FortiManager support for updated FortiOS private data encryption key
With the introduction of FortiOS 7.6.1, Fortinet has updated the private-data-encryption key feature. Administrators are no longer required to manually input a 32-digit hexadecimal private-data-encryption key. Instead administrators simply enable the command, and a random private-data-encryption key is generated.
How FortiManager 8.0.0 works with FortiOS private data encryption keys has changed. This topic covers the changes. See FortiManager behavior.
Previous FortiOS CLI behavior
config system global
set private-data-encryption enable
end
Please type your private data encryption key (32 hexadecimal numbers):
12345678901234567890123456789abc
Please re-enter your private data encryption key (32 hexadecimal numbers) again:
12345678901234567890123456789abc
Your private data encryption key is accepted.
New FortiOS CLI behavior
config system global
set private-data-encryption enable
end
This operation will generate a random private data encryption key!
Previous config files encrypted with the system default key cannot be restored after this operation!
Do you want to continue? (y/n)y
Private data encryption key generation succeeded!
FortiManager behavior
FortiManager 8.0.0 can centrally manage FortiGates with the private-data-encryption setting enabled, with the following limitations:
-
FortiManager can import objects that include the password type attribute.
When FortiManager imports objects that include a password-type attribute, the administrator will be prompted to specify the password used by the object during the import process.
-
FortiManager cannot be used to create NAT and transparent VDOMs.
This applies to FortiGates with private keys that are manually configured in FortiOS 7.6.0 and earlier and private keys that are randomly generated in FortiOS 7.6.1 and later.
FortiManager does not require you to verify the private key of the FortiGate when adding it to FortiManager.
FortiGates that require the protection of private data encryption and need to be managed by FortiManager should follow these procedures on a fresh install.
-
On the FortiGate, enable
private-data-encryption. -
On the FortiManager, add the FortiGate to the Device Manager. FortiManager will not be required to provide the key for PDE, as it will not be importing any password-related settings.
-
Make all configuration changes directly on the FortiManager.
-
Push and install the changes to the FortiGate.
If you require the use of NAT or Transparent VDOMs, you should perform this additional step before the steps above.
-
Enable
multi-vdommode on the FortiGate. -
Add the VDOMs that you will use on the FortiGate.
-
Follow the above steps to enable
private-data-encryptionand manage the FortiGate from the FortiManager.
For more information, see the FortiManager Administration Guide.