Fortinet fortigate-500 User Guide

Page of 2
Esc
Enter
HA
DMZ
INTERNAL EXTERNAL
1
2
3
4
5
6
7
8
Connector Type
Speed
Protocol Description
Internal
RJ-45
10/100Base-T Ethernet
Connection to the internal network.
External
RJ-45
10/100Base-T Ethernet
Connection to the Internet.
DMZ
RJ-45
10/100Base-T Ethernet
Optional connection to a DMZ network.
HA
RJ-45
10/100Base-T Ethernet
Optional connection to other FortiGate-500 units for 
high availability (HA).
1 to 8
RJ-45
10/100Base-T Ethernet
Optional connections to other networks.
CONSOLE
DB-9
9,600 bps
RS-232 
serial
Optional connection to the management computer. 
Provides access to the command line interface (CLI).
FortiGate-500 LED indicators
Factory defaults
LED
State
Description
Power
Green
The FortiGate unit is powered on.
Off
The FortiGate unit is powered off.
Status
Green
The FortiGate unit is functioning normally.
Off
The FortiGate unit has a problem or is powered off.
Internal
External
DMZ
HA
1 to 8
Amber
The correct cable is in use and the connected 
equipment has power.
Flashing 
Amber
Network activity at this interface.
Green
The interface is connected at 100 Mbps.
Off
No link established.
Interface
Internal
External
DMZ
192.168.1.99
192.168.100.99
10.10.10.1
HA
0.0.0.0
NAT/Route mode IP addresses
IP
Transparent mode IP address
admin  
(none)
Administrator account settings
User Name
Password
MANAGEMENT IP   10.10.10.1
Interface
IP
1 to 8
0.0.0.0
Connect the FortiGate-500 unit to a power outlet and to the internal and external networks. 
NAT/Route mode
In NAT/Route mode, each FortiGate-500 unit is visible to the networks that it is 
connected to. All of its interfaces are on different subnets. Each interface that is 
connected to a network must be configured with an IP address that is valid for that 
network.
You would typically use NAT/Route mode when the FortiGate-500 unit is deployed as a 
gateway between private and public networks. In its default NAT/Route mode 
configuration, the unit functions as a firewall. Firewall policies control communications 
through the FortiGate-500 unit. No traffic can pass through the FortiGate-500 unit until 
you add firewall policies.
In NAT/Route mode, firewall policies can operate in NAT mode or in Route mode. In 
NAT mode, the FortiGate-500 unit performs network address translation before IP 
packets are sent to the destination network. In Route mode, no translation takes place.
Transparent mode
In Transparent mode, the FortiGate-500 unit is invisible to the network. All of its 
interfaces are on the same subnet. You only have to configure a management IP 
address so that you can make configuration changes. 
You would typically use the FortiGate-500 unit in Transparent mode on a private 
network behind an existing firewall or behind a router. In its default Transparent mode 
configuration, the unit functions as a firewall. No traffic can pass through the 
FortiGate-500 unit until you add firewall policies. 
You can connect up to 12 network segments to the FortiGate-500 unit to control traffic 
between these network segments.
FortiGate-500 Unit
in NAT/Route mode
Route mode policies
controlling traffic between
internal networks.
Internal network
DMZ network
Internal
192.168.1.99
DMZ
10.10.10.1
192.168.1.3
10.10.10.2
External
204.23.1.5
NAT mode policies controlling
traffic between internal and
external networks.
Internet
Esc
Enter
HA
DMZ
INTERNAL EXTERNAL
1
2
3
4
5
6
7
8
Esc
Enter
HA
DMZ
INTERNAL EXTERNAL
1
2
3
4
5
6
7
8
Internal network
10.10.10.3
FortiGate-500 Unit
in Transparent mode
10.10.10.1
Management IP
External
Internal
10.10.10.2
Transparent mode policies 
controlling traffic between 
internal and external networks
204.23.1.5
(firewall, router)
Gateway to
public network
Internet
Before beginning to configure the FortiGate-500, you need to plan how to integrate the unit into 
your network. Your configuration plan is dependent upon the operating mode that you select: 
NAT/Route mode (the default) or Transparent mode.
