Deploy - FortiAuthenticator-6.6.0-VMware - Administration - Guide
Deploy - FortiAuthenticator-6.6.0-VMware - Administration - Guide
FortiAuthenticator 6.6.0
FORTINET DOCUMENT LIBRARY
https://docs.fortinet.com
FORTINET BLOG
https://blog.fortinet.com
FORTIGUARD LABS
https://www.fortiguard.com
FEEDBACK
Email: [email protected]
Change Log 4
Introduction 5
Architecture 5
FortiAuthenticator-VM Overview 7
Licensing 7
System requirements 8
VM requirements 9
FortiAuthenticator-VM sizing guidelines 9
Register FortiAuthenticator-VM on FortiCloud 10
Download the FortiAuthenticator-VM software 11
VMware ESXi deployment package contents 11
Unlicensed FortiAuthenticator-VM 13
FortiAuthenticator-VM Deployment 15
Deploying FortiAuthenticator-VM on VMware 15
Configure FortiAuthenticator-VM hardware settings 19
Resizing the virtual disk (vDisk) 19
Configuring the number of virtual CPUs (vCPUs) 20
Configuring the virtual RAM (vRAM) limit 21
Mapping the virtual NICs (vNICs) to physical NICs 22
Power on your FortiAuthenticator-VM 23
Initial Configuration 24
FortiAuthenticator-VM console access 24
Connect to the FortiAuthenticator-VM GUI 25
Upload the FortiAuthenticator-VM license file 25
Configure your FortiAuthenticator-VM 26
Introduction
FortiAuthenticator-VM is a virtual appliance designed specifically to provide authentication services for multiple devices,
including firewalls, SSL and IPsec VPNs, wireless access points, switches, routers, and servers. FortiAuthenticator
includes a RADIUS, TACACS+ and LDAP server. Authentication servers are an important part of an enterprise network,
controlling access to protected network assets, and tracking users’ activities to comply with security policies.
FortiAuthenticator is not a firewall; it requires a FortiGate appliance to provide firewall-related services. Multiple
FortiGate units can use a single FortiAuthenticator appliance for Fortinet Single Sign On (FSSO) and other types of
remote authentication, two-factor authentication, and FortiToken device management. This centralizes authentication
and FortiToken maintenance.
FortiAuthenticator provides an easy-to-configure remote authentication option for FortiGate users. Additionally, it can
replace the FSSO Agent on a Windows AD network.
Whilst FortiAuthenticator is a hardened server it should be installed with adequate protection from the Internet.
Management protocols should be configured on private networks and only the resources required exposed to the
outside.
The FortiAuthenticator-VM delivers centralized, secure two-factor authentication for a virtual environment with a
stackable user license for the greatest flexibility. Supporting from 100 to 1 million+ users, the FortiAuthenticator-VM
supports the widest range of deployments, from small enterprise right through to the largest service provider.
This document includes an overview of the FortiAuthenticator-VM, its deployment with VMware vSphere, and
information on how to perform an initial configuration.
Architecture
FortiAuthenticator-VM requires the following connectivity for management. Inbound management using Telnet and
HTTP is not recommended. SSH is intended for initial configuration and diagnostics only. For more information, see the
FortiAuthenticator Administration Guide.
Inbound management:
Service Port
Telnet TCP 23
HTTP TCP 80
SSH TCP 22
Outbound management:
Service Port
DNSlookup UDP 53
FortiAuthenticator-VM Overview
Licensing
Fortinet offers the FortiAuthenticator-VM in a stackable license model. This model allows you to expand your VM
solution as your environment expands. When configuring your FortiAuthenticator-VM, make sure to configure hardware
settings as outlined in table three and consider future expansion. Contact your Fortinet Authorized Reseller for more
information.
FortiAuthenticator-VM license options:
SKU Description
Note that the FAC-VM-Base license is always required and that other licenses are upgrades to
the base license.
SKU Description
Note: For information on the maximum number of configuration objects that can be added to the configuration database
for different FortiAuthenticator virtual machine (VM) configurations, see the FortiAuthenticator 6.6 Release Notes on the
Fortinet Docs Library.
After placing an order for FortiAuthenticator-VM, a license registration code is sent to the email address used in the order
form. Use the license registration code provided to register the FortiAuthenticator-VM with FortiCloud.
Upon registration, you can download the license file. You will need this file to activate your FortiAuthenticator-VM. For
more information on configuring basic network settings and applying your license, see the FortiAuthenticator
Administration Guide.
