background image

Esc

Enter

DMZ2

DMZ1

INTERNAL

WAN1

WAN2

CONSOLE

USB

1

2

3

4

A

Power Cable

Rack-Mount Brackets

Documentation

Ethernet Cables:

Orange - Crossover

Grey - Straight-through

USER MANUAL

FortiGate-200A

QuickStart Guide

Copyright 2003 Fortinet Incorporated. All rights reserved.
Trademarks
Products mentioned in this document are trademarks.

Front

LCD

Control

Buttons

Internal

(4-port switch)

Power

LED

DMZ

1, 2

WAN

1, 2

Esc

Enter

DMZ2

DMZ1

INTERNAL

WAN1

WAN2

CONSOLE

USB

1

2

3

4

A

Back

Power

Connection

Power
Switch

USB

(future)

Serial

Port

RJ-45 to

DB-9 Serial Cable

Esc

Enter

DMZ2

DMZ1

INTERNAL

WAN1

WAN2

CONSOLE

USB

1

2

3

4

A

Straight-through Ethernet cables connect 
to Internet (public switch, router, or modem)

Optional Ethernet connection to 1 or 2 DMZ networks

Straight-through 

Ethernet cables

connect to computers on internal network

Optional RJ-45 serial cable connects to management computer

Power cable connects to power outlet

Esc

Enter

DMZ2

DMZ1

INTERNAL

WAN1

WAN2

CONSOLE

USB

1

2

3

4

A

Connector Type

Speed

Protocol Description

Internal

RJ-45

10/100Base_T Ethernet

4-port switch connection to up to four network 
devices or the internal network.

WAN1 and 2 RJ-45  10/100Base_T Ethernet

Redundant connections to the Internet.

DMZ1 and 2 RJ-45

10/100Base_T Ethernet

Optional connections to one or two DMZ networks, 
or to other FortiGate-200A units for HA. For details, 
see the Documentation CD-ROM.

CONSOLE

RJ-45

9600 bps

RS-232 
serial

Optional connection to the management computer. 
Provides access to the command line interface 
(CLI).

FortiGate-200A LED Indicators

LED

State

Description

Power

Green

The FortiGate unit is powered on.

Off

The FortiGate unit is powered off.

Internal
WAN1
WAN2
DMZ1
DMZ2

Amber

The correct cable is in use and the connected 
equipment has power.

Flashing 
Amber

Network activity at this interface.

Green

The interface is connected at 100 Mbps.

Off

No link established.

Connect the FortiGate-200A unit to a power outlet and to networks.

NAT/Route mode

In NAT/Route mode, the FortiGate-200A is visible to the networks that it is connected 

to. All of its interfaces are on different subnets. You must configure the internal and 

WAN1 interfaces with IP addresses. Optionally, you can also configure the WAN2 

DMZ1, and DMZ2 interfaces.
You would typically use NAT/Route mode when the FortiGate-200A is deployed as a 

gateway between private and public networks. In its default NAT/Route mode 

configuration, the unit functions as a firewall. Firewall policies control communications 

through the FortiGate-200A unit.

In NAT/Route mode, firewall policies can operate in NAT mode or in Route mode. In 

NAT mode, the FortiGate-200A performs network address translation before IP packets 

are sent to the destination network. In Route mode, no translation takes place. By 

default, the unit has a single NAT mode policy that allows users on the internal network 

to securely access and download content from the Internet. No other traffic is possible 

until you have configured more policies.

Transparent mode

In Transparent mode, the FortiGate-200A is invisible to the network. All of its interfaces 

are on the same subnet. You only have to configure a management IP address so that 

you can make configuration changes. 
You would typically use the FortiGate-200A in Transparent mode on a private network 

behind an existing firewall or behind a router. In its default Transparent mode 

configuration, the unit functions as a firewall. By default, the unit has a single firewall 

policy that allows users on the internal network segment to connect to the external 

network segment. No other traffic is possible until you have configured more policies.

