Fortinet Document Library

Version:


Table of Contents

About FortiGate for Azure

Deploying FortiGate on Azure

Deploying auto scaling on Azure

Single FortiGate-VM Deployment

Use case: High availability for FortiGate on Azure

Use case: Automatically updating dynamic addresses using Fabric connector

Resources

Upgrade Path Tool

Related Videos

Dynamic policy using Azure connector

  • 1,864 views
  • 1 years ago
6.0.0
Copy Link

Overview

In this section, you configure FortiGate SDN (or Fabric) connector for use with Azure.

In the FortiGate interface, these connectors are called Fabric connectors and are software-defined network (SDN) connectors that provide integration and orchestration of Fortinet products with key SDN solutions. The Fortinet Security Fabric provides visibility into your security posture across multiple cloud networks, spanning private, public, and software as a service (SaaS) clouds. By using the Fabric connector for use with the Azure IaaS, changes to attributes in the Azure environment can be automatically updated in the Fortinet Security Fabric.

Before installing and configuring the Fabric Connector for Azure, the following Azure infrastructure and FortiGate components should be in place :

  • A valid Azure account and subscription. This can be one established by your organization or simply one of the free trial options available from Azure. If you do not specify the resource group, you can find all resources that the account has access to.
  • You should have deployed a FortiGate-VM in Azure
  • An IPv4 outbound policy from the FortiGate-VM on port 2 (internal) to port 1 (external)
  • A VM instance of a resource in the Azure environment. In this instance, a Linux server has been used for testing the assigning of a tag.

There can only be one Fabric connector for each type of environment (AWS/Azure/VMware NSX, etc.) on a FortiGate. In this section, it is a Fabric connector for Azure. If the FortiGate is a virtual device in one of those environments, it is likely the only connector configured.

Resources

Related Videos

Dynamic policy using Azure connector

  • 1,864 views
  • 1 years ago

Overview

In this section, you configure FortiGate SDN (or Fabric) connector for use with Azure.

In the FortiGate interface, these connectors are called Fabric connectors and are software-defined network (SDN) connectors that provide integration and orchestration of Fortinet products with key SDN solutions. The Fortinet Security Fabric provides visibility into your security posture across multiple cloud networks, spanning private, public, and software as a service (SaaS) clouds. By using the Fabric connector for use with the Azure IaaS, changes to attributes in the Azure environment can be automatically updated in the Fortinet Security Fabric.

Before installing and configuring the Fabric Connector for Azure, the following Azure infrastructure and FortiGate components should be in place :

  • A valid Azure account and subscription. This can be one established by your organization or simply one of the free trial options available from Azure. If you do not specify the resource group, you can find all resources that the account has access to.
  • You should have deployed a FortiGate-VM in Azure
  • An IPv4 outbound policy from the FortiGate-VM on port 2 (internal) to port 1 (external)
  • A VM instance of a resource in the Azure environment. In this instance, a Linux server has been used for testing the assigning of a tag.

There can only be one Fabric connector for each type of environment (AWS/Azure/VMware NSX, etc.) on a FortiGate. In this section, it is a Fabric connector for Azure. If the FortiGate is a virtual device in one of those environments, it is likely the only connector configured.