0% found this document useful (0 votes)
23 views

FortiWiFi-50B QuickStart Guide

Guía Rápida Fortinet 50B

Uploaded by

oscarbuscando
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views

FortiWiFi-50B QuickStart Guide

Guía Rápida Fortinet 50B

Uploaded by

oscarbuscando
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

LED State Description

Green The FortiWiFi unit is on.


Power
Off The FortiWiFi unit is off.
Green On during start up or reboot.
Status
Off Normal operation.
Flashing Flashing when enabling Wireless LAN port.
WLAN
Green
Off Wireless LAN port is down.
Green The correct cable is in use and the connected equip-
ment has power.
Link / Activity Flashing Network activity at this interface.
Green
INTERNAL
WAN1
(PoE) WAN2

Off No link established. POWER STATUS


WLAN LINK / ACT
10/100
1 2 3

10/100 Green The interface is connected at 100 Mb.


FortiWiFi-50B
This equipment is to be connected only to PoE without
routing to the outside plant.
I.T.E
3KZX
E312664
© Copyright 2007 Fortinet Incorporated. All rights reserved.
Products mentioned in this document are trademarks or registered trade-
marks of their respective holders.
Regulatory Compliance
FCC Class B Part 15 CSA/CUS
30 August 2007
01-30005-0399-20070830

Checking the Package Contents


Front Antenna mount Back Antenna mount
Connector Type Speed Protocol Description
Internal RJ-45 10/100 Base-T Ethernet 3-port switch connection to up to three devices or the POWER STATUS
WLAN
WAN1
(PoE) WAN2
INTERNAL

LINK / ACT

internal network.
10/100
3 2 1 WAN2 WAN1
1 2 3 DC+12V CONSOLE USB

WAN1
WLAN Antenna 802.11 b/g Wireless connections to LAN. Power Status WLAN WAN 1,2 Internal
Ground Power
Connection
USB WAN2
LED LED LED Interface Interface RJ-45 Serial Internal Interface,
WAN1 (PoE) RJ-45 10/100 Base-T Ethernet Connection to the Internet. Power over Ethernet Connection switch connectors
1,2,3
enabled port can receive power from a PoE enabled
Ethernet switch, rather than from a power adapter.
WAN2 RJ-45 10/100 Base-T Ethernet Optional redundant or alternate connection to the
Internet. Straight-through RJ-45 to
DB-9 Serial Cable Power Cable
Ethernet cable
Power Supply 4 Rubber feet
CONSOLE RJ-45 9600 bps RS-232 Optional connection to the management computer.
2 Antennas
8/N/1 serial Provides access to the command line interface (CLI).
QuickStart Guide

USB USB USB Optional connection for USB key for firmware backup
and installation. POWER STATUS
WLAN
WAN1
(PoE) WAN2

1
INTERNAL

2
LINK / ACT
10/100

FortiWiFi-50B

Copyright 2007 Fortinet Incorporated. All rights reserved.


Trademarks

2 Mounting Brackets Products mentioned in this document are trademarks.

Documentation

Connecting
Connect the FortiWiFi unit to a power outlet and to the internal and external networks.
Power cable
• Affix the rubber feet to the underside of the FortiWiFi unit, and attach the antennas to connects to power supply
Attach the antenna to the
the antenna mounts on the back of the FortiWiFi unit. antenna mounts.
• Place the unit on a stable surface. Make sure the FortiWiFi unit has adequate air flow RJ-45 to DB-9 serial cable
connects to management computer
for cooling.
• Locate the FortiWiFi-50B in a prominent location within a room for maximum coverage,
rather than in a corner.
3 2 1 WAN2 WAN1

• Be aware of the construction of your environment, concrete and metal walls can hamper DC+12V CONSOLE USB

signal strength. Ground


Straight-through Ethernet cable connects
to Internet (public switch or router). For
• Keep the AP and wireless devices at least 10 feet away from appliances such as micro- receiving power from a PoE enabled
Ethernet switch.
wave ovens and cordless phones. Straight-through Ethernet cables connect
to computers on internal network
Optional redundant connection to Internet

Planning the Configuration


Before configuring the FortiWiFi unit, you need to plan how to integrate the unit into your network. Your configuration plan is dependent upon the operating mode that you select: NAT/Route
mode (the default) or Transparent mode.

