background image

14. Privacy.
By entering into this Agreement, you agree and consent that Fortinet may collect, retain and use personal information supplied, including name, address, and e-mail 
address of individuals and payment details and other information.  Personal information will be used primarily to provide services and product functionality to end users.  
Fortinet may also use personal information for additional communication, subject to an opt-out notice provided by you in writing per below.  Fortinet may engage other 
companies and individuals to perform functions on its behalf, such as payment processing, order fulfillment, marketing programs and customer service.  Fortinet may 
share personal information with such subcontractors in order to perform these and other functions, but such subcontractors may not use your personal information 
for other purposes, unless you agree.  By entering into this Agreement, you agree and consent to the transfer the supplied personal information to Fortinet’s offices in 
the United States and elsewhere, for the purposes stated above.  For more detailed information on the collection, use and transfer of your personal information, and 
for information on how to opt out of or unsubscribe from the communications described above, please read the Fortinet privacy policy on the Fortinet web site (www.
Fortinet.com).
15.  Open Source Software.
Fortinet’s products may include software modules that are licensed (or sublicensed) to the user under the GNU General Public License, Version 2, of June 1991 (“GPL”) 
or GNU Lesser General Public License, Version 2.1, of February 1999 (“LGPL”) or other open source software licenses which, among other rights, permit the user touse,  
copy, modify and redistribute modules, or portions thereof, and may also require attribution disclosures and access to the source code (“Open Source Software”). The 
GPL requires that for any Open Source Software covered under the GPL, which is distributed to someone in an executable binary format, that the source code also be 
made available to those users. For any Open Source Software covered under the GPL, the source code is made available on this CD or download package. If any Open 
Source Software licenses require that Fortinet provide rights to use, copy or modify a Open Source Software program that are broader than the rights granted in this 
agreement, then such rights shall take precedence over the rights and restrictions herein.  Fortinet will provide, for a charge reflecting our standard distribution costs, 
the complete machine-readable copy of the modified software modules.  To obtain a complete machine-readable copy, please send your written request, along with 
a check in the amount of US $25.00, to General Public License Source Code Request, Fortinet, Inc., 1090 Kifer Rd, Sunnyvale, CA 94086 USA.  In order to receive the 
modified software modules, you must also include the following information: (a) Name, (b) Address, (c) Telephone number, (d) E-mail Address, (e) Product purchased 
(if applicable), (f) Product Serial Number (if applicable).  All open source software modules are licensed free of charge.  There is no warranty for these modules, to the 
extent permitted by applicable law.  The copyright holders provide these software modules “AS-IS” without warranty of any kind, either expressed or implied.  In no 
event will the copyright holder for the open source software be liable to you for damages, including any special, incidental or consequential damages arising out of the 
use or inability to use the software modules, even if such holder has been advised of the possibility of such damages. A full copy of this license, including additional 
open source software license disclosures and third party license disclosures applicable to certain Fortinet products, may obtained by contacting Fortinet’s Legal Depart-
ment at legal@fortinet.com. 

GNU GENERAL PUBLIC LICENSE GNU GENERAL PUBLIC LICENSE

Version 2, June 1991

Copyright (C) 1989, 1991 Free Software Foundation, Inc.

59 Temple Place, Suite 330, Boston, MA  02111-1307  USA

TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General 
Public License.  The “Program”, below, refers to any such program or work, and a “work based on the Program” means either the Program or any derivative work under 
copyright law: that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/or translated into another language.  (Hereinafter, 
translation is included without limitation in the term “modification”.)  Each licensee is addressed as “you”.
Activities other than copying, distribution and modification are not covered by this License; they are outside its scope.  The act of running the Program is not restricted, 
and the output from the Program is covered only if its contents constitute a work based on the Program (independent of having been made by running the Program). 
Whether that is true depends on what the Program does.
1. You may copy and distribute verbatim copies of the Program’s source code as you receive it, in any medium, provided that you conspicuously and appropriately pub-
lish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; 
and give any other recipients of the Program a copy of this License along with the Program. You may charge a fee for the physical act of transferring a copy, and you 
may at your option offer warranty protection in exchange for a fee.
2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or 
work under the terms of Section 1 above, provided that you also meet all of these conditions:
a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change.
b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole 
at no charge to all third parties under the terms of this License.
c) If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, 
to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and 
that users may redistribute the program under these conditions, and telling the user how to view a copy of this License.  (Exception: if the Program itself is interactive 
but does not normally print such an announcement, your work based on the Program is not required to print an announcement.)
These requirements apply to the modified work as a whole.  If identifiable sections of that work are not derived from the Program, and can be reasonably considered 
independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works.  But when 
you distribute the same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the terms of this License, whose 
permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it..  Thus, it is not the intent of this section to claim 
rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on 
the Program. In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume of a storage 
or distribution medium does not bring the other work under the scope of this License.
3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above 
provided that you also do one of the following:
a)  Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections1 and 2 above on a medium 
customarily used for software interchange; or,
b)  Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribu-
tion, a complete machine-readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used 
for software interchange; or,
c)  Accompany it with the information you received as to the offer to distribute corresponding source code.  (This alternative is allowed only for noncommercial distribu-
tion and only if you received the program in object code or executable form with such an offer, in accord with Subsection b above.)
Source code for a work means the preferred form of the work for making modifications to it.  For an executable work, complete source code means all the source 
code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable.  However, 
as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components 
(compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. If distribution of execut-
able or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as 
distribution of the source code, even though third parties are not compelled to copy the source along with the object code.
4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License.  Any attempt otherwise to copy, modify, sublicense or 
distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this 
License will not have their licenses terminated so long as such parties remain in full compliance.
5. You are not required to accept this License, since you have not signed it.  However, nothing else grants you permission to modify or distribute the Program or its 
derivative works.  These actions are prohibited by law if you do not accept this License.  Therefore, by modifying or distributing the Program (or any work based on the 
Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it.
6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute 

