Version:


Table of Contents

6.0.0
Download PDF
Copy Link

Preparing for a deployment

The deployment section in this guide assumes that you have already created a Virtual Cloud Network (VCN) and relevant network resources, such as route tables and subnets. You must also configure a Security List so that you can access FortiAuthenticator over the Internet while closing unnecessary ports. At a minimum, you must open TCP port 443 and 22 to allow incoming access to the FortiAuthenticator management GUI and SSH console for initial configuration. See the Ports and Protocols document on the Fortinet Document Library.

You can obtain the deployment image, import the file into the OCI portal, and then launch the FortiAuthenticator-VM instance. See Creating an instance by importing an image.

Preparing for a deployment

The deployment section in this guide assumes that you have already created a Virtual Cloud Network (VCN) and relevant network resources, such as route tables and subnets. You must also configure a Security List so that you can access FortiAuthenticator over the Internet while closing unnecessary ports. At a minimum, you must open TCP port 443 and 22 to allow incoming access to the FortiAuthenticator management GUI and SSH console for initial configuration. See the Ports and Protocols document on the Fortinet Document Library.

You can obtain the deployment image, import the file into the OCI portal, and then launch the FortiAuthenticator-VM instance. See Creating an instance by importing an image.