Created on 11-08-2024 04:36 AM Edited on 11-08-2024 04:40 AM By Anthony_E
Description | This article describes how to access a loopback interface on a Fortinet firewall in Azure from a different VNet and region. |
Scope | FortiGate. |
Solution |
Port1 ExternalSubnet 10.0.1.0/24 ProtectedSubnet 10.0.5.0/24
This guide provides steps and considerations for enabling access to a loopback interface on a Fortinet firewall deployed in Azure, from a separate VNet and region.
Scenario 1: Enabling Access to a Loopback Interface within the Same VNet.
By default, subnets within the same VNet can communicate each other without any explicit route configuration. However, to allow access to the loopback interface at IP 10.0.6.1 from ProtectedSubnet, it is necessary to add a User-Defined Route (UDR). This UDR should specify the InternalLB at IP 10.0.2.4 as the gateway for traffic destined for the loopback subnet.
Scenario 2: Enabling Access to the Loopback Interface Across Different VNets.
Scenario 3: Standalone Fortinet VM Configuration without InternalLB.
For additional guidance on configuring VNet peering, refer to the Azure documentation on VNet Peering Configuration. For additional guidance on configuring User-Defined Routes, refer to the Azure documentation on User-Defined Routes Configuration. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.