Configuring the FortiGate unit
Planning the FortiGate configuration
FortiGate-800 and FortiGate-800F FortiOS 3.0MR4 Install Guide
01-30004-0269-20070215
29
Figure 7:Example NAT/Route multiple internet connection configuration
Transparent mode
In Transparent mode, the FortiGate unit is invisible to the network. Similar to a
network bridge, all FortiGate interfaces must be on the same subnet. You only
have to configure a management IP address to make configuration changes. The
management IP address is also used for antivirus and attack definition updates.
You typically use the FortiGate unit in Transparent mode on a private network
behind an existing firewall or behind a router. The FortiGate unit performs firewall
functions, IPSec VPN, virus scanning, IPS web filtering, and Spam filtering.
You can connect up to eight network segments to the FortiGate unit to control
traffic between these network segments:
Figure 8: Example Transparent mode configuration.
Internet
DMZ
network
DMZ
10.10.10.2
10.10.10.23
Internal
network
Internal
192.168.1.1
192.168.1.3
Route mode policies
controlling traffic between
Internal networks.
NAT policies controlling
traffic between internal
and external networks.
External
204.23.1.5
Port 1
64.83.32.45
Table 9: Transparent mode network segments
FortiGate Unit
Internal Interface External Interface
Other
FortiGate-800
Internal
External
DMZ/HA
Ports 1 to 4
FortiGate-800F
Internal External
DMZ/HA
Ports 1 to 4
Internet
10.10.10.1
Management IP
Internal
Internal Network
10.10.10.3
External
Gateway to public network
204.23.1.2 10.10.10.2
Transparent mode policies
controlling traffic between
internal and external networks.
Router