EasyManua.ls Logo

Fortinet FortiGate FortiGate-3016B - Factory defaults; NAT;Route mode default network configuration

Fortinet FortiGate FortiGate-3016B
66 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Factory defaults NAT/Route mode default network configuration
FortiGate-3016B, FortiGate-3600A and FortiGate-3810A FortiOS 3.0 MR5 Install Guide
01-30005-0343-20071113 25
Factory defaults
The FortiGate unit ships with a factory default configuration. The default
configuration enables you to connect to and use the FortiGate web-based
manager to configure the FortiGate unit onto the network. To configure the
FortiGate unit on to the network you add an administrator password, change the
network interface IP addresses, add DNS server IP addresses, and, if required,
configure basic routing.
If you plan to operate the FortiGate unit in Transparent mode, you can switch to
Transparent mode from the factory default configuration and then configure the
FortiGate unit onto the network in Transparent mode.
The factory default firewall configuration includes a single network address
translation (NAT) policy that allows users on your internal network to connect to
the external network and stops users on the external network from connecting to
the internal network. You can add more firewall policies to provide more control of
the network traffic passing through the FortiGate unit.
The factory default protection profiles can be used to apply different levels of
antivirus protection, web content filtering, spam filtering, and IPS to the network
traffic controlled by firewall policies.
The following topics are included in this section:
NAT/Route mode default network configuration
Transparent mode default network configuration
Default protection profiles
Default protection profiles
Restoring the default settings
NAT/Route mode default network configuration
When the FortiGate unit is first powered on, it is running in NAT/Route mode and
has the basic network configuration listed in Table 5 on page 26. This
configuration enables you to connect to the FortiGate unit web-based manager
and establish the configuration required to connect the FortiGate unit to the
network. In Table 5 on page 26, HTTPS administrative access means you can
connect to the web-based manager using HTTPS protocol through this interface.
Ping administrative access means this interface responds to ping requests.

Table of Contents

Related product manuals