The FortiGate can be used in different scenario's to protect assets deployed in Microsoft Azure Virtual Networks.
- Secure hybrid cloud
- Cloud security services hub
- Logical (intent-based) segmentation
- Secure remote access
Click here for a general overview of the different public cloud use cases.
When designing a reliable architecture in Microsoft Azure it is important to take resiliency and High Availability into account. Microsoft has the Microsoft Azure Well-Architected Framework available.
Running the FortiGate Next-Generation Firewall inside of Microsoft Azure can offer different levels of reliability based on these building blocks
Microsoft offers different SLAs on Microsoft Azure based on the deployment used.
- Availability Zone (different datacenter in the same region): 99,99%
- Availability Set (different rack and power): 99,95%
- Single VM with Premium SSD: 99.9%
A cluster of FortiGate VMs will have a cross region/parallel SLA of 99,999975% when using Availability Sets. A cluster of FortiGate VMs will have a cross region/parallel SLA of 99,999999% when using Availability Zones. More information about the uptime of the Azure datacenter can be found on this blog post.
- A Single VM: This single FortiGate VM will process all the traffic and as such become a single point of failure during operations as well as upgrades. This block can also be used in an architecture with multiple regions where a FortiGate is deployed in each region. This setup provides an SLA of 99.9% when using a Premium SSD disk.
More information can be found here
More information can be found here
More information can be found here
More information can be found here
By default these building blocks are using Availability Sets. The Availability Zone templates are also available here for a higher SLA.The FortiGate Next-Generation Firewall can be deployed in Microsoft Azure in different architectures each with their specific properties that can be an advantage or disadvantage in your environment.
- Single VNET: All the building block above are ready to deploy in a new or existing VNET. Select your block above to get started.
- Cloud Security Services Hub (VNET peering): With VNET peering it is possible to have different islands deploying different services managed by diferent internal and/or external teams but to maintain a single point of control going to on-premise, other clouds or public internet. By connecting the different VNETs in a Hub-Spoke setup the Hub can control all traffic. Get started here
- Autoscaling: For application that are fluid in the amount of resources the FortiGate can also be deployed with a autoscaling architecture. This architecture is documented here or a quickstart script is available here
- Azure Virtual WAN: Azure Virtual WAN offers a central connectivity point between regions, on-premise. Fortinet offers automation as well as different deployment modes.
- SD-WAN Connectivity: Connecting the on-premise environment with your Microsoft Azure environment.
Coming soon...
- Multi region - Azure Traffic Manager
- Azure Application Gateway
Fortinet-provided scripts in this and other GitHub projects do not fall under the regular Fortinet technical support scope and are not supported by FortiCare Support Services. For direct issues, please refer to the Issues tab of this GitHub project.
License © Fortinet Technologies. All rights reserved.