Management Isolation Options

Overview

The FortiGate autoscale solution provides multiple approaches to isolating management traffic from data plane traffic, ranging from shared interfaces to complete physical network separation.

This page covers three progressive levels of management isolation, allowing you to choose the appropriate security posture for your deployment requirements.


Option 1: Combined Data + Management (Default)

Architecture Overview

In the default configuration, port2 serves dual purposes:

  • Data plane: Internet egress for inspected traffic (in 2-ARM mode)
  • Management plane: GUI, SSH, SNMP access

Configuration

enable_dedicated_management_eni = false
enable_dedicated_management_vpc = false

Characteristics

  • Simplest configuration: No additional interfaces or VPCs required
  • Lower cost: Minimal infrastructure overhead
  • Shared security groups: Same rules govern data and management traffic
  • Single failure domain: Management access tied to data plane availability

When to Use

  • Development and testing environments
  • Proof-of-concept deployments
  • Budget-constrained projects
  • Simple architectures without compliance requirements

Option 2: Dedicated Management ENI

Architecture Overview

Port2 is removed from the data plane and dedicated exclusively to management functions. FortiOS configures the interface with set dedicated-to management, placing it in an isolated VRF with independent routing.

Dedicated Management ENI Dedicated Management ENI

Configuration

enable_dedicated_management_eni = true

How It Works

  1. Dedicated-to attribute: FortiOS configures port2 with set dedicated-to management
  2. Separate VRF: Port2 is placed in an isolated VRF with independent routing table
  3. Policy restrictions: FortiGate prevents creation of firewall policies using port2
  4. Management-only traffic: GUI, SSH, SNMP, and FortiManager/FortiAnalyzer connectivity

FortiOS Configuration Impact

The dedicated management ENI can be verified in the FortiGate GUI:

GUI Dedicated Management ENI GUI Dedicated Management ENI

The interface shows the dedicated-to: management attribute and separate VRF assignment, preventing data plane traffic from using this interface.

Important Compatibility Notes

Warning

Critical Limitation: 2-ARM + NAT Gateway + Dedicated Management ENI

When combining:

  • firewall_policy_mode = "2-arm"
  • access_internet_mode = "nat_gw"
  • enable_dedicated_management_eni = true

Port2 will NOT receive an Elastic IP address. This is a valid configuration, but imposes connectivity restrictions:

  • ❌ Cannot access FortiGate management from public internet
  • βœ… Can access via private IP through AWS Direct Connect or VPN
  • βœ… Can access via management VPC (see Option 3 below)

If you require public internet access to the FortiGate management interface with NAT Gateway egress, either:

  1. Use access_internet_mode = "eip" (assigns EIP to port2)
  2. Use dedicated management VPC with separate internet connectivity (Option 3)
  3. Implement AWS Systems Manager Session Manager for private connectivity

Characteristics

  • Clear separation of concerns: Management traffic isolated from data plane
  • Independent security policies: Separate security groups for management interface
  • Enhanced security posture: Reduces attack surface on management plane
  • Moderate complexity: Requires additional subnet and routing configuration

When to Use

  • Production deployments requiring management isolation
  • Security-conscious environments
  • Architectures without dedicated management VPC
  • Compliance requirements for management plane separation

Option 3: Dedicated Management VPC (Full Isolation)

Architecture Overview

The dedicated management VPC provides complete physical network separation by deploying FortiGate management interfaces in an entirely separate VPC from the data plane.

Dedicated Management VPC Architecture Dedicated Management VPC Architecture

Configuration

enable_dedicated_management_vpc = true
dedicated_management_vpc_tag = "your-mgmt-vpc-tag"
dedicated_management_public_az1_subnet_tag = "your-az1-subnet-tag"
dedicated_management_public_az2_subnet_tag = "your-az2-subnet-tag"

Benefits

  • Physical network separation: Management traffic never traverses inspection VPC
  • Independent internet connectivity: Management VPC has dedicated IGW or VPN
  • Centralized management infrastructure: FortiManager and FortiAnalyzer deployed in management VPC
  • Separate security controls: Management VPC security groups independent of data plane
  • Isolated failure domains: Management VPC issues don’t affect data plane

Management VPC Creation Options

The existing_vpc_resources template creates the management VPC with standardized tags that the simplified template automatically discovers.

Advantages:

  • Management VPC lifecycle independent of inspection VPC
  • FortiManager/FortiAnalyzer persistence across inspection VPC redeployments
  • Separation of concerns for infrastructure management

Default Tags (automatically created):

Default Tags Management VPC Default Tags Management VPC Default Tags Management Subnets Default Tags Management Subnets

Configuration (terraform.tfvars):

enable_dedicated_management_vpc = true
dedicated_management_vpc_tag = "acme-test-management-vpc"
dedicated_management_public_az1_subnet_tag = "acme-test-management-public-az1-subnet"
dedicated_management_public_az2_subnet_tag = "acme-test-management-public-az2-subnet"

Option B: Use Existing Management VPC

If you have an existing management VPC with custom tags, configure the template to discover it:

Non-Default Tags Management Non-Default Tags Management

Configuration:

enable_dedicated_management_vpc = true
dedicated_management_vpc_tag = "my-custom-mgmt-vpc-tag"
dedicated_management_public_az1_subnet_tag = "my-custom-mgmt-public-az1-tag"
dedicated_management_public_az2_subnet_tag = "my-custom-mgmt-public-az2-tag"

The template uses these tags to locate the management VPC and subnets via Terraform data sources.

