This recipe is part of the process of deploying FortiGate for OCI. Note OCI is only supported by FortiOS 5.4.8. See below for the rest of the recipes in this process:
- Create a virtual cloud network and public-facing subnets
- Create a security list
- Create a route table for the internal network
- Create internal network subnet
- Obtain the deployment image file and place it in your bucket
- Import the image
- Launch the FortiGate instance
- Attach a storage to FortiGate (required)
- Access the FortiGate
- Create the second vNIC
- Configure the second vNIC on the FortiGate
- Change the protected network’s default route
- [Connectivity test] Configure FortiGate firewall policies and virtual IPs
- Let’s create an internal protected network, where virtual machines will be placed under the FortiGate’s protection. Click Create Subnet.
- Let’s create the internal protected network in the availability domain where the FortiGate is located. Choose the appropriate domain in use, then enter the internal subnet. The route table must be the one created earlier for the internal network. Under SUBNET ACCESS, select PRIVATE SUBNET. You can select any security list as desired. In the example, a security list that allows all protocols for any source and destination was selected. Note you must create the security list prior to this configuration.
The post Create internal network subnet appeared first on Fortinet Cookbook.