Chapter 10- Cloud Technologies
10-3 Site to Site VPN between FortiGate on premise and FortiGate in the Azure
Learning Objectives
- Configure a VPN Wizard in Azure
- Configure site-to-site VPN between FortiGate on premise and Azure
- Identify FortiGate subnets in Azure

Step 1- On Premise FortiGate Configuration
Device | Interface | IP address |
FortiGate | Port 1 | DHCP Client |
Port 2 | 192.168.10.1/24 | |
WebTerm | Eth0 | 192.168.10.2/24 |
1- Configure the interfaces of the firewall. Port2 by default is an internal interface and name as a “LAN” and Port1 is an external interface and name as a “WAN”

2- Create a site-to-site VPN from IPSEC Wizard as Figures 10-51- to 10-53.



3- Create a static route to the default gateway.

Step 2 – Azure Configuration
1- Create a FortiGate firewall in Azure and configure the interfaces. You need to do all steps in the previous section(Section 10-1).
2- Create a VPN from IPSEC Wizard as Figures 10-55 to 10-57.



3-Add a Linux or Windows Virtual Machine to Protected subnet. You don’t need to enable public IP address. Your private IP address should be in the range of 10.0.2.0/24.
4-Go to VPN> IPSEC Tunnels and check status of the tunnel.

5- You should be able to ping from WebTerm to the Virtual Machine.
