Description | This article will explain options for restricting admin access to the FortiGate VM deployed on Azure. Restricting admin access to the FortiGate-VM deployed on Azure has the same options as a FortiGate on-Prem. FortiGate-VM deployed on Azure will be more likely to be accessed on the external interface of the FortiGate-VM by an Administrator, but some user setup may require not allowing the FortiGate admin login page to be accessed publicly. |
Scope | FortiGate-VM on Azure. |
Solution |
To Restrict HTTPS/GUI access, Possible options are:
Rearrange the order of the NSG rule just like how the Firewall Policy on FortiGate works.
For this example, The first rule is set to deny HTTPS Inbound to the FortiGate. Any source from the Public Internet will not have access and will not see the FortiGate admin login page. The second rule will still allow other admin access such as SSH, Telnet, etc.
Technical Tip: Use local-in policy to restrict unauthorized login attempts to administrative access ... |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.