Created on
‎11-08-2024
04:36 AM
Edited on
‎12-22-2024
11:40 PM
By
Anthony_E
Description | This article describes how to access a loopback interface on a Fortinet firewall in Azure from a different VNet and region. |
Scope | FortiGate. |
Solution |
Port1 ExternalSubnet 10.0.1.0/24 ProtectedSubnet 10.0.5.0/24
This guide provides steps and considerations for enabling access to a loopback interface on a Fortinet firewall deployed in Azure, from a separate VNet and region.
Scenario 1: Enabling Access to a Loopback Interface within the Same VNet.
By default, subnets within the same VNet can communicate each other without any explicit route configuration. However, to allow access to the loopback interface at IP 10.0.6.1 from ProtectedSubnet, it is necessary to add a User-Defined Route (UDR). This UDR should specify the InternalLB at IP 10.0.2.4 as the gateway for traffic destined for the loopback subnet.
Scenario 2: Enabling Access to the Loopback Interface Across Different VNets.
Scenario 3: Standalone Fortinet VM Configuration without InternalLB.
For additional guidance on configuring VNet peering, refer to the Azure documentation on VNet Peering Configuration. For additional guidance on configuring User-Defined Routes, refer to the Azure documentation on User-Defined Routes Configuration.
The following example represents the access to the Loopback Interface Across Different VNETs (Scenario 2): Connecting two or more Virtual Networks in Azure is achieved by virtual network peering.
Step 1: Create a Loopback interface and allocate a dedicated subnet in the same address space as FortiGate VNET.
Step 2: Create the same subnet to the FortiGate VNET in Azure.
Note: Leave all other settings as default.
Step 3: Create a Route Table and associate it with the other VNET where Host-VM (WindowsPC) is located.
From the left menu pane, navigate to 'Routes' and fill in all the required information as follows:
Step 4: Associate the created route table to the subnet where the Host-VM is located.
Step 5: To prevent asymmetric routing, create a static route for the Host-VM subnet, pointing towards 'port2' of the FortiGate.
config router static
Step 6: Adjust the firewall policies to allow traffic from 'port2' to the Loopback interface.
config firewall policy
Step 7: Check the connectivity between the Host-VM and Loopback Interface of the FortiGate.
|