EasyManua.ls Logo

Fortinet FortiGate FortiGate-500 - Transparent Mode; Configuration Options

Fortinet FortiGate FortiGate-500
60 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Getting started Planning the FortiGate configuration
FortiGate-500 Installation Guide 01-28004-0023-20040830 23
Figure 6: Example NAT/Route multiple internet connection configuration
Transparent mode
In Transparent mode, the FortiGate unit is invisible to the network. Similar to a
network bridge, all FortiGate interfaces must be on the same subnet. You only have to
configure a management IP address so that you can make configuration changes.
The management IP address is also used for antivirus and attack definition updates.
You typically use the FortiGate unit in Transparent mode on a private network behind
an existing firewall or behind a router. The FortiGate unit performs firewall functions,
IPSec VPN, virus scanning, IPS, web content filtering, and Spam filtering.
Figure 7: Example Transparent mode network configuration
You can connect up to 11 network segments to the FortiGate unit to control traffic
between these network segments.
External can connect to the external firewall or router.
Internal can connect to the internal network.
HA can connect to other FortiGate-500s if you are installing an HA cluster.
DMZ and ports 1 to 8 can connect to other network segments.
Configuration options
Once you have selected Transparent or NAT/Route mode operation, you can
complete the configuration plan and begin to configure the FortiGate unit.
You can use the web-based manager GUI, the control buttons and LCD, or the
command line interface (CLI) for the basic configuration of the FortiGate unit. You can
use the web-based manager setup wizard for easy configuration of a few more
advanced settings.
FortiGate-500 Unit
in NAT/Route mode
Route mode policies
controlling traffic between
internal networks.
Internal network
DMZ network
Internal
192.168.1.1
DMZ
10.10.10.2
192.168.1.3
10.10.10.23
NAT mode policies controlling
traffic between internal and
external networks.
External
204.23.1.5
Port 1
64.83.32.45
Internet
Esc Enter
HADMZINTERNAL EXTERNAL
1234 5 678
Esc Enter
HADMZINTERNAL EXTERNAL
1234 5 678
Internal network
10.10.10.3
FortiGate-500 Unit
in Transparent mode
10.10.10.1
Management IP
External
Internal
10.10.10.2
Transparent mode policies
controlling traffic between
internal and external networks
204.23.1.5
(firewall, router)
Gateway to
public network
Internet

Table of Contents

Other manuals for Fortinet FortiGate FortiGate-500

Related product manuals