Web-based 
manager & 
Setup Wizard
The FortiGate web-based 
manager Setup Wizard 
guides you through the 
initial configuration steps. 
Use it to configure the administrator password, the 
internal, external and DMZ interface addresses, the 
default gateway address, and the DNS server 
addresses. Optionally, use the Setup Wizard to 
configure the internal server settings for NAT/Route 
mode. 
Requirements: 
The Ethernet connection between the FortiGate-500 
and management computer. 
Internet Explorer version 6.0 or higher on the 
management computer. 
Command Line 
Interface (CLI)
The CLI is a full-featured 
management tool. 
Use it to configure the 
administrator password, 
the interface addresses, 
the default gateway 
address, and the DNS 
server addresses. To 
configure advanced settings, see the Documentation 
CD-ROM.
Requirements: 
The serial connection between the FortiGate-500 
and management computer. 
A terminal emulation application (HyperTerminal for 
Windows) on the management computer. 
Control 
Buttons & 
LCD
The control buttons and LCD are located on the front 
panel of the FortiGate-500. Use them to configure the 
internal, external and DMZ interface addresses, and the 
default gateway address. To configure the other 
interface addresses, and the DNS server addresses, 
use the web-based manager or the CLI.
Requirements: 
Physical access to the FortiGate-500. 
Choose among three different tools to configure the FortiGate-500. 
QuickStart Guide
FortiGate-500
Check that the package contents are complete. 
Power Cable
Rack-Mount Brackets
Null-Modem Cable
(RS-232)
Documentation
Ethernet Cables:
Orange - Crossover
Grey - Straight-through
USER MANUAL
FortiGate-500
QuickStart Guide
Copyright 2003 Fortinet Incorporated. All rights reserved.
Trademarks
Products mentioned in this document are trademarks.
Front
Back
Esc
Enter
HA
DMZ
INTERNAL EXTERNAL
1
2
3
4
5
6
7
8
1 to 8
Interface
LCD
Control
Buttons
Internal,External,DMZ
HA Interface
Removable
Hard Drive
Power
Connection
RS-232 Serial
Connection
Status
LED
Power
Switch
Power
LED
Esc
Enter
HA
DMZ
INTERNAL EXTERNAL
1
2
3
4
5
6
7
8
1. Place the unit on a stable surface or mount it in a 19-inch rack. It requires 
1.5 inches (3.75 cm) clearance on each side to allow for cooling. 
2. Make sure the power switch on the back of the unit is turned off before 
connecting the power and network cables.
3. MAIN MENU appears when the unit is up and running.
Esc
Enter
HA
DMZ
INTERNAL EXTERNAL
1
2
3
4
5
6
7
8
Power cable connects to power outlet
Optional null modem cable connects 
to serial port on management computer
Straight-through Ethernet cable connects to Internet (public switch, router or modem)
Straight-through Ethernet cable connects to DMZ network
Straight-through Ethernet cable connects to another FortiGate-500 for HA
 
Straight-through Ethernet cable connects
to LAN or switch on internal network
Crossover Ethernet cable connects to
management computer on internal network
or
Straight-through Ethernet cables connect to other networks
Checking the package contents
Checking the package contents
1
Connecting the FortiGate-500
2
Planning the configuration
3
Choosing a configuration tool
4
© Copyright 2004 Fortinet Incorporated. All rights reserved. 
Trademarks 
Products mentioned in this document are trademarks or registered trademarks of their respective holders.
Regulatory Compliance
FCC Class A Part 15 CSA/CUS
03 November 2004
For technical support please visit http://www.fortinet.com.
Refer to the Documentation CD-ROM for information on how to control traffic, and how to configure HA, antivirus protection, Web content filtering, Spam filtering, intrusion 
prevention (IPS), and virtual private networking (VPN).
01-28005-0037-20041103