Greetings!
Welcome to the Microsoft Q&A Platform. Thank you for reaching out & I hope you are doing well.
For 1st question,
- For a FortiGate firewall deployed in Azure, you can assign multiple public IP addresses to the NIC of the FortiGate instance, but you should also consider the limits imposed by the FortiGate itself, as it may have its own restrictions on the number of IP addresses it can manage effectively. It depends on FortiGate's own capabilities and licensing.
Please reach out to https://support.fortinet.com/welcome/#/
For 2nd question,
External Load Balancer: Necessary for managing inbound internet traffic. To expose multiple services or applications to the internet through the FortiGate firewall, an external load balancer is required to handle the incoming traffic and distribute it to the FortiGate instance.
Azure internet edge inbound/DNAT use case
The internet inbound use case will have an External Load Balancer (ELB) deployed as part of the managed application. Load balancing rules will be configured from the FortiGate CLI, and once configured, they will be automatically pushed with an API call to the ELB.
It is generally necessary to use an external load balancer for managing inbound internet traffic and DNAT, while an internal load balancer can be used for distributing traffic among internal resources if needed.
Hope this helps! Please let me know if you have any questions. Thank you!
Please "Accept the answer" if the information helped you. This will help us and others in the community as well.