Appendix K: Installation on GCP
FortiPAM installation on GCP and initial setup:
- Creating a cloud storage bucket on GCP
- Adding the FortiPAM image file to the storage bucket
- Creating a FortiPAM image on GCP
- Creating VM instance from the image
- Licensing
- Static interface IP address
- Setting up HA
- Enabling vTPM
Creating a cloud storage bucket on GCP
To create a cloud storage bucket on GCP:
- From the navigation pane, go to Cloud Storage > Bucket.
The Buckets window opens.
- Select +CREATE/CREATE BUCKET to create a new storage bucket.
- In Name, enter a name for the storage bucket, and click CONTINUE.
- In Choose where to store your data, select Multi-region, from the dropdown select a location, and click CONTINUE.
- In Choose a storage class for your data, keep the default settings, and click CONTINUE.
- In Choose how to control access to objects, keep the default settings, and click CONTINUE.
- In Choose how to protect object data, keep the default settings, and click CONTINUE.
- Select Create.
The storage bucket is created.
Adding the FortiPAM image file to the storage bucket
To add the FortiPAM image file to the storage bucket:
- From the navigation pane, go to Cloud Storage > Bucket.
- In the Buckets window, click the name of the storage bucket created in Creating a cloud storage bucket on GCP to open it.
- Select UPLOAD FILES, locate the FortiPAM image file from your management computer, and click Open.
The FortiPAM image file is successfully uploaded to the storage bucket.
Creating a FortiPAM image on GCP
If you want to use vTPM, see Enabling vTPM to create an image. |
To create a FortiPAM image on GCP:
- From the navigation pane, go to Compute Engine > Storage > Images.
The Images window opens.
- In the Images window, select Create Image, and click CONTINUE.
The Create an image window opens.
- In Name, enter a name for the image.
- In the Source dropdown, select Cloud Storage file.
- Select BROWSE, from the Select object pane that opens, go to the FortiPAM image file, and click SELECT.
The image source must have
.tar.gz
as its extension and the file in it must be nameddisk.raw
. - Ensure that the Location is set to Multi-regional.
- Leave the rest of the settings in the default state.
- Click CREATE.
The new FortiPAM image is now listed at the top in the Images window.
Creating VM instance from the image
To create VM instance from the image:
- From the navigation pane, go to Compute Engine > VM instances.
The VM instances window opens.
- Select CREATE INSTANCE.
The Create an instance window opens.
- In Name, enter a name for the VM instance.
- From the Region dropdown, select a region where the resource is located.
- From the Zone dropdown, select a zone within the region where the resource is located.
- In Machine configuration, select a machine type for deployment.
- In Boot disk, select CHANGE:
- Switch to the CUSTOM IMAGES tab.
- From the Image dropdown, select the image created in Creating a FortiPAM image on GCP.
- Click SELECT.
- Leave the following settings in the default state:
ADVANCED CONFIGURATIONS
Display device
Confidential VM service
Container
Identity and API access
Firewall
Observability - Ops Agent
- Expand Advanced options > Networking:
- In Network interfaces, ensure that a network interface with a subnetwork is selected.
- In Network interfaces, add another network if the FortiPAM will be used in an HA cluster.
- Expand Advanced options > Disks:
We create two disks; one for storing logs and the other for storing videos.
- Select +ADD NEW DISK.
The Add new disk pane opens.
- In Name, enter a name for the disk.
- In Size, enter
10
(in GB) to add a new volume for the log. - Leave the remaining settings in the default state.
- Click Save.
- Repeat steps
a
toe
to add a new volume for storing videos.
- Select +ADD NEW DISK.
- Click CREATE.
- From the VM instance list, click the name of the VM instance you created.
The instance page opens.
- Select EDIT and in Remote access, select Enable connecting to serial ports.
- Click SAVE.
- In the instance page, select CONNECT TO SERIAL CONSOLE.
The SSH serial console opens.
- Use
admin
as the username and the Instance Id to log in for the first time.
Licensing
To successfully license FortiPAM:
- Download the license file (
.lic
), see Registering and downloading your license. - Upload the license file from the public IP address using SCP, see Uploading the license file using SCP.
- FortiPAM reboots. After a few minutes, the license status changes to valid.
You can check the license status using the following CLI command:
get system status
Static interface IP address
You must use a static IP address if you intend to form an HA cluster.
To find out the static IP addresses that GCP has assigned to the interfaces:
- From the navigation pane, go to Compute Engine > VM instances.
- From the VM instances list, click the name of the VM instance you created.
- In the Network interfaces pane, you see the static IP addresses assigned to the interfaces used in Creating VM instance from the image.
Note down the IP addresses.
To configure port1, change mode from DHCP to static and set the IP address:
You can skip this step if FortiPAM is in standalone mode. |
- In the FortiPAM CLI console, enter the following commands:
config system interface edit port1 set mode static #by default set as dhcp set ip 10.110.0.3/32 #set to the IP address assigned by GCP next end
When upgrading a FortiPAM instance, use the following CLI command to enable synchronizing the virtual IP address to the IP address of the external interface:
Example
config firewall vip set intf-ip-sync enable set extintf "port1" #The interface connected to the source network that receives the packets forwarded to the destination network. end
When installing a new FortiPAM instance, the synchronization happens automatically.