System requirements
Prior to deploying the FortiAuthenticator-VM virtual appliance, your virtual machine manager must be installed and
configured. The installation instructions for FortiAuthenticator-VM assume you are familiar with both VM platforms and
their related terminology. FortiAuthenticator-VM includes support for:
l VMware ESXi / ESX 6/7/8
For the latest information on virtualization software support, see the corresponding FortiAuthenticator Release Notes on
the Fortinet Docs Library.
VM requirements
The following table provides a detailed summary on FortiAuthenticator virtual machine (VM) system requirements.
Installing FortiAuthenticator-VM requires that you have already installed a supported VM environment.
The following table provides FortiAuthenticator-VM sizing guidelines based on typical usage. Actual requirements may
vary based on usage patterns.
1 - 500 1 4 GB 1 TB
500 to 2,500 2 4 GB 1 TB
2,500 to 7,500 2 8 GB 2 TB
7,500 to 25,000 4 16 GB 2 TB
25,000 to 75,000 8 32 GB 4 TB
75,000 to 250,000 16 64 GB 4 TB
*1TB is sufficient for any number of users if there is no need for long-term storage of logs onboard FortiAuthenticator.
To obtain the FortiAuthenticator-VM license file you must first register your FortiAuthenticator-VM on FortiCloud.
1. Go to the FortiCloud portal and create a new account or log in with an existing account.
2. In Asset Management, select Register Product, or click the Register More button.
3. Provide your registration code:
a. Enter your product serial number, service contract registration code, or license certificate number.
b. Choose your end user type as either a government or non-government user.
c. Click Next.
4. Specify your registration information:
a. If you have purchased a support contract for your product, enter the support contract.
b. Enter a description to help identify the product.
c. Enter the IP address of the FortiAuthenticator VM.
d. Select a Fortinet Partner.
e. Specify the asset group.
f. Click Next.
FortiCloud does not currently support IPv6 for FortiAuthenticator-VM license validation.
You must specify an IPv4 address in both the support portal and the port management
interface.
5. The Fortinet Product Registration Agreement page displays. Select the check box to indicate that you have read,
understood, and accepted the service contract. Click Next.
6. The Verification page displays. Select the checkbox to indicate that you accept the terms. Click Confirm.
Registration is now complete and your registration summary is displayed.
7. On the Registration Complete page, download the license file (.lic) to your computer. You will upload this license
to activate the FortiAuthenticator VM.
You can change the IP address five (5) times on a regular FortiAuthenticator-VM license.
There is no restriction on a full evaluation license.
5. Select the License File Download link. You will be prompted to save the license file (.lic) to your management
computer.
Fortinet provides the FortiAuthenticator-VM software for 64-bit environments in two formats:
Upgrades: Download this firmware image to upgrade your existing FortiAuthenticator-VM installation.
l FAC_VM-vxxx-build0xxx-FORTINET.out:
New Installations: Download for a new FortiAuthenticator-VM installation.
l FAC_VM-vxxx-build0xxx-FORTINET.out.ovf.zip
For more information see the FortiAuthenticator product datasheet available on the Fortinet web site.
FortiAuthenticator-VM firmware images in the FortiCloud FTP directory are organized by firmware version, major
release, and patch release. The firmware images in the directories follow a specific naming convention and each
firmware image is specific to the device model. For example, the FAC_VM-v300-build0004-FORTINET.out.ovf.zip
image found in the v3.0 directory is specific to the FortiAuthenticator-VM VMware environment.
You can download the FortiAuthenticator Release Notes available on the Fortinet web site.
1. Log into FortiCloud, select Download in the toolbar, and select Firmware Images from the dropdown list.
The Firmware Images page opens.
4. Download the .ovf.zip file and FortiAuthenticator Release Notes, and save these files to your management
computer. Select the .zip file on your management computer and extract the files to a new file folder.
Unlicensed FortiAuthenticator-VM
A FortiAuthenticator-VM is unlicensed until the administrator uploads a Fortinet-issued license file. An unlicensed
FortiAuthenticator-VM can be identified by its serial number FAC-VM0000000000 and has a non-expiring five-user limit
for small scale evaluation purposes. No activation is required for the unlicensed FortiAuthenticator-VM.
Please contact your Fortinet Reseller should you require an extended evaluation, i.e. with
more users.
FortiAuthenticator-VM Deployment
For best performance, it is recommended that FortiAuthenticator-VM is installed on a “bare metal” hypervisor.
Hypervisors that are installed as applications on top of a general purpose operating system (such as Microsoft Windows,
Mac OS X, or Linux) will have fewer computing resources available due to the host OS’s own overhead.