Behavior When Enabled

When enable_dedicated_management_vpc = true:

  1. Automatic ENI creation: Template creates dedicated management ENI (port2) in management VPC subnets
  2. Implies dedicated management ENI: Automatically sets enable_dedicated_management_eni = true
  3. VPC peering/TGW: Management VPC must have connectivity to inspection VPC for HA sync
  4. Security group creation: Appropriate security groups created for management traffic

Network Connectivity Requirements

Management VPC β†’ Inspection VPC Connectivity:

  • Required for FortiGate HA synchronization between instances
  • Typically implemented via VPC peering or Transit Gateway attachment
  • Must allow TCP port 443 (HA sync), TCP 22 (SSH), ICMP (health checks)

Management VPC β†’ Internet Connectivity:

  • Required for FortiGuard services (signature updates, licensing)
  • Required for administrator access to FortiGate management interfaces
  • Can be via Internet Gateway, NAT Gateway, or AWS Direct Connect

Characteristics

  • Highest security posture: Complete physical isolation
  • Greatest flexibility: Independent infrastructure lifecycle
  • Higher complexity: Requires VPC peering or TGW configuration
  • Additional cost: Separate VPC infrastructure and data transfer charges

When to Use

  • Enterprise production deployments
  • Strict compliance requirements (PCI-DSS, HIPAA, etc.)
  • Multi-account AWS architectures
  • Environments with dedicated management infrastructure
  • Organizations with existing management VPCs for network security appliances

Comparison Matrix

FactorCombined (Default)Dedicated ENIDedicated VPC
Security IsolationLowMediumHigh
ComplexityLowestMediumHighest
CostLowestLowMedium
Management AccessVia data plane interfaceVia dedicated interfaceVia separate VPC
Failure Domain IsolationNoPartialComplete
VPC Peering RequiredNoNoYes
Compliance SuitabilityBasicGoodExcellent
Best ForDev/test, simple deploymentsProduction, security-consciousEnterprise, compliance-driven

Decision Tree

Use this decision tree to select the appropriate management isolation level:

1. Is this a production deployment?
   β”œβ”€ No β†’ Combined Data + Management (simplest)
   └─ Yes β†’ Continue to question 2

2. Do you have compliance requirements for management plane isolation?
   β”œβ”€ No β†’ Dedicated Management ENI (good balance)
   └─ Yes β†’ Continue to question 3

3. Do you have existing management VPC infrastructure?
   β”œβ”€ Yes β†’ Dedicated Management VPC (leverage existing)
   └─ No β†’ Evaluate cost/benefit:
       β”œβ”€ High security requirements β†’ Dedicated Management VPC
       └─ Moderate requirements β†’ Dedicated Management ENI

Deployment Patterns

Pattern 1: Dedicated ENI + EIP Mode

firewall_policy_mode = "2-arm"
access_internet_mode = "eip"
enable_dedicated_management_eni = true
  • Port2 receives EIP for public management access
  • Suitable for environments without management VPC
  • Simplified deployment with direct internet management access

Pattern 2: Dedicated ENI + Management VPC

firewall_policy_mode = "2-arm"
access_internet_mode = "nat_gw"
enable_dedicated_management_vpc = true
dedicated_management_vpc_tag = "my-mgmt-vpc"
  • Port2 connects to separate management VPC
  • Management VPC has dedicated internet gateway or VPN connectivity
  • Preferred for production environments with strict network segmentation

Pattern 3: Combined Management (Default)

firewall_policy_mode = "2-arm"
access_internet_mode = "eip"
enable_dedicated_management_eni = false
  • Port2 remains in data plane
  • Management access shares public interface with egress traffic
  • Simplest configuration but lacks management plane isolation

Best Practices

  1. Enable dedicated management ENI for production: Provides clear separation of concerns
  2. Use dedicated management VPC for enterprise deployments: Optimal security posture
  3. Document connectivity requirements: Ensure operations teams understand access paths
  4. Test connectivity before production: Verify alternative access methods work
  5. Plan for failure scenarios: Ensure backup access methods (SSM, VPN) are available
  6. Use existing_vpc_resources template for management VPC: Separates lifecycle management
  7. Document tag conventions: Ensure consistent tagging across environments
  8. Monitor management interface health: Set up CloudWatch alarms for management connectivity

Troubleshooting

Issue: Cannot access FortiGate management interface

Check:

  1. Security groups allow inbound traffic on management port (443, 22)
  2. Route tables provide path from your location to management interface
  3. If using dedicated management VPC, verify VPC peering or TGW is operational
  4. If using NAT Gateway mode, verify you have alternative access method (VPN, Direct Connect)

Issue: Management interface has no public IP

Cause: Using access_internet_mode = "nat_gw" with dedicated management ENI

Solutions:

  1. Switch to access_internet_mode = "eip" to receive public IP on port2
  2. Enable enable_dedicated_management_vpc = true with separate internet connectivity
  3. Use AWS Systems Manager Session Manager for private access
  4. Configure VPN or Direct Connect for private network access

Issue: HA sync not working with dedicated management VPC

Check:

  1. VPC peering or TGW attachment is configured between management and inspection VPCs
  2. Security groups allow TCP 443 between FortiGate instances
  3. Route tables in both VPCs have routes to each other’s subnets
  4. Network ACLs permit required traffic

Next Steps

After configuring management isolation, proceed to Licensing Options to choose between BYOL, FortiFlex, or PAYG.