Page 17

Summary of Contents for FortiAP 210B

Page 1: ...FortiWiFi 60CM QuickStart Guide ...

Page 2: ...rmance results Nothing herein represents any binding commitment by Fortinet and Fortinet disclaims all warranties whether express or implied except to the extent Fortinet enters a binding written contract signed by Fortinet s General Counsel with a purchaser that expressly warrants that the identified product will perform according to the performance metrics herein For absolute clarity any such wa...

Page 3: ...ts 1 Connecting Your Device 2 FortiExplorer 3 Connecting to the FortiWiFi Unit 5 Technical Specifications 6 LED Specifications 7 Cautions and Warnings 8 Documentation and Links 12 Register Your Product 13 Product License Agreement 14 ...

Page 4: ...rilled holes 5 Insert the screws into the anchors Screws should protrude 5mm out of wall 6 Place FortiWifi key holes over the screws and slide the unit down into position The FortiWifi can be placed in either position shown below Wall Mount Template FortiWifi 60 Series Devices Drill hole Drill hole Wall mount Template Wireless Antennae FortiWiFi 60CM QuickStart Guide QuickStart Guide Thank you for...

Page 5: ...et connection 3 Connect an Ethernet cable to each workstation or laptop PC you wish to connect to the FortiWiFi unit 4 Connect an RJ 11 telephone cable to the MODEM port 5 Connect the provided antennae 6 Connect the Power Supply to the FortiWiFi unit and plug the cable into an electrical outlet ExpressCard Slot Optionally you may also insert a wireless Internet modem into the ExpressCard slot for ...

Page 6: ...soft Windows XP Vista 7 and 8 It is also available for Mac OS X Snow Leopard and higher Microsoft Windows Install 1 Extract the ZIP file if downloaded and double click the msi or exe file and follow the instructions on screen 2 Connect the USB cable to the FortiWiFi unit and then to the management computer 3 The FortiExplorer Easy Configuration Utility opens when the USB cable is connected Select ...

Page 7: ... a number of options on how to configure the FortiWiFi unit depending on your level of comfort with various interfaces Updating FortiExplorer and Firmware FortiExplorer may be automatically updated from time to time You can also use FortiExplorer to check for new firmware for a FortiGate unit To check for new firmware select the FortiGate unit from the device list and select Check for New Firmware...

Page 8: ...Manager 1 Connect the FortiWiFi unit s port 1 to a management computer using the provided Ethernet cable 2 Configure the management computer to be on the same subnet as the internal interface of the FortiWiFi unit a Browse to the Network and Sharing Center Change Adapter Settings Local Area Connection Properties Internet Protocol Version 4 TCP IPv4 Properties b Change the IP address of the managem...

Page 9: ...ect the FortiWiFi unit s console port to the management computer using the provided console cable 2 Start a terminal emulation program on the management computer Use the following settings Baud Rate 9600 Data bits 8 Parity None Stop bits 1 Flow Control None 3 Press Enter on your keyboard to connect to the CLI 4 Type admin in the Name field leave the Password field blank and press Enter You can now...

Page 10: ... internal network 7 Modem RJ 11 PSTN port for connection to telephone system 8 Reset Button When enabled default state resets the unit to its factory default settings if pressed during the first 30 seconds after a reboot Power Connection 12V DC 2 5A 100 240V AC 1 5A MAX 50 60Hz adapter ExpressCard slot The ExpressCard slot on the front of the device adds wireless connectivity card not included WiF...