To configure a static route if the interface is configured as static mode:
- In the FortiPAM CLI console, enter the following commands:
config router static
edit 1
set device port1
set gateway 10.110.0.1
next
end
config router static edit 1 set device port1 set gateway 10.110.0.1 next end
To verify access to the public network:
-
Optionally, in the FortiPAM CLI console, enter the following command:
execute ping update.fortiguard.net
You should receive an echo reply packet similar to the following:
Optionally, to encrypt disk to protect logs and videos, see Configuring log and video disk encryption. |
Optional- To customize VIP if default VIP is not preferred:
- In the FortiPAM CLI console, enter the following commands:
config firewall vip edit "fortipam_vip" set extip 10.110.0.3 #external visible virtual IP address next end
You can now use your FortiPAM-VM deployed on GCP.
On a web browser, go to https://<Public IP>
to access the FortiPAM-VM GUI. This is the same IP address set up above.
Setting up HA
Prerequisites
To deploy and configure FortiPAM as an Active-Passive HA solution, you need the following:
-
Availability to accommodate the required GCP resources:
-
Four network/subnets
-
Ensure that the two FortiPAM devices have connectivity to each other on each network.
-
Appropriate ingress/egress firewall rules for relevant networks (same as a single FortiPAM-VM deployment).
-
-
Three public (external) IP addresses:
-
One for traffic to/through the active (primary) FortiPAM. At the event of failover, this IP address will move from the primary FortiPAM to the secondary. This must be a static external IP address. It should be reserved/created before creating FortiPAM instances, or promote an ephemeral IP to a static one after deployment. See Reserving a Static External IP Address.
-
Two for management access to each FortiPAM. They can be ephemeral IP address, but static ones are highly recommended. See IP Addresses.
-
-
All internal IP addresses must be static, not DHCP. You should change ephemeral IP addresses to static ones after deployment. See Reserving a Static Internal IP Address.
-
Two FortiPAM-VM instances:
-
The two nodes must be deployed in the same region/zone.
-
Each FortiPAM-VM must have at least four network interfaces.
-
Each FortiPAM-VM should have a log disk attached. Log disks should be created before deploying FortiPAM instances. This is the same requirement as when deploying a single FortiPAM-VM.
-
Machine types that support at least four network interfaces. Creating Instances with Multiple Network Interfaces.
-
Two valid FortiPAM-VM BYOL licenses. See Licensing.
-
-
You must configure an SDN connector with GCP on the primary FortiPAM:
config system sdn-connector edit "gcp_conn" set type gcp set ha-status enable config external-ip edit "reserve-fpamhapublic" next end config route edit "route-internal" next end next end
-
To set up a FortiPAM HA cluster:
- To form an HA cluster, deploy two FortiPAM-VMs separately by following 1 - 6 in FortiPAM installation on GCP and initial setup.
- As shown in Static interface IP address, note down the external IP addresses assigned to
nic0
for each FortiPAM. These are then used in step 3. - Connect to the primary FortiPAM external IP address using SSH, then enter the following CLI commands:
config system ha set group-name <choose a group name for the cluster> set mode active-passive set password <your-ha-password> set hbdev "port3" 100 set ha-mgmt-status enable config ha-mgmt-interfaces edit 1 set interface "port4" set gateway <ip address of MGMT network intrinsic router> next end set override enable set priority 255 set unicast-status enable set unicast-gateway 10.4.100.254 config unicast-peers edit 1 set peer-ip 10.4.100.12 next end end config system sdn-connector edit "gcp_conn" set type gcp set ha-status enable config external-ip edit "reserve-fpamhapublic" next end config route edit "route-internal" next end next end
- On the primary FortiPAM, enter the following CLI commands so that the interface IP address or the firewall VIP is not synchronized:
config system vdom-exception edit 1 set object system.interface next edit 2 set object firewall.vip next end
This configuration is automatically synchronized once the secondary has been configured.
Enabling vTPM
To enable vTPM:
- Add the FortiPAM image file to the storage bucket. See Adding the FortiPAM image file to the storage bucket.
- From the top-right, select Activate Cloud Shell.
The CLOUD SHELL Terminal opens.
- In the terminal, use the following commands to create a FortiPAM image:
gcloud compute --project={project-name} images create gcp-fpa-{buildnum}-shielded --source-uri=https://storage.googleapis.com/{Bucket-name}/image.out.gcp.tar.gz --guest-os-features=UEFI_COMPATIBLE,GVNIC
For example:
gcloud compute --project=fpam-gcp-documentation images create fpam-gcp-120-ga-shielded --source-uri=https://storage.googleapis.com/fortipam-bucket/FPA_KVM_GCP-v100-build0697-FORTINET.out.gcp.tar.gz --guest-os-features=UEFI_COMPATIBLE,GVNIC
A new image is created in Compute Engine > Storage > Images.
- Create the FortiPAM VM using the image created in step 3. See Creating VM instance from the image.
When creating the VM, in Advanced options > Security, ensure that Turn on vTPM and Turn on Integrity Monitoring is enabled.
- Once the VM is ready, in the SSH serial console, enter the following commands to verify that vTPM is enabled:
diagnose tpm selftest
The following message appears if vTPM was successfully set up:
Successfully tested. Works as expected.