Description |
This article describes how to configure an IP address on the IPSEC tunnel pointing to Azure which can be helpful when FortiGate needs to connect to a VM or resource hosted on Azure.
However, For self-originating traffic like configuration backup 'execute config backup', the source IP address cannot be set. |
Scope | FortiGate v7.2 and below |
Solution |
For this setup example, the phase2-selectors subnet is configured 0.0.0.0/0 for source and destination on the FortiGate.
If necessary, Check the Network Security Group applied on the VM hosted in Azure and Endpoint Firewall(if enabled) to allow the traffic as well.
Technical Tip: Configure IP address on an IPSec tunnel interface Technical Tip: Self-originating traffic over IPSec VPN (For example ping) |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.