Вы находитесь на странице: 1из 2

LED State Description QuickStart Guide

Green The unit is on.


Power FortiGate-200B-POE
Off The unit is off.
Green flashing The unit is starting up.
Status
Green The unit is running normally.
HA Green The unit is being used in an HA cluster.
Red A critical error has occurred.
Alarm Amber A minor error has occurred.
Off No errors detected.
Green POE is in use at that port.
POE
1/2 3/4 5/6 7/8 9 / 10 11 / 12 13 / 14 15 / 16
FSM

Off POE is not in use at that port.


1 3 5 7
STATUS
ALARM READY 2 4 6 8
FortiGate 200B-POE
HA

Ready Green Indicates that POE is available.


POWER
CONSOLE USB POE PORTS FortiASIC NP2 Powered USB

Link/ Green Port is online.


Activity
Flashing Port is sending or receiving data.
Ports 1 to 8
Speed Off Connected at 10 Mbps.
Amber Connected at 100 Mbps.
Link/ Green Port is online.
Activity © Copyright 2010 Fortinet Incorporated. All rights reserved.
Flashing Port is sending or receiving data. Products mentioned in this document are trademarks or registered trademarks
of their respective holders.
Ports 9 to 16 Speed Green Connected at 1000Mbps. Regulatory Compliance
Amber Connected at 100 Mbps. FCC Class B Part 15 CSA/CUS 01-413-117374-20100120
29 March 2010
Off Connected at 10 Mbps.

Package Contents
Interface Type Speed Protocol Description
Console RJ-45 Ethernet Connection to the management computer. Provides access to the command line interface (CLI).
Ports 1 to 8 RJ-45 10/100 Base-T Ethernet POE source capable ports. Supports up to 15W POE devices.
Ports 9 to 12 RJ-45 10/100/1000 Base-T Ethernet Non-accelerated ports.
Ports 13 to 16 RJ-45 10/100/1000 Base-T Ethernet ASIC accelerated ports.
USB USB USB Two USB 2.0 ports for firmware backup and installation. One USB 2.0 Client port for management.
FSM FSM Fortinet Storage Module. One SATA hard disk drive slot supports 2.5 inch solid state drives.

QuickStart Guide
FortiGate-30B

1/2 3/4 5/6 7/8 9 / 10 11 / 12 13 / 14 15 / 16


FSM
1 3 5 7
STATUS
ALARM 6 8 REGISTER
1/2 3/4 5/6 7/8 9 / 10 11 / 12 13 / 14 15 / 16

READY 2 4 FSM

FortiGate 200B-POE
1 3 5 7
STATUS
ALARM READY 2 4 6 8
FortiGate 200B-POE
HA

HA
POWER
CONSOLE USB POE PORTS FortiASIC NP2 Powered USB

Tools and Documenation


POWER
CONSOLE USB USB
POE PORTS FortiASIC NP2 Powered
Copyright 2010 Fortinet Incorporated. All rights reserved. Rack-Mount 4 Rubber feet
Trademarks
Brackets
LEDs
Console USB FSM
POE ports Ports 9 to 16 USB port Cable Tie
ports module slot
port (currently not
Ground in use) AC power Power
connection button

Straight-through RJ-45 to
AC LINE AC Power Cable Ethernet cable DB-9 Serial Cable Power Supply (12V)
100-240V AC
60-50Hz 5-4A

Connecting
Ensure the FortiGate unit is placed on a stable surface. Connect the following to the FortiGate unit:

• Connect the RJ-45 to DB-9 serial cable into the Console port on the unit. Insert the other end into the management computer.

• Insert an ethernet cable into Port 1-8. Insert the other end into a FortiWifi-50B.

• Insert the ethernet cable into Port 9 to 16. Insert the other end to the router connected to the Internet, or to the modem.

• Connect the AC power cable to the power supply on the back of the unit.

• Connect the power cord to a surge protected power bar or power supply.

Note: The AC power supply supports 100-240VAC, 60-50 Hz, 5-4 Amp.

1/2 3/4 5/6 7/8 9 / 10 11 / 12 13 / 14 15 / 16


FSM
1 3 5 7
STATUS
ALARM READY 2 4 6 8
FortiGate 200B-POE
HA
POWER
CONSOLE USB POE PORTS FortiASIC NP2 Powered USB

RJ-45 to DB-9 cable


connects to serial Straight-through Ethernet
port on management Ethernet cable or cable connects to hub or
computer POE switch on the network

AC LINE
100-240V AC
60-50Hz 5-4A

Power cable connects to


power supply

Configuration Tools
Web Config Command Line Interface (CLI)
Web Config is an easy to use management tool. Use it to configure the administrator pass- The CLI is a full-featured management tool. Use it to configure the administrator password,
word, the interface and default gateway addresses, and the DNS server addresses, add the interface addresses, the default gateway address, and the DNS server addresses. To con-
devices for log collection and configure reports. figure advanced settings, see the Tools and Documentation CD-ROM.