Quick configuration using the default settings 5. Select one of the following Addressing modes
• Manual: enter a static IP address and netmask, select OK, and go to step 6
You can quickly set up your FortiWiFi unit for a home or small office using the web-based • DHCP: to get an IP address from the ISP select DHCP and go to step 9
manager and the default settings in NAT/Route mode. • PPPoE: to get an IP address from the ISP select PPPoE and go to step 9
Configure your network computers to use DHCP, access the web-based manager, and 6. Go to System > Network > DNS.
configure the required settings for the WAN1 interface. You can also configure DNS and a 7. Select one of the following DNS settings
default route if needed. The FortiWiFi unit automatically assigns IP addresses to up to 100 • Obtain DNS server address automatically: select to get the DNS addresses from the
computers in the internal network. ISP, select Apply
1. Connect the FortiWiFi unit to the network. • Use the following DNS server addresses: select and enter the DNS server address-
2. Set the all the network computers to use DHCP to automatically obtain an IP address. es given to you by the ISP, select Apply
The FortiWiFi internal interface acts as a DHCP server for the internal network and as- 8. Go to Router > Static, select Create New, enter the default gateway address and select
signs IP addresses to all computers in the range 192.168.1.110 –192.168.1.210. OK. Network configuration is complete. Proceed to part 7 of this QuickStart Guide.
3. From the management computer browse to https://192.168.1.99. Login with a user 9. Select Retrieve default gateway from server and Override internal DNS options if your
name of admin and no (blank) password. ISP supports them, select OK, and proceed to part 7 of this QuickStart Guide.
4. Go to System > Network > Interface and select Edit for the WAN1 interface. Go to step 6 if you are not selecting these options.

NAT/Route mode Transparent mode


In NAT/Route mode, the FortiWiFi unit is visible to the network that it is connected to. All of In Transparent mode, the FortiWiFi unit is invisible to the network. All of its interfaces are on
its interfaces are on different subnets. Each interface connected to a network must be con- the same subnet. You only have to configure a management IP address so that you can make
figured with an IP address that is valid for that network. configuration changes.
You would typically use NAT/Route mode when the FortiWiFi unit is deployed as a gateway You would typically use the FortiWiFi unit in Transparent mode on a private network behind
between private and public networks. In its default NAT/Route mode configuration, the unit an existing firewall or behind a router. In its default Transparent mode configuration, the unit
functions as a firewall. Firewall policies control communications through the FortiWiFi unit. functions as a firewall. You can connect up to three network segments to the FortiWiFi unit to
In NAT/Route mode, firewall policies can operate in NAT mode or in Route mode. In NAT control traffic between these network segments.
mode, the FortiWiFi unit performs network address translation before IP packets are sent to
the destination network. In Route mode, no translation takes place.

Refer to the Tools and Documentation CD-ROM for information on how to control traffic, and how to configure wireless connections, antivirus protection, FortiGuard, Web con-
tent filtering, Spam filtering, intrusion prevention (IPS), and virtual private networking (VPN).
Choosing a Configuration Tool
Web-based manager Command Line Interface (CLI)
The FortiWiFi web-based manager is an easy to use management tool. The CLI is a full-featured management tool. Use it to configure the administrator password,
Use it to configure the administrator password, the interface, default gateway addresses, and the interface addresses, the default gateway address, and the DNS server addresses. To
the DNS server addresses. configure advanced settings, see the Tools and Documentation CD-ROM.

Requirements: Requirements:
• An Ethernet connection between the FortiWiFi unit and management computer. • The RJ-45 to DB9 serial connection between the FortiWiFi unit and management com-
• Internet Explorer 6.0 or higher on the management computer. puter.
• A terminal emulation application (HyperTerminal for Windows) on the management
computer.

Collecting Information

NAT/Route Mode General settings


Internal Interface: IP: ____.____.____.____ Administrator password:
Netmask: ____.____.____.____
Network Settings: Default Gateway: ____.____.____.____
WAN1 Interface: IP: ____.____.____.____
Primary DNS Server: ____.____.____.____
Netmask: ____.____.____.____
Secondary DNS Server: ____.____.____.____
WAN2 Interface IP: ____.____.____.____
Netmask: ____.____.____.____ A default gateway is required for the FortiWiFi unit to route connections to the Internet.
WLAN Interface IP: ____.____.____.____
Netmask: ____.____.____.____ Factory default settings
The internal interface IP address and netmask must be valid for the internal network. NAT/Route mode Transparent mode
Internal interface 192.168.1.99 Management IP 0.0.0.0
Transparent mode WAN1 interface 192.168.100.99 Wireless settings
Management IP: IP: ____.____.____.____ WAN2 interface 192.168.101.99 Mode Access Point
Netmask: ____.____.____.____ WLAN interface 10.10.80.1 SSID fortinet