You can connect up to 5 network segments to the FortiGate-200A unit to control traffic 

between these network segments.

FortiGate-200A Unit

in NAT/Route mode

Route mode policies
controlling traffic between
internal networks.

Internal network

DMZ network

Internal

192.168.1.99

DMZ1

10.10.10.1

192.168.1.3

10.10.10.2

WAN1

204.23.1.5

NAT mode policies controlling

traffic between internal and

external networks.

Internet

Esc

Enter

DMZ2

DMZ1

INTERNAL

WAN1

WAN2

CONSOLE

USB

1

2

3

4

A

FortiGate-200A Unit

in Transparent mode

Internet

10.10.10.1 
Management IP

10.10.10.3

WAN1

Internal

10.10.10.2

Transparent mode policies 

controlling traffic between 

internal and external networks

204.23.1.5

(firewall, router)

Gateway to

public network

Internal network

Esc

Enter

DMZ2

DMZ1

INTERNAL

WAN1

WAN2

CONSOLE

USB

1

2

3

4

A

Before configuring the FortiGate-200A, you need to plan how to integrate the unit into your 

network. Your configuration plan is dependent upon the operating mode that you select: NAT/

Route mode (the default) or Transparent mode. 

Choose among three different tools to configure the FortiGate-200A. 

QuickStart Guide

FortiGate-200A

Check that the package contents are complete.

Place the unit on a stable surface or mount it in a 19-inch rack. It 

requires 1.5 inches clearance (3.75 cm) on each side to allow for 

cooling.

Make sure the power switch on the back of the unit is turned off before 

connecting the power and network cables.

Checking the package contents

1

Connecting the FortiGate-200A

2

Planning the configuration

3

Choosing a configuration tool

4

© Copyright 2004 Fortinet Incorporated. All rights reserved. 

Trademarks 

Products mentioned in this document are trademarks or registered trademarks of their respective holders.

Regulatory Compliance

FCC Class A Part 15 CSA/CUS
02 November 2004

For technical support please visit http://www.fortinet.com.

Factory default settings

NAT/Route mode

Transparent mode

Internal interface

192.168.1.99

Management IP

10.10.10.1

WAN1 interface

192.168.100.99

Administrative account settings

WAN2 interface

192.168.101.99

User name

admin

DMZ1 interface

10.10.10.1

Password

(none)

Web-based 

manager & 

Setup Wizard

The FortiGate web-based 

manager Setup Wizard 

guides you through the 

initial configuration steps. 

Use it to configure the administrator password, the 

interface addresses, the default gateway address, and 

the DNS server addresses. Optionally, use the Setup 

Wizard to configure the internal server settings for 

NAT/Route mode. 

Requirements:

 

Ethernet connection between the FortiGate-200A 

and management computer. 

Internet Explorer version 6.0 or higher on the 

management computer. 

Command 

Line Interface 

(CLI)

The CLI is a full-featured 

management tool. 
Use it to configure the 

administrator password, 

the interface addresses, 

the default gateway 

address, and the DNS server addresses. To configure 

advanced settings, see the Documentation CD-ROM. 

Requirements:

 

Serial connection between the FortiGate-200A and 

management computer. 

A terminal emulation application (HyperTerminal for 

Windows) on the management computer. 

Control 

Buttons & 

LCD

The control buttons and LCD are located on the front 

panel of the FortiGate-200A. Use them to configure the 

internal, WAN1 and DMZ 1 interface addresses, and the 

default gateway address. To configure the other 

interface addresses, the DNS server addresses and 

other settings, use the web-based manager, or the CLI.

Requirements:

 

Physical access to the FortiGate-200A. 

Refer to the Documentation CD-ROM for information on how to control traffic, and how to configure HA, antivirus protection, Web content filtering, Spam filtering, intrusion 

prevention (IPS), and virtual private networking (VPN).

01-28005-0070-20041102

Reviews: