fortigate-terraform-deploy
fortinet-gcp-solutions
fortigate-terraform-deploy | fortinet-gcp-solutions | |
---|---|---|
5 | 1 | |
95 | 10 | |
- | - | |
8.2 | 5.8 | |
8 days ago | 3 months ago | |
HCL | Jinja | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
fortigate-terraform-deploy
- Second WAN on standalone FG in Azure
-
AWS HA Active-Passive VDOM exceptions and VIPs
Hello, I got to play around a bit with a pair of Fortigates in Active-Passive mode in AWS, multi-az. The whole setup is terraformed as per Fortigate's code.
- Disable your management interface access from the WAN and ‘untrusted’ LAN segments if you have it enabled. Now. (FortiOS 7.0/7.2)
-
GCP HA Deployment - Questions around proper subnet masks
I found the Terraform examples, made some minor modifications, and did a successful deployment for the VMs. Everything works great on the external interface (Port1). But the Fortigate fails to pass traffic to internal web servers off Port2, despite the Virtual IP, Firewall policy and GCP firewall rules all being configured correctly. Checking Forward Traffic logs, I saw this unusual message:
- Fortigate Aws Gateway Load Balancer
fortinet-gcp-solutions
-
CIDR notation issue
If it really bothers you, you'd have to deploy with MULTI_IP_SUBNET "guest OS feature". This can be done in template if you use deployment manager (as in template here: https://github.com/40net-cloud/fortinet-gcp-solutions/blob/master/FortiGate/modules-dm/singlevm2.jinja) or by copying the image with additional flags if you deploy using gcloud or terraform (ignore some docs you might find, Google recently removed possibility to enforce this flag in terraform or gcloud). It's not possible at all if you deploy from marketplace.
What are some alternatives?
terraform_repo - Terraform samples for Major Cloud Providers and Custom Provider Development
sw_mailcow - Ansible role to deploy mailcow on a linux server
terraform - The place to storing Terraform modules of many providers
infra_wireguard - Ansible Role to provision Wireguard Site-to-Site Tunnels
fortinet-azure-solutions - A set of Azure Templates for getting you started in Azure with Fortinet solutions. This repository is a place for beta releases and work on the latest templates to be published on github.com/fortinet or custom templates.
sw_nextcloud - Ansible role to provision NextCloud servers
terraform-databricks-examples - Examples of using Terraform to deploy Databricks resources
Pulumi - Pulumi - Infrastructure as Code in any programming language. Build infrastructure intuitively on any cloud using familiar languages 🚀
fortinet-zabbix - Zabbix Templates for Fortinet devices
sw_zoneminder - Ansible Role to provision Zoneminder IP-CAM Servers
cloudblock - Cloudblock deploys secure ad-blocking and VPN for all devices. Text and video guides included! 6 supported cloud providers, plus Ubuntu and Raspberry Pi. Cloudblock deploys Wireguard VPN, Pi-Hole DNS Ad-blocking, and DNS over HTTPS in a cloud provider - or locally - using Terraform and Ansible.