The management IP address and netmask must be valid for the network from which you will Administrative account settings Geography World
manage the FortiWiFi unit. User name admin Channel 5
Password (none)

Configuring the FortiGate Unit


Web-based Manager Command Line Interface
1. Connect the FortiWiFi internal interface to a management computer Ethernet interface. 1. Use the RJ-45 to DB9 serial cable to connect the FortiWiFi Console port to the manage-
Use a cross-over Ethernet cable to connect the devices directly. Use straight-through ment computer serial port.
Ethernet cables to connect the devices through a hub or switch. 2. Start a terminal emulation program (HyperTerminal) on the management computer. Use
2. Configure the management computer to be on the same subnet as the internal these settings:
interface of the FortiWiFi unit. To do this, change the IP address of the management 3. Baud Rate (bps) 9600, Data bits 8, Parity None, Stop bits 1, and Flow Control None.
computer to 192.168.1.2 and the netmask to 255.255.255.0. 4. At the Login: prompt, type admin and press Enter twice (no password required).
3. To access the FortiWiFi web-based manager, start Internet Explorer and browse to
https://192.168.1.99 (remember to include the “s” in https://). NAT/Route mode
4. Type admin in the Name field and select Login.
1. Configure the FortiWiFi internal interface.
NAT/Route mode config system interface
edit internal
To change the administrator password set ip <intf_ip>/<netmask_ip>
1. Go to System > Admin > Administrators. set allowaccess {http|https|ssh|telnet|ping|snmp}
2. Select Change Password for the admin administrator and enter a new password. end
To configure interfaces
1. Go to System > Network > Interface. 2. Repeat to configure each interface, for example, to configure the WAN1 interface.
2. Select the edit icon for each interface to configure. config system interface
3. Set the addressing mode for the interface. (See the online help for information.) edit wan1
• For manual addressing, enter the IP address and netmask for the interface. set ip <intf_ip>/<netmask_ip>
• For DHCP addressing, select DHCP and any required settings. set allowaccess {http|https|ssh|telnet|ping|snmp}
• For PPPoE addressing, select PPPoE, and enter the username and password
and any other required settings. 3. Configure the primary and secondary DNS server IP addresses.
To configure the Primary and Secondary DNS server IP addresses config system dns
1. Go to System > Network > Options, enter the Primary and Secondary DNS IP ad- set primary <dns-server_ip>
dresses that you recorded above and select Apply. set secondary <dns-server_ip>
To configure a Default Gateway end
1. Go to Router > Static and select Edit icon for the static route.
2. Set Gateway to the Default Gateway IP address you recorded above and select OK. 4. Configure the default gateway.
config router static
edit 1
Transparent mode set gateway <gateway_ip>
end
To switch from NAT/route mode to transparent mode
1. Go to System > Config > Operation Mode and select Transparent.
2. Set the Management IP/Netmask to 192.168.1.99/24. Transparent Mode
3. Set a default Gateway and select Apply.
To change the administrator password 1. Change from NAT/Route mode to Transparent mode and configure the Management IP
1. Go to System > Admin > Administrators. address.
2. Select Change Password for the admin administrator and enter a new password. config system settings
To change the management interface set opmode transparent
1. Go to System > Config > Operation Mode. set manageip <mng_ip>/<netmask>
2. Enter the Management IP address and netmask that you recorded above and select set gateway <gateway_ip>
Apply. end
To configure the Primary and Secondary DNS server IP addresses
1. Go to System > Network > Options, enter the Primary and Secondary DNS IP ad- 2. Configure the DNS server IP address.
dresses that you recorded above and select Apply. config system dns
set primary <dns-server_ip>

7
set secondary <dns-server_ip>
end

Completing the Configuration


Congratulations! Visit these links for more information and documentation for your Fortinet product.

You have finished configuring the basic settings. Your network is now protected from Internet- • Technical Documentation - http://docs.forticare.com
based threats. To explore the full range of configuration options, see the online help or the • Fortinet Knowledge Center - http://kc.forticare.com
Tools and Documentation CD-ROM. • Fortinet Technical Support - http://support.fortinet.com

You might also like