Fortinet white logo
Fortinet white logo

Azure Administration Guide

Connecting to the FortiGate-VM instances

Connecting to the FortiGate-VM instances

To connect to a FortiGate-VM, you can use SSH commands or the web GUI using HTTPS with the IPv4 public IP address.

From the resource group Overview page, click the external load balancer name to load it. From the navigation column, click Inbound NAT Rules. For each instance in the scale set you will see two rules:

  • One rule for SSH access to the instance.
  • One rule for HTTPS access to the instance.

The Inbound NAT Rules page will look as shown below:

Inbound NAT Rules page

To access a FortiGate-VM instance, you need the Frontend IP address and port number of the instance you wish to connect to. The Frontend IP address is listed on the Inbound NAT Rules page. To obtain the port number, click the entry for the method you will use to access the instance (SSH or HTTPS). The port number will be listed midway down the page. (The IP address is also listed).

An example of an SSH access rule is shown below:

Example SSH access rule

Connecting to the FortiGate-VM instances

Connecting to the FortiGate-VM instances

To connect to a FortiGate-VM, you can use SSH commands or the web GUI using HTTPS with the IPv4 public IP address.

From the resource group Overview page, click the external load balancer name to load it. From the navigation column, click Inbound NAT Rules. For each instance in the scale set you will see two rules:

  • One rule for SSH access to the instance.
  • One rule for HTTPS access to the instance.

The Inbound NAT Rules page will look as shown below:

Inbound NAT Rules page

To access a FortiGate-VM instance, you need the Frontend IP address and port number of the instance you wish to connect to. The Frontend IP address is listed on the Inbound NAT Rules page. To obtain the port number, click the entry for the method you will use to access the instance (SSH or HTTPS). The port number will be listed midway down the page. (The IP address is also listed).

An example of an SSH access rule is shown below:

Example SSH access rule