Escolar Documentos
Profissional Documentos
Cultura Documentos
Table of Contents
Overview of the Fortinet FortiWeb Virtual Appliance Deployment on MCP Cloud 1
Introduction 1
Document scope 2
FortiWeb-VM Virtual Appliance on MCP 2.0 Overview 2
FortiWeb-VM Virtual Appliance Overview 3
FortiWeb-VM Models and Licensing 3
FortiWeb-VM Virtual Appliance Evaluation License 3
FortiWeb-VM Initial Configuration 5
Set the FortiWeb-VM port1 IP Address 6
Connect to the FortiWeb-VM Web-based Manager 8
Upload the FortiWeb-VM License File 10
Integration with FortiSandbox (Optional) 14
Integration with FortiGate (Optional) 16
Configure your FortiWeb-VM 16
Introduction
FortiWeb is designed specifically to protect web servers. FortiWeb web application firewalls (WAF) provide
specialized application layer threat detection and protection for many HTTP or HTTPS services. FortiWeb’s
integrated web vulnerability scanner can drastically reduces challenges associated with protecting regulated and
confidential data by detecting your exposure to the latest threats, especially the OWASP Top 10.
In addition, FortiWeb’s XML firewall and denial-of-service (DoS) attack-prevention protect your Internet-facing web-
based applications from attack and data theft. Using advanced techniques to provide bidirectional protection against
sophisticated threats like SQL injection and cross-site scripting (XSS), FortiWeb helps you prevent identity theft,
financial fraud, and corporate espionage. FortiWeb delivers the technology you need to monitor and enforce
government regulations, industry best practices, and internal security policies, including firewalling and patching
requirements from PCI DSS.
1
Document scope
This document outlines and describes how to deploy the FortiWeb-VM virtual appliance on several virtualization
server environments of the Managed Cloud Platform. This also includes how to configure the virtual hardware
settings of the virtual appliance.
This document does not cover configuration and operational aspects of the FortiWeb-VM virtual appliance after it
has been successfully installed and is running. For these issues, see the FortiWeb 5.6 Administration Guide -
Fortinet Document Library.
This document includes the following sections:
• Fortinet on Managed Compute Platform (MCP)
• FortiWeb-VM Virtual Appliance Overview
• FortiWeb-VM Virtual Appliance Initial Configuration
2
FortiWeb-VM Virtual Appliance Overview
The following topics are included in this section:
• FortiWeb-VM models and licensing
• Registering FortiWeb-VM with Customer Service & Support
• Deploying the FortiWeb-VM
Maximum IP sessions and policies varies by license, but also by available vRAM, just as it does for hardware
models. For details, see maximum configuration values in the FortiWeb Administration Guide.
When you place an order for FortiWeb-VM, Fortinet emails a registration number to the recipient address you
supplied on the order form. To register your appliance with Technical Support and to obtain a license file, enter that
registration number on the Fortinet Technical Support web site at the following location:
https://support.fortinet.com/
FortiWeb-VM needs to periodically re-validate its license by contacting either Fortinet’s FortiGuard Distribution
Network (FDN) via an Internet connection or a FortiManager.
If FortiWeb-VM cannot contact FDN or FortiManager for 24 hours, it locks access to the web UI and CLI. In some
cases, the web UI displays a message such as:
License has been uploaded. Please wait for authentication with registration servers.
FortiWeb-VM Virtual Appliance Evaluation License
The FortiWeb-VM includes a 15-day trial (VM00). The trial version provides all FortiWeb-VM functions except
antispam and antivirus signature updates and the FortiGuard Antispam query. Because the trial version only
provides low encryption, you may not be able to access the FortiWeb-VM web UI through HTTPS, unless you have
enabled a weak cipher in your browser. The trial period begins the first time you start the FortiWeb-VM. If you do not
install a valid license after the trial period expires, you will not be able to make configuration changes to the
FortiWeb-VM.
3
Requirements for FortiWeb-VM Dimension on Data Cloud
For provisioning of FortiWeb appliance for MC, you must have at least have 2 Network (VLAN) created prior to
deployment. As a best practice, 2 networks allow the segregation of Management and Data traffic. Do consider
applying firewall rules to control the access and route between the 2 networks with your overall architecture.
After deployment of the appliance, do configure the appliance NICs corresponding to the order of the NIC
listing on MCP where the 1st NIC on MCP will be the 1st NIC on the appliance.
