Fortinet Document Library

Version:


Table of Contents

About FortiGate for Azure

Deploying FortiGate on Azure

Deploying auto scaling on Azure

Single FortiGate-VM Deployment

Use case: High availability for FortiGate on Azure

Use case: Automatically updating dynamic addresses using Fabric connector

Resources

Upgrade Path Tool
6.0.0
Copy Link

Connecting to the FortiGate-VM

  1. Open the publicip- resource and copy the IP address assigned by Azure.
  2. In a web browser, connect to the IP address using HTTPS on port 8443. You can also use an SSH client on port 22.

  3. The system displays a warning that the certificate is not trusted. This is expected since the FortiGate is using a self-signed certificate. If desired, replace the certificate with a signed certificate.

  4. Sign in with the credentials specified in the Azure template parameters.
  5. If you chose a BYOL deployment, you must upload a license and reboot the FortiGate before continuing. See Registering and Downloading Your License.

Resources

Connecting to the FortiGate-VM

  1. Open the publicip- resource and copy the IP address assigned by Azure.
  2. In a web browser, connect to the IP address using HTTPS on port 8443. You can also use an SSH client on port 22.

  3. The system displays a warning that the certificate is not trusted. This is expected since the FortiGate is using a self-signed certificate. If desired, replace the certificate with a signed certificate.

  4. Sign in with the credentials specified in the Azure template parameters.
  5. If you chose a BYOL deployment, you must upload a license and reboot the FortiGate before continuing. See Registering and Downloading Your License.