April 4, 2023
SETUP 1: INITIAL SETUP
Send the file to your selected path. You may download the files from this
Go to your VMWare Workstation 16 Pro. If you don’t have one, you may need to download it from the official website of You can use the free trial version or buy it from them.
Open Virtual Network Editor..
NOTE: Please remember your third octet in your NAT (VmNet8), in my case my third octet is 108. So if yours is 72 or whatsoever then that’s default octet for you to use in the next process.
Select Add Network.
Select any VMNet of your choice, but for my case I will use VMNet5.
Wait for the settings to be applied.
A VMnet has been added.
Set the Subnet IP to 10.2.0.0, and uncheck this setting:
Use local DHCP service to distribute IP address to VMs.
Save the settings by clicking Apply.
SETUP 2: INSTALLING WINDOWS SERVER 2019/2022
Go back to your VMWare and click Create a Virtual Machine.
Select Typical (recommended).
Choose I will install the operating system later.
Choose Windows Server 2019 from the dropdown menu.
Or it might be better if the VM has Windows Server 2022 in the options, then select it.
Name the VM of your choice.
Set to 40 - 60GB (recommended), and choose Store virtual disk as a single file.
Click Customize Hardware.
Select “New CD/DVD...” and click “Use ISO image file”.
Then click “Browse”.
Select the .iso file that contains the Windows Server OS.
Select Network Adapter, and select VMNet_ (Host-only).
Click Finish.
Select Power on this virtual machine.
When open, click your VM screen, and press Enter multiple times.
Click Next.
Select the second option which has Desktop Experience.
Accept the License Terms.
Wait for the installation to finish.
Click Restart now.
Add a password:
Password: C1sc0123
Login your Windows Server and let’s proceed to the next setup.
SETUP 3: IMPORTING FORTIGATE FIREWALL VM
Click Open to import VMs.
Find the folder where you download the Fortigate VM.
Select Fortigate-VM64
and click Open.
Accept the Terms of License
Click “Next”.
Type the VM name of your choice.
Select the Network Adapter 2 and set the following options:
Network Adapter 1: NAT
Network Adapter 2: Custom (for my case I will use VMnet5)
From Network Adapter 3 to 10, you need to uncheck the Connect at power on.
After unchecking all Network Adapters, click OK.
SETUP 4: CONFIGURING FORTIGATE FIREWALL IN THE CLI
Select Power on this Virtual Machine.
Wait for the system to load.
After loading, login your Fortigate with following credentials.
FortiGate-VM65 login: admin
Password: <press Enter Key>
You are force to change your password. Please input your new password:
New Password: pass
Confirm Password: pass
Type this command to check the license of your Fortigate:
NOTE: The license of your Fortigate should appear as “EXPIRED/INVALID”, since I was fast enough to type the command and didn’t finish loading the system, that’s why it appeared as “VALID”. You should retype the command again after loading the system for a few minutes, then the License would now appear as “INVALID”.
Press Ctrl+C to skip command/display.
Type this command to factory reset your Fortigate:
exec factoryreset
Then type y to confirm.
Wait for the system to reboot
Re-enter the credentials:
FortiGate-VM65 login: admin
Password: <press Enter Key>
You are force to change your password. Please input your new password:
New Password: pass
Confirm Password: pass
Type this command to check ports and IP:
get system interface physical
Now you will have a view of your ports and IP.
*REMINDER: Still remember your third octet? Well in case you forgot, you could check here at this option after we enter the command. Oops, before I forgot, also remember your fourth octet.
SET YOUR PORT1 TO STATIC IP IN YOUR FORTINET INTERFACE BY TYPING THIS COMMAND:
config system interface
edit port1
set mode static
set ip 192.168._._/24
set allowaccess http https ssh telnet ping
exit
SETUP 5: SETTING UP FORTIGATE FIREWALL IN YOUR BROWSER:
Put the IP Address in your browser:
192.168._._
In my case its 192.168.108.69
Enter your credentials:
Username: admin
Password: pass
Set the name of your choice then click OK.
Click OK.
Fortigate Firewall Interface Dashboard.
Expand the Network Tab, then select Static Routes, and click Create New.
Set the following configurations below:
Gateway Address: 192.168._.2
Interface: port1
Administrative Distance: 10
Status: Enabled
Save changes by clicking OK.
Ping 8.8.8.8 to the CLI of the Fortigate to check if internet is existing.
Expand the Policy & Objects Tab, and select Firewall Policy.
Click Create New.
Set the following configuration:
Name: <you select>
Incoming Interface: port2
Outgoing Interface: port1
Source: all
Destination: all
Schedule: always
Service: ALL
Action: ✔ ACCEPT
NAT: Enable
Others are default. Click OK to save changes.
Policy saved.
Expand the Network Tab, and select port2.
Set the following configurations:
Alias: WinServerNetwork
Type: Physical Interface
Role: LAN
Addressing Mode: Manual
IP/Netmask: 10.2.0.2/24
IPV4: ✔ (check all options)
Scroll down and set the following configurations: