FortiGate Deployment¶
In this section, we'll deploy FortiGate firewalls in a high-availability configuration with load balancers to provide robust security for your connectivity hub. You may have heard of the name Load Balancer (LB) sandwich - we are deploying the firewalls between two LB instances to ensure symetric flows of traffic between services behind and infront of the firewalls.
On this page¶
- High Availability Overview
- Understanding Availability Zones
- Template Deployment
- Configuration Parameters
- Load Balancer Setup
- Licensing Configuration
- Deployment Verification
High Availability Overview¶
We are now ready to deploy the HA FortiGates using a template. For additional information regarding the various templates available and their respective SLAs for failover please see FortiGate Azure Addministration Guide.
Template Deployment¶
-
In the top left corner of the screen click on rg-hub-azlab in the breadcrumb trail.
-
Click on Create.
-
Enter Fortigate in the search box then click on Fortinet FortiGate Next-Generation Firewall.
-
Click on the dropdown for Create for Fortinet FortiGate Next-Generation Firewall (not the option that ends with VM)
-
Click on Active-Passive HA with ELB/ILB in the drop down menu.
Configuration Parameters¶
-
Select rg-hub-azlab in the Resource group drop down.
-
Set region to Central Canada.
-
Set the FortiGate administrative username to
fortinetuser
-
Set the password to
PizzaDay12345!
-
Type the same password in the Confirm password box:
PizzaDay12345!
-
Set the FortiGate Name Prefix to azlab
-
Click Next.
-
Ensure FortiGate Image Version is set to 7.4.8.
-
Ensure Availability Option is set to Availability Zones.
Understanding Availability Zones¶
What are availability zones?
Wouldn't it be nice if we all had a spare home if something were to happen to one of them? Availability zones help create redundancy and high availability.
According to learn.microsoft.com, Availability Zones are separated groups of datacenters within a region. Each availability zone has independent power, cooling, and networking infrastructure, so that if one zone experiences an outage, then regional services, capacity, and high availability are supported by the remaining zones.
Need to replicate the diagram below.
Licensing Configuration¶
-
Scroll down.
-
Check the 'My organization is using the FortiFlex subscription service' box.
-
You were provided FortFlex tokens you will use those tokens to license these firewalls. Do not copy the tokens in the screenshot below.
-
Enter one of the provided tokens for FortiGate A.
-
Enter one of the provided tokens for FortiGate B.
-
Click Next.
-
Click Next.
-
We will now map the subnets we created earlier to the FortiGate.
-
Click on the drop down menu beside Virtual network and select vnet-hub-azlab.
-
Click on the dropdown menu beside External subnet and select Public.
-
Click on the dropdown menu beside Internal subnet and select Private
-
Click on the HA Sync subnet dropdown and select HA_Intra-Cluster.
-
Click on the HA Management subnet dropdown and select Management.
-
Notice we are also creating a new subnet called Protected A subnet; leave it a the default setting.
-
If needed, scroll down the Accelerated networking and select disabled
-
Confirm your configuration looks like the screenshot below.
Load Balancer Setup¶
-
Now we will create public IP addresses for the external load balancer and FortiGate management interfaces.
-
Click create new under the External Load Balancer and edit the name to match the screenshot below.
-
Click OK at the bottom of the screen.
-
Repeat this process for FortiGate A and B management and match the name in the screen shots below.
FortiGate A and FortiGate B:
-
When you are finished, ensure your configuration looks like the screenshot below.
-
Click Next at the bottom of the page until you reach the Review and create page.
-
Allow the final validation to run. This may take up to 30 seconds.
-
Click Create at the bottom of the page.
Deployment Verification¶
-
Eventually your screen will refresh show something similar to the one below.
config system ha set group-name "azure-ha-cluster" set mode a-p set hbdev "port3" 50 set ha-mgmt-status enable ha-direct
-
When your deployment is complete it will look similar to the screen shot below. This can take a few minutes to display.
Next Step: Testing & Validation to validate your deployment and test connectivity flows.