beautypg.com

Fortinet FortiGate 100 User Manual

Page 32

background image

32

Fortinet Inc.

Factory default NAT/Route mode network configuration

Getting started

If you are planning on operating the FortiGate unit in Transparent mode, you can
switch to transparent mode from the factory default configuration and then configure
the FortiGate unit onto your network in Transparent mode.

Once the network configuration is complete, you can perform additional configuration
tasks such as setting system time, configuring virus and attack definition updates, and
registering the FortiGate unit.

The factory default firewall configuration includes a single network address translation
(NAT) policy that allows users on your internal network to connect to the external
network, and stops users on the external network from connecting to the internal
network. You can add more policies to provide more control of the network traffic
passing through the FortiGate unit.

The factory default content profiles can be used to quickly apply different levels of
antivirus protection, web content filtering, and email filtering to the network traffic
controlled by firewall policies.

Factory default NAT/Route mode network configuration

Factory default Transparent mode network configuration

Factory default firewall configuration

Factory default content profiles

Factory default NAT/Route mode network configuration

When the FortiGate unit is first powered on, it is running in NAT/Route mode and has
the basic network configuration listed in

Table 2

. This configuration allows you to

connect to the FortiGate unit web-based manager and establish the configuration
required to connect the FortiGate unit to your network. In

Table 2

HTTPS

management access means you can connect to the web-based manager using this
interface. Ping management access means this interface responds to ping requests.

Table 2: Factory default NAT/Route mode network configuration

Administrator
account

User name:

admin

Password:

(none)

Internal interface

IP:

192.168.1.99

Netmask:

255.255.255.0

Management Access:

HTTPS, Ping

External interface

Manual:

IP:

192.168.100.99

Netmask:

255.255.255.0

Default Gateway:

192.168.100.1

Primary DNS Server:

207.194.200.1

Secondary DNS Server:

207.194.200.129

Management Access:

Ping

DMZ interface

IP:

10.10.10.1

Netmask:

255.255.255.0

Management Access:

HTTPS, Ping