This recipe is part of the process of deploying FortiGate for AWS. See below for the rest of the recipes in this process:
- Determine your licensing model
- Register and download your licenses
- Create a VPC and subnets
- Attach the new VPC to the Internet gateway
- Subscribe to the FortiGate
- Create a routing table and associate subnets
- Connect to the FortiGate
- [Use case] Set up a Windows Server in the protected network
- [Connectivity test] Configure FortiGate firewall policies and virtual IPs
- In the AWS Management Console, select EC2. Select Launch Instance, then select the Microsoft Windows Server 2012 R2 that applies to your environment. You will use this to test connectivity with Remote Desktop access.
- In the Configure Instance Details step, in the Network field, select the VPC of the FortiGate. In the Subnet field, select the private subnet.
- In the Configure Security Group step, configure a security group for the Windows server so that it allows Internet access. In this example, we use Remote Desktop TCP port 3389, and other ports are optional. Select Review and Launch.
- Select a key pair, select the acknowledgement check box, and select Launch Instances.
The post [Use case] Set up a Windows Server in the protected network appeared first on Fortinet Cookbook.