(Connectivity test) Configure FortiGate firewall policies and virtual IPs

Facebooktwittergoogle_plusredditpinterestlinkedinFacebooktwittergoogle_plusredditpinterestlinkedin

This recipe is part of the process of deploying FortiGate for OCI. Note OCI is only supported by FortiOS 5.4.8. See below for the rest of the recipes in this process:

  1. Create a virtual cloud network and public-facing subnets
  2. Create a security list
  3. Create a route table for the internal network
  4. Create internal network subnet
  5. Obtain the deployment image file and place it in your bucket
  6. Import the image
  7. Launch the FortiGate instance
  8. Attach a storage to FortiGate
  9. Access the FortiGate
  10. Create the second vNIC
  11. Configure the second vNIC on the FortiGate
  12. Change the protected network’s default route
  13. [Connectivity test] Configure FortiGate firewall policies and virtual IPs

You can create one server instance, such as Windows Server 2012, on the internal protected network. Then create incoming and outgoing firewall policies on the FortiGate and test connectivity.

  1. Create an instance from Oracle-provided images as desired and locate them in the internal protected network.
  2. Configure incoming and outgoing firewall policies on the FortiGate. Refer to Configure FortiGate firewall policies and virtual IPs. When using OCI, add required ports in the Security List as explained earlier.
  • Was this helpful?
  • Yes   No