This article describes on adding an SDN connector in FortiGate VM deployed in AWS VPC and its use cases along with troubleshooting steps.
FortiGate VM deployed in AWS VPC. If it is not already deployed, follow the steps in Deploying FortiGate-VM from AWS marketplace - FortiGate Public Cloud AWS administration guide to set it up.
Create a policy using JSON to give permissions to the IAM role that will be later assigned to the FortiGate VM.
{
"Version": "2012-10-17",
"Statement": [
{
"Action": [
"ec2:Describe*",
"ec2:AssociateAddress",
"ec2:AssignPrivateIpAddresses",
"ec2:UnassignPrivateIpAddresses",
"ec2:ReplaceRoute",
"config:BatchGetResourceConfig",
"eks:DescribeCluster",
"eks:ListClusters"
],
"Resource": "*",
"Effect": "Allow"
}
]
}
The 'ACTION' field is responsible for providing various kinds of access FortiGate needs to be given to make changes in the AWS environment.
The 'Resource' field is responsible for what kind of resources is the FortiGate allowed to alter/Get.
Note: Both action 'eks' are optional for normal operation, but if they are removed, an error message will appear while debugging:
"curl response err, 403"
"not authorized to perform: eks:ListClusters on resource: arn:aws:eks:xyz"
If there is no such permission, the API will fail with an error message. However, this will not impact other dynamic address collection. See AWS Administration Guide - AWS EKS SDN connector.
After picking the appropriate JSON rules, select Create policy. Provide a name and add it to the IAM role, then select Next:
Select the IAM Role created in step 3 and select Update IAM role.
Now grab the VPC-id from the AWS EC2 dashboard:
Fill that information into the FortiGate SDN wizard and select 'OK':
Verification and Troubleshooting:
diagnose debug application awsd -1
diag debug en
The debug outputs and the JSON policies defined in the ROLE allow the FortiGate to learn the VPC endpoints, and additionally provide access to alter the AWS environment using the API.
Usage:
There can be many use cases for AWS-SDN depending upon requirements, but some of the most common ones are listed below:
This can be achieved by referring to the following documents:
{
"Version": "2012-10-17",
"Statement": [
{
"Action": [
"ec2:Describe*",
"ec2:AssociateAddress",
"ec2:AssignPrivateIpAddresses",
"ec2:UnassignPrivateIpAddresses",
"ec2:ReplaceRoute"
],
"Resource": "*",
"Effect": "Allow"
}
]
}
Consult AWS administration guide - Updating the route table and adding an IAM policy to implement a successful failover.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.