Requirements: Requirements:
• An Ethernet connection between the Fortinet unit and management computer. • The RJ-45 to DB-9 serial connection between the Fortinet unit and the
• A web browser such as FireFox or Internet Explorer on the management computer. management computer.
• A terminal emulation application (HyperTerminal for Windows) on the management com-
puter.
Collecting Information
NAT/Route Mode Port 13 IP: ____.____.____.____
Port 1 IP: ____.____.____.____ Netmask: ____.____.____.____
Netmask: ____.____.____.____ Port 14 IP: ____.____.____.____
Port 2 IP: ____.____.____.____ Netmask: ____.____.____.____
Netmask: ____.____.____.____ Port 15 IP: ____.____.____.____
Port 3 IP: ____.____.____.____ Netmask: ____.____.____.____
Netmask: ____.____.____.____ Port 16 IP: ____.____.____.____
Port 4 IP: ____.____.____.____ Netmask: ____.____.____.____
Netmask: ____.____.____.____
Port 5 IP: ____.____.____.____ Transparent mode
Netmask: ____.____.____.____ Management IP: IP: ____.____.____.____
Port 6 IP: ____.____.____.____ Netmask: ____.____.____.____
Netmask: ____.____.____.____
The management IP address and netmask must be valid for the network from which you will
Port 7 IP: ____.____.____.____ manage the FortiGate unit.
Netmask: ____.____.____.____
General settings
Port 8 IP: ____.____.____.____
Administrator password:
Netmask: ____.____.____.____
Network Settings: Default Gateway: ____.____.____.____
Port 9 IP: ____.____.____.____
Primary DNS Server: ____.____.____.____
Netmask: ____.____.____.____
Secondary DNS Server: ____.____.____.____
Port 10 IP: ____.____.____.____
Netmask: ____.____.____.____ Factory default settings
Port 11 IP: ____.____.____.____ NAT/Route mode Administrative account settings
Netmask: ____.____.____.____ Switch 192.168.1.99 User name admin
Port 12 IP: ____.____.____.____ Port 9 192.168.100.99 Password (none)
Netmask: ____.____.____.____
To reset the FortiGate unit to the factory defaults, in the CLI type the command
execute factory reset
The internal interface IP address and netmask must be valid for the internal network. A de-
fault gateway is required for the FortiGate unit to route connections to the Internet.

Configuring
NAT/Route mode Transparent mode

You would typically use NAT/Route mode when the Fortinet unit is deployed as a gateway You would typically use the Fortinet unit in Transparent mode on a private network behind
between private and public networks. In its default NAT/Route mode configuration, the unit an existing firewall or behind a router. In its default Transparent mode configuration, the unit
functions as a firewall. Firewall policies control communications through the Fortinet unit. functions as a firewall.

Web Config Command Line Interface

1. Connect the Fortinet unit’s internal interface to a management computer Ethernet 1. Use the RJ-45 to DB9 serial cable to connect the Fortinet unit’s Console port to the
interface. Use a cross-over Ethernet cable to connect the devices directly. Use straight- management computer serial port.
through Ethernet cables to connect the devices through a hub or switch. 2. Start a terminal emulation program (HyperTerminal) on the management computer. Use
2. Configure the management computer to be on the same subnet as the internal interface these settings:
of the Fortinet unit. To do this, change the IP address of the management computer to 3. Baud Rate (bps) 9600, Data bits 8, Parity None, Stop bits 1, and Flow Control None.
192.168.1.2 and the netmask to 255.255.255.0. 4. At the Login: prompt, type admin and press Enter twice (no password required).
3. To access the Fortinet web-based manager, start Internet Explorer and browse to
https://192.168.1.99 (remember to include the “s” in https://). NAT/Route mode
4. Type admin in the Name field and leave the password field blank. Click Login.
1. Configure the Fortinet unit’s internal interface.
NAT/Route mode config system interface
edit internal
To change the administrator password set ip <intf_ip>/<netmask_ip>
1. Go to System > Admin > Administrators. end
2. Select Change Password for the admin administrator and enter a new password.
2. Repeat to configure each interface, for example, to configure the Port 1 interface.
To configure interfaces config system interface
1. Go to System > Network > Interface. edit port1
2. Select the edit icon for each interface to configure. ...
3. Set the addressing mode for the interface. (See the online help for information.)
• For manual addressing, enter the IP address and netmask for the interface. 3. Configure the primary and secondary DNS server IP addresses.
• For DHCP addressing, select DHCP and any required settings. config system dns
• For PPPoE addressing, select PPPoE, and enter the username and password and set primary <dns-server_ip>
any other required settings. set secondary <dns-server_ip>
end
To configure the Primary and Secondary DNS server IP addresses
1. Go to System > Network > Options, enter the Primary and Secondary DNS IP ad- 4. Configure the default gateway.
dresses that you recorded above and select Apply. config router static
edit 1
To configure a Default Gateway set gateway <gateway_ip>
1. Go to Router > Static and select Edit icon for the static route. end
2. Set Gateway to the Default Gateway IP address you recorded above and select OK.
Transparent Mode
Transparent mode
1. Change from NAT/Route mode to Transparent mode and configure the Management IP
To switch from NAT/route mode to transparent mode address.
1. Go to System > Config > Operation Mode and select Transparent. config system settings
2. Set the Management IP/Netmask to 192.168.1.99/24. set opmode transparent
3. Set a default Gateway and select Apply. set manageip <mng_ip>/<netmask>
set gateway <gateway_ip>
To change the administrator password end
1. Go to System > Admin > Administrators.
2. Select Change Password for the admin administrator and enter a new password. 2. Configure the DNS server IP address.
config system dns
To change the management interface set primary <dns-server_ip>
1. Go to System > Config > Operation Mode. set secondary <dns-server_ip>
2. Enter the Management IP address and netmask that you recorded above and select end
Apply.

To configure the Primary and Secondary DNS server IP addresses Visit these links for more information and documentation for your Fortinet product.
1. Go to System > Network > Options, enter the Primary and Secondary DNS IP ad-
• Technical Documentation - http://docs.fortinet.com
dresses that you recorded above and select Apply.
• Knowledge Center - http://kb.fortinet.com
• Technical Support - http://support.fortinet.com
• Training Services - http://campus.training.fortinet.com

Вам также может понравиться