This recipe is part of the process of deploying FortiGate HA Active Active for Microsoft Azure using Azure load balancer. See below for the rest of the recipes in this process:
- Basic concepts
- Traffic flow
- Azure load balancer
- Inbound NAT rules
- Load balancing rules
- Locate FortiGate HA for Azure in the Azure portal or Azure marketplace
- Determine your licensing model
- Configure FortiGate initial parameters
- Create VNet and subnets in network settings
- Select Azure instance type
- Assign Azure IP address
- Validate deployment resources
- Create FortiGate instances
- Connect to the FortiGate
- [Use case] Set up a Windows Server in the protected network
- Configure FortiGate firewall policies and virtual IPs
- [Failover test] Create load balancing rules and access the Windows Server via remote desktop
- Set the initial parameters as follows:
- FortiGate set name prefix: FortiGate name, set to distinguish from other resources.
- FortiGate administrative username: specify FortiGate main administrator username. “admin” is not allowed as a username due to Azure restrictions.
- FortiGate password: specify the administrator password.
- Subscription: choose your subscription. This should differ from the screenshot below.
- Resource group: specify the resource group name where FortiGate and associated resources will be accommodated.
- Location: select the region where resources are hosted.
- Click OK.
The post Configure FortiGate initial parameters appeared first on Fortinet Cookbook.