Fortinet Document Library

Version:


Table of Contents

FortiSandbox VM on Azure

3.1.0
Download PDF
Copy Link

Creating network security groups

Create two network security groups:

  • The first security group must have inbound rules allowing for HTTPS, SSH traffic, and OFTP.
  • The second security group must have inbound rules allowing for FTP and RDP.
To create network security groups in Azure:
  1. In the Azure portal, click Network security groups in the left pane.
  2. Click Add to create a new network security group for the management port subnet.

    Microsoft Azure dashboard showing the creation of a network security group.

  3. Enter the following information:

    Subscription

    Select a subscription type.

    Resource group

    Select the resource group you created in the Creating a resource group step.

    Name

    Name of the network security group.

    Region

    Select the location you used when you set up the resource group.

  4. Repeat these steps to create a second network security group for the FortiSandbox port2 subnet.
  5. Go to the security groups and configure the inbound rules:
    • Network security group one: HTTPS (TCP 443), SSH traffic (TCP 22), OFTP traffic (TCP 514), and optional: ICAP traffic (TCP 1344), ICAP over SSL (TCP 11344).
    • Network security group two: FTP (TCP 21) and RDP (TCP 3389).
Note

Alternatively, you can create only one network security group with the inbound rules allowing for HTTPS, SSH traffic, OFTP, FTP, and RDP.

Example of inbound rules

Example of outbound rules

Creating network security groups

Create two network security groups:

  • The first security group must have inbound rules allowing for HTTPS, SSH traffic, and OFTP.
  • The second security group must have inbound rules allowing for FTP and RDP.
To create network security groups in Azure:
  1. In the Azure portal, click Network security groups in the left pane.
  2. Click Add to create a new network security group for the management port subnet.

    Microsoft Azure dashboard showing the creation of a network security group.

  3. Enter the following information:

    Subscription

    Select a subscription type.

    Resource group

    Select the resource group you created in the Creating a resource group step.

    Name

    Name of the network security group.

    Region

    Select the location you used when you set up the resource group.

  4. Repeat these steps to create a second network security group for the FortiSandbox port2 subnet.
  5. Go to the security groups and configure the inbound rules:
    • Network security group one: HTTPS (TCP 443), SSH traffic (TCP 22), OFTP traffic (TCP 514), and optional: ICAP traffic (TCP 1344), ICAP over SSL (TCP 11344).
    • Network security group two: FTP (TCP 21) and RDP (TCP 3389).
Note

Alternatively, you can create only one network security group with the inbound rules allowing for HTTPS, SSH traffic, OFTP, FTP, and RDP.

Example of inbound rules

Example of outbound rules