Getting started
Planning the FortiGate configuration
FortiGate-60M Installation Guide
01-28008-0111-20050128
25
NAT/Route mode with multiple external network connections
In NAT/Route mode, you can configure the FortiGate unit with multiple redundant
connections to the external network (usually the Internet). For example, you could
create the following configuration:
• WAN1 is the default interface to the external network (usually the Internet).
• WAN2 is the redundant interface to the external network. You can also use the
modem interface as a redundant connection to the external network.
• Internal is the interface to the internal network.
You must configure routing to support redundant Internet connections. Routing can be
used to automatically redirect connections from an interface if its connection to the
external network fails.
Otherwise, security policy configuration is similar to a NAT/Route mode configuration
with a single Internet connection. You would create NAT mode firewall policies to
control traffic flowing between the internal, private network and the external, public
network (usually the Internet). If you have multiple internal networks, such as one or
more DMZ networks, in addition to the internal, private network, you can create route
mode firewall policies for traffic flowing between them.
Figure 7: Example NAT/Route multiple internet connection configuration
Transparent mode
In Transparent mode, the FortiGate unit is invisible to the network. Similar to a
network bridge, all FortiGate interfaces must be on the same subnet. You only have to
configure a management IP address so that you can make configuration changes.
The management IP address is also used for antivirus and attack definition updates.
You typically use the FortiGate unit in Transparent mode on a private network behind
an existing firewall or behind a router. The FortiGate unit performs firewall functions,
IPSec VPN, virus scanning, IPS, web content filtering, and Spam filtering.
FortiGate-60M Unit
in NAT/Route mode
WAN1
204.23.1.5
WAN2
64.83.32.45
NAT mode policies controlling
traffic between internal and
external networks.
Internet
Internal
192.168.1.1
Internal network
192.168.1.3
INTERNAL
DMZ
4
3
2
1
LINK 100
LINK 100
LINK 100
LINK 100
LINK 100
LINK 100
LINK 100
WAN1
WAN2
PWR
STATUS
Содержание FortiGate 60M
Страница 12: ...12 01 28008 0111 20050128 Fortinet Inc Customer service and technical support Introduction ...
Страница 28: ...28 01 28008 0111 20050128 Fortinet Inc Next steps Getting started ...
Страница 56: ...56 01 28008 0111 20050128 Fortinet Inc Installing and configuring the cluster High availability installation ...