<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>fortigate-aws-tgwconnect-ha-dualaz-terraform</title><link>https://fortinetcloudcse.github.io/fortigate-aws-tgwconnect-ha-dualaz-terraform/index.html</link><description/><generator>Hugo</generator><language>en-US</language><atom:link href="https://fortinetcloudcse.github.io/fortigate-aws-tgwconnect-ha-dualaz-terraform/index.xml" rel="self" type="application/rss+xml"/><item><title>Introduction</title><link>https://fortinetcloudcse.github.io/fortigate-aws-tgwconnect-ha-dualaz-terraform/1_introduction/index.html</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://fortinetcloudcse.github.io/fortigate-aws-tgwconnect-ha-dualaz-terraform/1_introduction/index.html</guid><description>Welcome The purpose of this site is to provide a quick start guide for using Infrastructure as Code (IaC) templates located in the repo fortigate-aws-tgwconnect-ha-dualaz-terraform.
Reference the prerequisites and deployment sections on this site to get started.
For detailed documentation on FGCP in AWS, walk through of a post deployment failover, and additional use cases, please reference CSE Team FGCP in AWS.</description></item><item><title>Prerequisites</title><link>https://fortinetcloudcse.github.io/fortigate-aws-tgwconnect-ha-dualaz-terraform/2_prerequisites/index.html</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://fortinetcloudcse.github.io/fortigate-aws-tgwconnect-ha-dualaz-terraform/2_prerequisites/index.html</guid><description>Before attempting to create a stack with the templates, a few prerequisites should be checked to ensure a successful deployment:
An AMI subscription must be active for the FortiGate license type being used in the template.
Intel BYOL Marketplace Listing Intel PAYG Marketplace Listing ARM BYOL Marketplace Listing ARM PAYG Marketplace Listing The solution requires 3 EIPs to be created so ensure the AWS region being used has available capacity. Reference AWS Documentation for more information on EC2 resource limits and how to request increases.</description></item><item><title>Deployment</title><link>https://fortinetcloudcse.github.io/fortigate-aws-tgwconnect-ha-dualaz-terraform/3_deployment/index.html</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://fortinetcloudcse.github.io/fortigate-aws-tgwconnect-ha-dualaz-terraform/3_deployment/index.html</guid><description>Once the prerequisites have been satisfied proceed with the deployment steps below.
Clone this repo with the command below. git clone https://github.com/FortinetCloudCSE/fortigate-aws-tgwconnect-ha-dualaz-terraform.git Change directories and modify the terraform.tfvars file with your credentials and deployment information. Note In the terraform.tfvars file, the comments explain what inputs are expected for the variables. For further details on a given variable or to see all possible variables, reference the variables.tf file. cd fortigate-aws-tgwconnect-ha-dualaz-terraform/terraform nano terraform.tfvars When ready to deploy, use the commands below to run through the deployment. terraform init terraform validate terraform apply --auto-approve When the deployment is complete, you will see login information for the FortiGates like so. Apply complete! Resources: 68 added, 0 changed, 0 destroyed. Outputs: fgt_login_info = &lt;&lt;EOT -=-=-=-=-=-=-=-=-=-=- fgt username: admin fgt initial password: i-030587371a178ab9b cluster login url: https://54.188.162.232 fgt1 login url: https://44.252.247.54 fgt2 login url: https://16.146.218.128 -=-=-=-=-=-=-=-=-=-=- EOT tgw_info = &lt;&lt;EOT -=-=-=-=-=-=-=-=-=-=- tgw id: tgw-09bfd7efd39295d81 tgw spoke route table id: tgw-rtb-0cfb479fad59cd178 tgw security route table id: tgw-rtb-0ca014252edf68f74 -=-=-=-=-=-=-=-=-=-=- EOT</description></item></channel></rss>