-5001FA2
QuickStart Guide
Copyright 2005 Fortinet Incorporated. All rights reserved.
Trademarks
Products mentioned in this document are trademarks.
01-28005-0043-20051110
RAM DIMs
PWR ACC
STA IPM
CONSOLE
USB
3
4
1
2
5
6
7
8
PWR
ACC
STA IPM
CONSOLE
USB
3
4
1
2
5
6
7
8
Connector Type
Speed
Protocol Description
1 and 2
LC SFP 1000Base-SX Ethernet
Multimode fiber optic connections to gigabit optical 
networks.
3 and 4
LC SFP 1000Base-SX Ethernet
Enhanced small packet performance multimode fiber 
optic connections to gigabit optical networks.
5, 6, 7, 8
RJ-45
1000Base-T
Ethernet
Copper gigabit connection to 10/100/1000 copper 
networks.
CONSOLE
DB-9
9600 bps
RS-232 
serial
Serial connection to the command line interface.
FortiGate-5001FA2 normal operating LED indicators
LED
State
Description
PWR
Green
The FortiGate-5001FA2 module is on.
STA
Green
Normal operation.
Red
The FortiGate-5001FA2 is booting or a fault condition exists.
IPM
Blue
The FortiGate-5001FA2 is ready to be hot-swapped (or card is ready 
to be removed from the chassis).
Flashing 
Blue
The FortiGate-5001FA2is changing from hot swap to running mode or 
from running mode to hot swap.
Off
Normal operation. The FortiGate-5001FA2 module is in contact with 
the backplane of the FortiGate-5000 series chassis.
1, 2, 3, 4
Green
The correct optical fiber patch cable is connected to the gigabit fiber 
interface.
Flashing
Network activity at the gigabit fiber interface.
5, 6, 7, 8
Green
The correct cable is connected to the copper 10/100/1000 interface 
and the connected equipment has power.
Flashing
Network activity at this interface.
Amber
The interface is connected at 1000 Mbps.
Install the FortiGate-5001FA2 module into a FortiGate 5000 series chassis and connect the 
network cables. Always wear an ESD wrist strap or ankle strap to avoid static discharges.
NAT/Route mode
In NAT/Route mode, each FortiGate-5001FA2 module is visible to the networks that it is 
connected to. All of its interfaces are on different subnets. Each interface that is 
connected to a network must be configured with an IP address that is valid for that 
network.
You would typically use NAT/Route mode when the FortiGate-5001FA2 module is 
deployed as a gateway between private and public networks. In its default NAT/Route 
mode configuration, the module functions as a firewall. Firewall policies control 
communications through the FortiGate-5001FA2 module. No traffic can pass through 
the FortiGate-5001FA2 module until you add firewall policies.
In NAT/Route mode, firewall policies can operate in NAT mode or in Route mode. In 
NAT mode, the FortiGate-5001FA2 module performs network address translation 
before IP packets are sent to the destination network. In route mode, no translation 
takes place.
Transparent mode
In Transparent mode, the FortiGate-5001FA2 module is invisible to the network. All of 
its interfaces are on the same subnet. You only have to configure a management IP 
address so that you can make configuration changes. 
You would typically use the FortiGate-5001FA2 module in Transparent mode on a 
private network behind an existing firewall or behind a router. In its default Transparent 
mode configuration, the unit functions as a firewall. No traffic can pass through the 
FortiGate-5001FA2 module until you add firewall policies. 
You can connect up to eight network segments to the FortiGate-5001FA2 module to 
control traffic between these network segments.
FortiGate-5001FA2 Module
in NAT/Route mode
Route mode policies
controlling traffic between
internal networks.
Internal network
DMZ network
Port 4
192.168.1.99
Port 5
10.10.10.1
192.168.1.3
10.10.10.2
Port 3
204.23.1.5
NAT mode policies controlling
traffic between internal and
external networks.
Internet
PWR ACC
STA IPM
CONSOLE
USB
3
4
1
2
5
6
7
8
Internal network
192.168.1.3
FortiGate-5001FA2 Module
in Transparent mode
192.168.1.2
Management IP
Port 1
Port 2
192.168.1.1
Transparent mode policies 
controlling traffic between 
internal and external networks
204.23.1.5
(firewall, router)
Gateway to
public network
Internet
PWR ACC
STA IPM
CONSOLE
USB
3
4
1
2
5
6
7
8
Before beginning to configure the FortiGate-5001FA2 module, you need to plan how to integrate 
the unit into your network. Your configuration plan is dependent upon the operating mode that you 
select: NAT/Route mode (the default) or Transparent mode.
Web-based manager and 
Setup Wizard
Using the Setup Wizard you can configure basic 
configuration settings by following the wizard pages 
and filling in the information required.
The FortiGate web-based manager is an easy to 
use management tool. 
Use it to configure the administrator password, 
interface addresses, the default gateway address, 
and the DNS server addresses. To configure advanced settings, see the online help 
and Documentation CD-ROM.
Requirements: 
An Ethernet connection between the FortiGate-5001FA2 and a management 
computer. 
Internet Explorer version 6.0 or higher on the management computer. 
Command Line Interface (CLI)
The CLI is a full-featured management tool. 
Use it to configure the administrator password, the 
interface addresses, the default gateway address, 
and the DNS server addresses. To configure 
advanced settings, see the FortiGate CLI 
Reference Guide on the Documentation CD-ROM.
Requirements: 
The serial connection between the 
FortiGate-5001FA2 module and a 
management computer. 
A terminal emulation application (HyperTerminal for Windows) on the management 
computer. 
Choose between two different tools to configure the FortiGate-5001FA2 module. 
QuickStart Guide
FortiGate-5001FA2
Check that the package contents are complete. 
To install the FortiGate-5001FA2 module
1. Install the RAM DIMMs into the module by pushing the RAM DIM gently until 
the locking mechanism locks down the DIM.
2. Extend the extraction levers on the module.
3. Carefully slide the module into a chassis slot. 
The module is seated 
properly when it touches the chassis up to the extraction levers.
4. Lock the extraction levers by pushing them towards each other.
5. If power is supplied to the chassis, the FortiGate-5001FA2 module powers on 
when the extraction levers are closed.
6. Tighten the mounting knots on the left and right sides of the front panel.
7. The power switch is built-in to the left side extraction lever. Ensure that the 
lockdown thumbscrew is tightened to ensure that power is not interrupted.
8. Install SFP transceivers and connect the network cables.
Checking the package contents
Checking the package contents
1
Installing the FortiGate-5001FA2
2
Planning the configuration
3
Choosing a configuration tool
4
© Copyright 2005 Fortinet Incorporated. All rights reserved. 
Trademarks 
Products mentioned in this document are trademarks or registered trademarks of their respective holders.
Regulatory Compliance
FCC Class A Part 15 CSA/CUS
23 November 2005
For technical support please visit http://www.fortinet.com.
PWR ACC
STA IPM
CONSOLE
USB
3
4
1
2
5
6
7
8
01-28011-0273-20051123
Refer to the Documentation CD-ROM for information on how to control traffic, and how to configure HA, antivirus protection, Web content filtering, Spam filtering, intrusion 
prevention (IPS), and virtual private networking (VPN).
 The blade ships with 4 Small Formfactor Pluggable (SFP) connectors. You can optionally use the 
1000Base-LX (single-mode fiber) or 1000Base-TX (copper cable) SFP transceivers.