Routing through Fortigate

Anonymous
2023-06-29T17:16:20.52+00:00

Hello,

I'm new in Azure and have question regarding routing.

My scenario is next:

I have resource group "Firewall" where I added route table, virtual networks and Fortigate as a Default gateway. I separated virtual networks to several subnets(Subnet-1, Subnet-2). My aim is route and filter all network through this Fortigate.

Then I added resource group "group-1" assign one subnet(Subnet-1) from resource group "Firewall" and then added one pc to this resource.

Then I added resource group "group-2" assign one subnet(Subnet-2) from resource group "Firewall" and then added one pc to this resource.

I would like to restrict access from group-1 to group-2. I added deny policy in to Fortigate but traffic still pass. I can restrict access from group-1\group-2 to Internet from Fortigate, but cant restrict between group-1 and group-2.

I don't know why?

Azure ExpressRoute
Azure ExpressRoute
An Azure service that provides private connections between Azure datacenters and infrastructure, either on premises or in a colocation environment.
373 questions
{count} votes

3 answers

Sort by: Most helpful
  1. Deleted

    This answer has been deleted due to a violation of our Code of Conduct. The answer was manually reported or identified through automated detection before action was taken. Please refer to our Code of Conduct for more information.


    Comments have been turned off. Learn more

  2. ChaitanyaNaykodi-MSFT 26,101 Reputation points Microsoft Employee
    2023-06-30T01:54:24.65+00:00

    @Anonymous

    Thank you for reaching out.

    If I have understood the question correctly, you want all the traffic from your Virtual Network via Fortinet, but the PCs deployed in the Subnet-1 and Subnet-2 in the same Virtual Network still can communicate with each other even though you have restricted this communication in Fortinet.

    Based on my understanding above, I think the PCs are stilll able to communicate with each other because Azure routes traffic between all subnets within a virtual network, by default. In order to restrict this access you will have to create custom UDR. In the route table you need to create a route for Subnet-1 with the Next Hop as Virtual Appliance and link this route table to Subnet-2, similarly you can create another route table and link it to Subnet-1.

    A similar scenario is explained clearly in this tutorial. You can follow it to get more information on the required routes.

    Hope this answers your query. If I did not understand your questions clearly, it will help if you could provide a rough network diagram of your set-up. Thank you!


    ​​Please "Accept the answer" if the information helped you. This will help us and others in the community as well.



  3. Anonymous
    2023-07-04T05:14:44.4733333+00:00

    Still waiting your help

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.