The following sections detail deployments for VMware vSphere:
l Deploying FortiAuthenticator-VM on VMware
l Configure FortiAuthenticator-VM hardware settings
l Power on your FortiAuthenticator-VM
Once you have downloaded the out.ovf.zip file and extracted the package contents to a folder on your management
computer, you can deploy it into your VMware environment.
1. Connect to your VMware ESXi server by visiting its URL in your browser. Enter your username and password, and
click Log in.
3. Select Deploy a virtual machine from an OVF or OVA file, and click Next.
4. Enter a name for your VM and select the OVF (FortiAuthenticator-VM.ovf), firmware VMDK (fac.vmdk), and data
storage VMDK (datadrive.vmdk) files previously extracted to your management computer, and click Next.
5. Select which ESXi server's datastore to use for the deployment of FortiAuthenticator-VM, and click Next.
7. Select the appropriate network mappings, disk provisioning, and power on options for your deployment, and click
Next.
l Thin Provision: This option optimizes storage use at the cost of sub-optimal disk I/O rates. It allocates disk
space only when a write occurs to a block, but the total volume size is reported by VMFS to the OS. Other
volumes can take the remaining space. This allows you to float between your servers and expand storage
when your size monitoring indicates there is a problem.
Once a Thin Provisioned block is allocated, it remains in the volume regardless of whether you have deleted
data, etc...
l Thick Provision: This option has higher storage requirements, but benefits from optimal disk I/O rates. It
allocates the disk space statically. No other volumes can take the allocated space.
Before powering on your FortiAuthenticator-VM you must configure the virtual memory, virtual CPU, and virtual disk
(VMDK) configuration, and map the virtual network adapters.
If you configure the virtual appliance’s storage repository to be internal (i.e. local, on its own vDisk), resize the vDisk
before powering on.
This step is not applicable if the virtual appliance will use external network file system (such as
NFS) datastores.
The FortiAuthenticator-VM package that you downloaded includes pre-sized VMDK (Virtual Machine Disk Format) files
of 1GB for disk 1 (for the OS) and 60GB for disk 2 data, which is large enough for most small deployments. This can be
extended if necessary. Resize the vDisk before powering on the virtual machine.
Before doing so, make sure that you understand the effects of your vDisk settings.
During the creation of a VM datastore, you have the following formatting options:
l 1MB block size - 256GB maximum file size
l 2MB block size - 512GB maximum file size
l 4MB block size – 1,024GB maximum file size
l 8MB block size – 2,048GB maximum file size
These options affect the possible size of each vDisk.
For example, if you have an 800GB datastore which has been formatted with 1MB block size, you cannot size a single
vDisk greater than 256GB on your FortiAuthenticator-VM.
Consider also that, depending on the size of your organization’s network, you might require more or less storage for the
user database and logging.
For more information on vDisk sizing, see http://communities.vmware.com/docs/DOC-11920.
1. In the VMware vSphere Client, right-click the name of the virtual appliance, and select Edit Settings.
The Virtual Machine Properties page is displayed.
By default, the virtual appliance is configured to use 2 vCPUs. FortiAuthenticator-VM is not restricted to how many
vCPUs can be configured so you can increase the number according to your requirements (e.g., you can allocate 2, 4, or
8 vCPUs).
If you need to increase or decrease the vCPUs after the initial boot, power off
FortiAuthenticator-VM, adjust the number of vCPUs, then power on the VM.
1. In the VMware vSphere Client, right-click the name of the virtual appliance, and select Edit Settings.
The Virtual Machine Properties page is displayed.
FortiAuthenticator-VM comes pre-configured to use 512MB of vRAM. You can change this value. The valid range is from
512MB to 16GB.
1. In the VMware vSphere Client, right-click the name of the virtual appliance, and select Edit Settings.
The Virtual Machine Properties page is displayed.
Appropriate mappings of the FortiAuthenticator-VM ports to physical ports depends on your existing virtual environment.
Often, the default bridging vNICs work, and do not need to be changed.
If you are unsure of your network mappings, try bridging first before non-default vNIC modes such as NAT or host-only
networks. The default bridging vNIC mappings are appropriate where each of the host’s guest virtual machines should
have their own IP addresses on your network. The most common exceptions to this rule are for VLANs and the
transparent modes.
When you deploy the FortiAuthenticator-VM package, 4 bridging vNICs are created and automatically mapped to a port
group on 1 virtual switch (vSwitch) within the hypervisor. Each of those vNICs can be used by one of the 4 network
interfaces in FortiAuthenticator-VM.
