Fortinet black logo

NGFW Deployment

7.0.0

Deployment procedures

Deployment procedures

The deployment procedures are organized into the following sections:

Initial setup

Describes how to connect to FortiGate after you remove the device from the box, establish a WAN connection, manage access to the FortiGate, and connect a managed switch.

System settings

Describes how to configure system settings, log settings, and a remote RADIUS authentication server.

Administrator settings

Describes how to configure administrator settings and administrator accounts for RADIUS.

FortiGate Cloud Sandbox

Describes how to enable FortiGate Cloud Sandbox.

FortiGate objects

Describes how to create objects used by FortiGate, such as user groups, address groups, and services.

LANs and LAN segmentation

Describes how to configure LANs, including the trunk port and VLAN definitions.

Wireless networks (WLAN)

Describes how to configure the WLAN, including SSIDs, AP profiles, and managed APs.

Security

Describes how to configure security profiles and firewall policies.

Security rating check

Describes how to review the security rating check.

Deployment procedures

The deployment procedures are organized into the following sections:

Initial setup

Describes how to connect to FortiGate after you remove the device from the box, establish a WAN connection, manage access to the FortiGate, and connect a managed switch.

System settings

Describes how to configure system settings, log settings, and a remote RADIUS authentication server.

Administrator settings

Describes how to configure administrator settings and administrator accounts for RADIUS.

FortiGate Cloud Sandbox

Describes how to enable FortiGate Cloud Sandbox.

FortiGate objects

Describes how to create objects used by FortiGate, such as user groups, address groups, and services.

LANs and LAN segmentation

Describes how to configure LANs, including the trunk port and VLAN definitions.

Wireless networks (WLAN)

Describes how to configure the WLAN, including SSIDs, AP profiles, and managed APs.

Security

Describes how to configure security profiles and firewall policies.

Security rating check

Describes how to review the security rating check.