This recipe is part of the process of deploying FortiGate HA load-balancing for Microsoft Azure using Azure load balancer. See below for the rest of the recipes in this process:
- Basic concepts
- Traffic flow
- Azure load balancer
- Inbound NAT rules
- Load balancing rules
- Locate FortiGate HA for Azure in the Azure portal or Azure marketplace
- Determine your licensing model
- Configure FortiGate initial parameters
- Create VNet and subnets in network settings
- Select Azure instance type
- Assign Azure IP address
- Validate deployment resources
- Create FortiGate instances
- Connect to the FortiGate
- [Use case] Set up a Windows Server in the protected network
- Configure FortiGate firewall policies and virtual IPs
- [Failover test] Create load balancing rules and access the Windows Server via remote desktop
- Click Virtual machine size.
- Select the desired disk type (HDD or SSD, although SSD is recommended) and select an Azure instance type to which you wish to deploy FortiGate. Only tested and supported instances appear. If no recommended types appear in the Suggested disk type dropdown list, select View all, then click Select.
If the desired Azure instance type is not appearing, contact Fortinet Azure support via the information in the marketplace product page. Note certain supported instance types may be removed or added without notification.
- Click OK to end configuring network and instance settings.
Latest posts by In Hye Lee (see all)
- Connect to the FortiGate - February 21, 2018
- Deploying FortiGate for GCP - February 21, 2018
- (Connectivity test) Configure FortiGate firewall policies and virtual IPs - February 14, 2018