background image

4 1000Base-SX

SFP Transceivers

FortiGate-5001 Antivius Firewall module

PWR

STA IPM

CONSOLE

USB

1

2

3

4

5

6

7

8

Ethernet

Cable

Null-Modem

Cable (RS-232)

QuickStart Guide

FortiGate-5001

QuickStart Guide

Copyright 2003 Fortinet Incorporated. All rights reserved.
Trademarks
Products mentioned in this document are trademarks.

PWR

STA IPM

CONSOLE

USB

1

2

3

4

5

6

7

8

01-28005-0043-20041111

RAM DIMs

PWR

STA IPM

CONSOLE

USB

1

2

3

4

5

6

7

8

1 2 3 4

Gigabit Fiber

5 6 7 8

10/100/1000 Copper

RS-232 Serial

Connection

USB

Extraction

Lever

Mounting

Knot

Mounting

Knot

Extraction

Lever

Lockdown

Thumbscrew

Connector Type

Speed

Protocol Description

1, 2, 3, 4

LC SFP 1000Base-SX Ethernet

Multimode fiber optic connections to gigabit optical 
networks. The FortiGate-5001 is shipped with 4 Small 
Formfactor Pluggable (SFP) connectors that you must 
insert into the cage sockets 1-4 on the FortiGate-5001 
front panel. You can optionally use the 1000Base-LX 
(single-mode fiber) or 1000Base-TX (copper cable) SFP 
transceivers.

5, 6, 7, 8

RJ-45

1000Base-T

Ethernet

Copper gigabit connection to 10/100/1000 copper 
networks.

CONSOLE

DB-9

9600 bps

RS-232 
serial

Serial connection to the command line interface.

FortiGate-5001 normal operating LED indicators

LED

State

Description

PWR

Green

The FortiGate-5001 module is on.

STA

Green

Normal operation.

Red

The FortiGate-5001 is booting or a fault condition exists.

IPM

Blue

The FortiGate-5001 is ready to be hot-swapped (or card is ready to be 
removed from the chassis).

Flashing 
Blue

The FortiGate-5001 is changing from hot swap to running mode or 
from running mode to hot swap.

Off

Normal operation. The FortiGate-5001 module is in contact with the 
backplane of the FortiGate-5000 series chassis.

1, 2, 3, 4

Green

The correct optical fiber patch cable is connected to the gigabit fiber 
interface.

Flashing

Network activity at the gigabit fiber interface.

5, 6, 7, 8

Green

The correct cable is connected to the copper 10/100/1000 interface 
and the connected equipment has power.

Flashing

Network activity at this interface.

Amber

The interface is connected at 1000 Mbps.

Install the FortiGate-5001 module into a FortiGate 5020, 5050 or 5140 chassis and connect the 

network cables. Always wear an ESD wrist strap or ankle strap to avoid static discharges.

NAT/Route mode

In NAT/Route mode, each FortiGate-5001 module is visible to the networks that it is 

connected to. All of its interfaces are on different subnets. Each interface that is 

connected to a network must be configured with an IP address that is valid for that 

network.
You would typically use NAT/Route mode when the FortiGate-5001 module is deployed 

as a gateway between private and public networks. In its default NAT/Route mode 

configuration, the module functions as a firewall. Firewall policies control 

communications through the FortiGate-5001 module. No traffic can pass through the 

FortiGate-5001 module until you add firewall policies.

In NAT/Route mode, firewall policies can operate in NAT mode or in Route mode. In 

NAT mode, the FortiGate-5001 module performs network address translation before IP 

packets are sent to the destination network. In route mode, no translation takes place.

Transparent mode

In Transparent mode, the FortiGate-5001 module is invisible to the network. All of its 

interfaces are on the same subnet. You only have to configure a management IP 

address so that you can make configuration changes. 
You would typically use the FortiGate-5001 module in Transparent mode on a private 

network behind an existing firewall or behind a router. In its default Transparent mode 

configuration, the unit functions as a firewall. No traffic can pass through the 

FortiGate-5001 module until you add firewall policies. 