Page 11: ...nnected Flashing Green Port is transmitting and receiving data 6 Ethernet Ports Speed Green Port is connected at 1Gbps Amber Port is connected at 100Mbps Off Port is connected at 10Mbps 7 WAN and DMZ Ports Link Acticity Green Port is connected Flashing Green Port is transmitting and receiving data 7 WAN and DMZ Ports Speed Green Port is connected at 1Gbps Amber Port is connected at 100Mbps Off Por...

Page 12: ...ble Earthing Reliable earthing of rack mounted equipment should be maintained Particular attention should be given to supply connections other than direct connections to the branch circuit e g use of power strips Federal Communication Commission FCC USA This device complies with Part 15 of FCC Rules Operation is subject to the following two conditions 1 this device may not cause harmful interferen...

Page 13: ...tain of the number of devices that may be connected to a line as determined by the total REN contact the local telephone company The REN for this product is separately shown on the label and also part of the product identifier that has the format US AAAEQ TXXXX The digits represented by are the REN without a decimal point e g 03 is a REN of 0 3 If this equipment causes harm to the telephone networ...

Page 14: ...nt dans la bande 5 150 5 250 MHz sont réservés uniquement pour une utilisation à l intérieur afin de réduire les risques de brouillage préjudiciable aux systèmes de satellites mobiles utilisant les mêmes canaux De plus les utilisateurs devraient aussi être avisés que les utilisateurs de radars de haute puissance sont désignés utilisateurs principaux c à d qu ils ont la priorité pour les bandes 5 2...

Page 15: ... disconnect cables during lightning activity to avoid damage to your Fortinet product or personal injury Electrostatic discharge ESD can damage Fortinet equipment Only perform the procedures described in this document from an ESD workstation If no such station is available you can provide some ESD protection by wearing an anti static wrist strap and attaching it to an available ESD connector or ot...

Page 16: ...e configurations FAQs technical notes and more 4 Technical Discussion Forums https support fortinet com forum This page allows you to communicate with other customers and Fortinet partners about Fortinet products services and configuration issues in a forum environment 5 Training Services http training fortinet com This page provides course descriptions availability schedules and locations of trai...

Page 17: ...alitées du produit Protection contre de nouvelles menaces Registra La reistrazione ti permette di usufruire di Supporto Tecnico Nuove funzionalita Proteezione dalle ultime minaccce Registrar Debe registrar el producto para recibir Apoyo técnico Nuevas funcionalidades del producto Protección contra ataques 登録のお願い 本日 フォーティネッ ト製品の登録をしてください 登録すると次のメリッ トがあります テクニカルサポート 新機能の追加 新しい脅威への防御 请马上注册 您的飞塔产品 您在注...

Page 18: ...aluation and beta licenses or other licenses where the term of the license is limited per the evaluation beta or other agreement or in the ordering docu ments the term of the license is for the duration of Fortinet s copyright in the Software Fortinet may terminate this Agreement and the licenses and other rights herein immediately without notice if you breach or fail to comply with any of the ter...

Page 19: ...thereof 9 Limitation of Liability TO THE MAXIMUM EXTENT PERMITTED BY LAW AND NOTWITHSTANDING ANYTHING TO THE CONTRARY FORTINET IS NOT LIABLE UNDER ANY CONTRACT NEGLIGENCE TORT STRICT LIABILITY INFRINGEMENT OR OTHER LEGAL OR EQUITABLE THEORY FOR ANY LOSS OF USE OF THE PRODUCT OR SERVICE OR ANY DAMAGES OF ANY KIND WHATSOEVER WHETHER DIRECT SPECIAL INCIDENTAL OR CONSEQUENTIAL INCLUDING BUT NOT LIMITE...

Page 20: ... of this License along with the Program You may charge a fee for the physical act of transferring a copy and you may at your option offer warranty protection in exchange for a fee 2 You may modify your copy or copies of the Program or any portion of it thus forming a work based on the Program and copy and distribute such modifications or work under the terms of Section 1 above provided that you al...

Page 21: ...he copyright holder or other authorized party saying it may be distributed under the terms of this Lesser General Public License also called this License Each licensee is addressed as you A library means a collection of software functions and or data prepared so as to be conveniently linked with application programs which use some of those functions and data to form executables The Library below r...

Page 22: ...ribute such a combined library provided that the separate distribution of the work based on the Library and of the other library facilities is otherwise permitted and provided that you do these two things a Accompany the combined library with a copy of the same work based on the Library uncombined with any other library facilities This must be distributed under the terms of the Sections above b Gi...

Page 23: ......

Page 24: ......

Reviews: