This recipe is part of the process of deploying FortiGate for OCI. Note OCI is only supported by FortiOS 5.4.8. See below for the rest of the recipes in this process:
- Create a virtual cloud network and public-facing subnets
- Create a security list
- Create a route table for the internal network
- Create internal network subnet
- Obtain the deployment image file and place it in your bucket
- Import the image
- Launch the FortiGate instance
- Attach a storage to FortiGate (required)
- Access the FortiGate
- Create the second vNIC
- Configure the second vNIC on the FortiGate
- Change the protected network’s default route
- [Connectivity test] Configure FortiGate firewall policies and virtual IPs
You can create one server instance, such as Windows Server 2012, on the internal protected network. Then create incoming and outgoing firewall policies on the FortiGate and test connectivity.
- Create an instance from Oracle-provided images as desired and locate them in the internal protected network.
- Configure incoming and outgoing firewall policies on the FortiGate. Refer to Configure FortiGate firewall policies and virtual IPs. When using OCI, add required ports in the Security List as explained earlier.
The post (Connectivity test) Configure FortiGate firewall policies and virtual IPs appeared first on Fortinet Cookbook.