Skip to content

Commit

Permalink
FGT UMS: outbound rule on lb
Browse files Browse the repository at this point in the history
  • Loading branch information
jvhoof committed Dec 4, 2024
1 parent 5b7b94f commit 563d0eb
Showing 1 changed file with 18 additions and 1 deletion.
19 changes: 18 additions & 1 deletion FortiGate/Autoscale/ums/mainTemplate.json
Original file line number Diff line number Diff line change
Expand Up @@ -452,7 +452,7 @@
"fgtVMSSName": "[if(equals(parameters('fortiGateName'),''),concat(parameters('fortiGateNamePrefix'),'-fgt-ums'),parameters('fortiGateName'))]",
"customDataFMG": "[if(equals(parameters('fortiManager'),'yes'),concat('\nconfig system central-management\nset type fortimanager\n set fmg ',parameters('fortiManagerIP'),'\nset serial-number ', parameters('fortiManagerSerial'), '\nend\n config system interface\n edit port1\n append allowaccess fgfm\n end\n config system interface\n edit port2\n append allowaccess fgfm\n end\nexec central-mgmt register-device ',parameters('fortiManagerSerial'),' ',parameters('fortiManagerRegisterPassword'),'\n'),'')]",
"customDataAutoScale": "[concat('config system auto-scale\nset status enable\nset sync-interface port2\nset hb-interval 30\nset role primary\nset callback-url ',parameters('fortiManagerIP'),'\nset cloud-mode ums\nset psksecret ',parameters('adminPassword'),'\nend\n')]",
"customDataBody": "[concat('config system global\nset admin-sport 8443\nset hostname ', variables('fgtVMSSName'), '\nend\nconfig system sdn-connector\nedit AzureSDN\nset type azure\nnext\nend\nconfig router static\nedit 1\nset dst ', parameters('vnetAddressPrefix'), '\nset device port2\nset distance 5\nset gateway ', variables('sn2GatewayIP'), '\nnext\nedit 2\nset dst 168.63.129.16 255.255.255.255\nset device port2\nset distance 5\nset gateway ', variables ('sn2GatewayIP'), '\nnext\nend\nconfig system interface\nedit port1\nset mode dhcp\nset description external\nset allowaccess ping ssh https\nnext\nedit port2\nset mode dhcp\nset description internal\nset allowaccess ping ssh https\nnext\nend\n', variables('customDataAutoScale'), variables('customDataFMG'), parameters('fortiGateAdditionalCustomData'), '\n')]",
"customDataBody": "[concat('config system global\nset admin-sport 8443\nset hostname ', variables('fgtVMSSName'), '\nend\nconfig system sdn-connector\nedit AzureSDN\nset type azure\nnext\nend\nconfig router static\nedit 1\nset dst ', parameters('vnetAddressPrefix'), '\nset device port2\nset distance 5\nset gateway ', variables('sn2GatewayIP'), '\nnext\nedit 2\nset dst 168.63.129.16 255.255.255.255\nset device port2\nset distance 5\nset gateway ', variables ('sn2GatewayIP'), '\nnext\nend\nconfig system interface\nedit port1\nset mode dhcp\nset description external\nset allowaccess ping ssh https probe-response\nnext\nedit port2\nset mode dhcp\nset description internal\nset allowaccess ping ssh https probe-response\nnext\nend\n', variables('customDataAutoScale'), variables('customDataFMG'), parameters('fortiGateAdditionalCustomData'), '\n')]",
"fgtCustomData": "[base64(variables('customDataBody'))]",
"routeTableProtectedName": "[concat(parameters('fortiGateNamePrefix'),'-routetable')]",
"routeTableProtectedId": "[resourceId('Microsoft.Network/routeTables',variables('routeTableProtectedName'))]",
Expand Down Expand Up @@ -741,6 +741,23 @@
}
}
],
"outboundRules": [
{
"name": "outbound",
"properties": {
"allocatedOutboundPorts": 0,
"frontendIPConfigurations": [
{
"id": "[variables('externalLBFEId')]"
}
],
"backendAddressPool": {
"id": "[variables('externalLBBEId')]"
},
"protocol": "All"
}
}
],
"probes": [
{
"properties": {
Expand Down

0 comments on commit 563d0eb

Please sign in to comment.