Alternatively, if you prefer, some or all of the network interfaces may be configured to use the same vNIC. vSwitches are
themselves mapped to physical ports on the server.
Example network mapping:
Physical Network Network Mapping Virtual Network Network Interface Name in GUI and CLI
Adapter (vSwitch Port Adapter for FAC
Group) VM
1. In the VMware vSphere Client, right-click the name of the virtual appliance, and select Edit Settings.
The Virtual Machine Properties page is displayed.
2. Select the Hardware tab and select Network adapter 1.
3. From the Network Connection dropdown list, select the virtual network mapping for the virtual network adapter.
Repeat this step for the other three network adapters. The correct mapping varies by your virtual environment’s
network configuration.
4. Select OK to save the settings to Virtual Machine Properties.
Initial Configuration
Before you can connect to the FortiAuthenticator-VM GUI you must configure basic network settings via the console in
your client. Once configured, you can connect to the FortiAuthenticator-VM GUI and upload the FortiAuthenticator-VM
license file that you downloaded from FortiCloud.
The following topics are included in this section:
l FortiAuthenticator-VM console access on page 24
l Connect to the FortiAuthenticator-VM GUI on page 25
l Upload the FortiAuthenticator-VM license file on page 25
l Configure your FortiAuthenticator-VM on page 26
To enable GUI access to the FortiAuthenticator-VM you must configure basic network settings of the FortiAuthenticator-
VM in the client console.
FortiCloud currently does not support IPv6 for FortiAuthenticator-VM license validation.
You must specify an IPv4 address in both the support portal and the port1 management
interface.
Once you have configured the port1 IP address, network mask, and default gateway, launch a web browser and enter
the IP address you configured for port1.
To support HTTPS authentication, the FortiAuthenticator-VM includes a self-signed X.509 certificate, which it presents
to clients whenever they initiate an HTTPS connection to the FortiAuthenticator appliance. When you connect,
depending on your web browser and prior access of the FortiAuthenticator-VM, your browser might display two security
warnings related to this certificate:
The certificate is not automatically trusted because it is self-signed, rather than being signed by a valid certificate
authority (CA). Self-signed certificates cannot be verified with a proper CA, and therefore might be fraudulent. You must
manually indicate whether or not to trust the certificate. The certificate might belong to another web site. The common
name (CN) field in the certificate, which usually contains the host name of the web site, does not exactly match the URL
you requested. This could indicate server identity theft, but could also simply indicate that the certificate contains a
domain name while you have entered an IP address. You must manually indicate whether this mismatch is normal or
not.
Both warnings are normal for the default certificate. TLS v1.0, TLS v1.1, and TLS v1.2 are supported.
Verify and accept the certificate, either permanently (the web browser will not display the self-signing warning again) or
temporarily. You cannot log in until you accept the certificate.
For details on accepting the certificate, see the documentation for your web browser.
At the login page, enter the user name admin and password and select Login. The default password is no password. The
GUI will appear with an Evaluation License dialog box.
Every FortiAuthenticator-VM includes a five-user evaluation license. During this time the FortiAuthenticator-VM operates
in evaluation mode. Before using the FortiAuthenticator-VM you must enter the license file that you downloaded from
FortiCloud upon registration.
Plan a maintenance window to apply the FortiAuthenticator-VM license as the VM will reboot.
As your organization grows, you can simply either allocate more resources or migrate your
virtual appliance to a physical server with more power, then upgrade your FortiAuthenticator-
VM license to support your needs.
3. Select Upload a file and locate the license file (.lic) on your computer. Select Upload to upload the license file.
4. The VM registration status appears as valid once the license has been validated.
5. If the IP address in the license file and the IP address configured in the FortiAuthenticator-VM do not match, you will
receive the following error message dialog box when you log back into the VM.
If this occurs, you will need to change the IP address in FortiCloud to match the management IP and re-download
the license file.
After an invalid license file is loaded to FortiAuthenticator-VM, the GUI will be locked until a
valid license file is uploaded.
Once the FortiAuthenticator-VM license has been validated you can begin to configure your device. For more
information on configuring your FortiAuthenticator-VM see the FortiAuthenticator Administration Guide on the Fortinet
Document Library.
In VM environments, it is recommended that you use the VMware Snapshot utility to backup
the VM instance. In the event of an issue with a firmware upgrade or configuration issue, you
can use the Snapshot Manager to revert the VM instance to a previous Snapshot. To create a
Snapshot, right-click the VM instance and select Snapshot > Take Snapshot.
Copyright© 2023 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein
may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were
attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance
results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract,
signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only
the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal
conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change,
modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.