azure-templates
fortigate-terraform-deploy
Our great sponsors
azure-templates | fortigate-terraform-deploy | |
---|---|---|
22 | 5 | |
84 | 95 | |
- | - | |
5.6 | 8.2 | |
12 days ago | 3 days ago | |
HCL | HCL | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
azure-templates
-
Using multiple public IP for outgoing in Azure FortiGate
Have you read through https://github.com/fortinet/azure-templates/blob/main/FortiGate/Active-Passive-ELB-ILB/doc/config-outbound-nat-considerations.md
- Azure Fortigate Template - not deploying
- Fortitgate Azure Template - not working
- Azure Fortigate HA Active-Passive Multiple Public IP Address NAT Issue
- Redundancy if Azure Issues....
-
HA active passive FortiGate VM pair (SDN) in Azure - interface IPs don't failover?
We deployed an HA active passive FortiGate VM pair (SDN) in Azure using the GitHub templates – Link. This has been working well and this FortiGate pair act as the Fabric Root in our topology.
- FortiGate Active/Active HA in Azure using ILB/ELB - how does Outbound internet work?
-
Fortigate Azure SNAT question
I think this page isn't new to you: https://github.com/fortinet/azure-templates/tree/main/FortiGate
- Azure - Fortigate in Virtual WAN
- Azure Fortigate VM Can't ping test VM on protected subnet
fortigate-terraform-deploy
- Second WAN on standalone FG in Azure
-
AWS HA Active-Passive VDOM exceptions and VIPs
Hello, I got to play around a bit with a pair of Fortigates in Active-Passive mode in AWS, multi-az. The whole setup is terraformed as per Fortigate's code.
- Disable your management interface access from the WAN and ‘untrusted’ LAN segments if you have it enabled. Now. (FortiOS 7.0/7.2)
-
GCP HA Deployment - Questions around proper subnet masks
I found the Terraform examples, made some minor modifications, and did a successful deployment for the VMs. Everything works great on the external interface (Port1). But the Fortigate fails to pass traffic to internal web servers off Port2, despite the Virtual IP, Firewall policy and GCP firewall rules all being configured correctly. Checking Forward Traffic logs, I saw this unusual message:
- Fortigate Aws Gateway Load Balancer
What are some alternatives?
fortigate-autoscale-azure - An implementation of FortiGate Autoscale for the Microsoft Azure platform API with a Cosmos DB storage backend.
terraform_repo - Terraform samples for Major Cloud Providers and Custom Provider Development
fortinet-azure-solutions - A set of Azure Templates for getting you started in Azure with Fortinet solutions. This repository is a place for beta releases and work on the latest templates to be published on github.com/fortinet or custom templates.
terraform - The place to storing Terraform modules of many providers
terraform-kubestack - Kubestack is a framework for Kubernetes platform engineering teams to define the entire cloud native stack in one Terraform code base and continuously evolve the platform safely through GitOps.
typhoon - Minimal and free Kubernetes distribution with Terraform
terraform-databricks-examples - Examples of using Terraform to deploy Databricks resources
fortinet-zabbix - Zabbix Templates for Fortinet devices
cloudblock - Cloudblock deploys secure ad-blocking and VPN for all devices. Text and video guides included! 6 supported cloud providers, plus Ubuntu and Raspberry Pi. Cloudblock deploys Wireguard VPN, Pi-Hole DNS Ad-blocking, and DNS over HTTPS in a cloud provider - or locally - using Terraform and Ansible.
learning-cloud - Courses, sample code, articles & screencasts - AWS, Azure, & GCP
images - Public Chainguard Images