You can connect up to eight network segments to the FortiGate-5001 module to control 

traffic between these network segments.

FortiGate-5001 Module

in NAT/Route mode

Route mode policies
controlling traffic between
internal networks.

Internal network

DMZ network

Port 1

192.168.1.99

Port 3

10.10.10.1

 

192.168.1.3

10.10.10.2

Port 2
204.23.1.5

 

NAT mode policies controlling

traffic between internal and

external networks.

Internet

PWR

STA IPM

CONSOLE

USB

1

2

3

4

5

6

7

8

Internal network

192.168.1.3

FortiGate-5001 Module

in Transparent mode

192.168.1.2

Management IP

 

Port 1

Port 2

192.168.1.1

Transparent mode policies 
controlling traffic between 

internal and external networks

204.23.1.5

(firewall, router)

Gateway to

public network

Internet

PWR

STA IPM

CONSOLE

USB

1

2

3

4

5

6

7

8

Before beginning to configure the FortiGate-5001 module, you need to plan how to integrate the 

unit into your network. Your configuration plan is dependent upon the operating mode that you 

select: NAT/Route mode (the default) or Transparent mode.

Web-based manager and 

Setup Wizard

Using the Setup Wizard you can configure basic 

configuration settings by stepping through the 

wizard pages and filling in the information required.
The FortiGate web-based manager is an easy to 

use management tool. 
Use it to configure the administrator password, 

interface addresses, the default gateway address, 

and the DNS server addresses. To configure advanced settings, see the online help 

and Documentation CD-ROM.

Requirements:

 

An Ethernet connection between the FortiGate-5001 and a management computer. 

Internet Explorer version 6.0 or higher on the management computer. 

Command Line Interface (CLI)

The CLI is a full-featured management tool. 
Use it to configure the administrator password, the 

interface addresses, the default gateway address, 

and the DNS server addresses. To configure 

advanced settings, see the 

FortiGate CLI 

Reference Guide

 on the Documentation CD-ROM.

Requirements:

 

The serial connection between the 

FortiGate-5001 module and a management 

computer. 

A terminal emulation application (HyperTerminal for Windows) on the management 

computer. 

Choose between two different tools to configure the FortiGate-5001 module. 

QuickStart Guide

FortiGate-5001

Check that the package contents are complete. 

To install the FortiGate-5001 module

1. Install the RAM DIMMs into the module by pushing the RAM DIM gently until 

the locking mechanism locks down the DIM.

2. Extend the extraction levers on the module.
3. Carefully slide the module into a chassis slot. 

The module is seated 

properly when it touches the chassis up to the extraction levers.

4. Lock the extraction levers by pushing them towards each other.
5. If power is supplied to the chassis, the FortiGate-5001 module powers on when 

the extraction levers are closed.

6. Tighten the mounting knots on the left and right sides of the front panel.
7. The power switch is built-in to the left side extraction lever. Ensure that the 

lockdown thumbscrew is tightened to ensure that power is not interrupted.

8. Install SFP transceivers and connect the network cables.

Checking the package contents

Checking the package contents

1

Installing the FortiGate-5001

2

Planning the configuration

3

Choosing a configuration tool

4

© Copyright 2004 Fortinet Incorporated. All rights reserved. 

Trademarks 

Products mentioned in this document are trademarks or registered trademarks of their respective holders.

Regulatory Compliance

FCC Class A Part 15 CSA/CUS
19 November 2004

For technical support please visit http://www.fortinet.com.

PWR

STA IPM

CONSOLE

USB

1

2

3

4

5

6

7

8

01-28005-0124-20041119

Refer to the Documentation CD-ROM for information on how to control traffic, and how to configure HA, antivirus protection, Web content filtering, Spam filtering, intrusion 

prevention (IPS), and virtual private networking (VPN).

Отзывы: