Chapter 10- Cloud Technologies
10-3 Site to Site VPN between FortiGate on premise and FortiGate in the Azure
- Configure a VPN Wizard in Azure
- Configure site-to-site VPN between FortiGate on premise and Azure
- Identify FortiGate subnets in Azure
Step 1- On Premise FortiGate Configuration
|FortiGate||Port 1||DHCP Client|
1- Configure the interfaces of the firewall. Port2 by default is an internal interface and name as a “LAN” and Port1 is an external interface and name as a “WAN”
2- Create a site-to-site VPN from IPSEC Wizard as Figures 10-51- to 10-53.
3- Create a static route to the default gateway.
Step 2 – Azure Configuration
1- Create a FortiGate firewall in Azure and configure the interfaces. You need to do all steps in the previous section(Section 10-1).
2- Create a VPN from IPSEC Wizard as Figures 10-55 to 10-57.
3-Add a Linux or Windows Virtual Machine to Protected subnet. You don’t need to enable public IP address. Your private IP address should be in the range of 10.0.2.0/24.
4-Go to VPN> IPSEC Tunnels and check status of the tunnel.
5- You should be able to ping from WebTerm to the Virtual Machine.