For more information on deploying and configuring of Networks (VLAN), please refer to the following
cloud control articles below.
4
FortiWeb-VM Virtual Appliance Overview
For assistance in deploying the FortiWeb-VM, refer to the deployment chapter in this guide that
corresponds to your environment. You might also need to refer to the documentation provided with your
virtualization server platform. The deployment chapters are presented as examples as for any particular
virtualization server platform there are multiple ways to create a virtual machine. There are also command
line tools, APIs, and even alternative graphical user interface tools.
Before you start your FortiWeb-VM for the first time, you may need to adjust the virtual disk sizes and networking
settings. The first time you start the FortiWeb-VM, you will have access only through the console window of your
virtualization server environment. After you configure the FortiWeb-VM virtual appliance network interface with an
IP address and administrative access, you can access the FortiWeb-VM virtual appliance Web-Based Manager.
Before you can connect to the FortiWeb-VM Web-based Manager you must configure the FortiWeb- VM basic
configuration via the CLI console. Once configured, you can connect to the FortiWeb-VM Web-based Manager and
upload the FortiWeb-VM license file that you downloaded from the Customer Service & Support portal
5
Set the FortiWeb-VM port1 IP Address
Hypervisor management environments include a guest console window. On the FortiWeb VM, this provides access
to the FortiWeb console, equivalent to the console port on a hardware FortiWeb unit. Before you can access the
Web-based manager, you must configure the FortiWeb-VM port1 with an IP address and administrative access.
To configure the port1 IP address:
2. In your Console Manager, press Return to see a login prompt.
6
3. At the FortiWeb-VM login prompt enter the username admin. By default, there is no password. Just
press Return.
NOTE: Be sure to set a strong password for the admin administrator account, and change the password
regularly. Failure to maintain the password of the admin administrator account could compromise the
security of your FortiWeb VM. As such, it can constitute a violation of PCI DSS compliance and thus is
not considered a best practice. For improved security, the password should be at least eight characters
long, be sufficiently complex, and be changed regularly. To check the strength of your password, you
can use a utility such as Microsoft’s password strength meter.
4. Using CLI commands, configure the port1 IP address and netmask. Also, HTTP access must be enabled
because until it is licensed the FortiWeb-VM supports only low-strength encryption. HTTPS access will not
work.
For example:
config system interface
edit port1
set ip 192.168.0.100 255.255.255.0
append allowaccess https
end
You must configure the default gateway with an IPv4 address. FortiWeb-VM needs to access the
Internet to contact the FortiGuard Distribution Network (FDN) to validate its license.
5. Use CLI commands to configure a static route to act as a default gateway. This is needed for license updates.
Enter the following CLI commands in MCP console:
config system route
edit 1
set gateway <gateway_ipv4>
end
Where:
• <gateway_ipv4> is the IP address of the gateway router
7
6. Configure the primary and secondary DNS server IP addresses. Type:
You should now be able to connect via the network from your management computer to port1 of FortiWeb- VM
using:
• a web browser for the web UI (e.g. If port1 has the IP address 192.168.1.1, go to https://192.168.1.1/)
• an SSH client for the CLI (e.g. If port1 has the IP address 192.168.1.1, connect to 192.168.1.1 on port 22.)
After you login the FortiWeb VM login prompt enter the username admin. By default, there is no
password. Just press Return.
NOTE: Be sure to set a strong password for the admin administrator account, and change the password
regularly. Failure to maintain the password of the admin administrator account could compromise the
security of your FortiWeb-VM. As such, it can constitute a violation of PCI DSS compliance and thus is not
considered a best practice. For improved security, the password should be at least eight characters long,
be sufficiently complex, and be changed regularly. To check the strength of your password, you can use a
utility such as Microsoft’s password strength meter.
Log in as the admin administrator account.
Alternatively, if you know the current password for the account whose
password you want to change, you may log in with any administrator account whose access profile permits Read
and Write access to items in the Admin Users category.
8
9
Upload the FortiWeb-VM License File
To install the license
In the License Information widget on the FortiWeb-VM web-based manager, click the Update
10
Figure 3: FortiWeb-VM license prompt
1. Click Choose File and locate the license file (.lic) you downloaded earlier from Fortinet.
2. Click Upload on the license prompt dialog.
A message box appears stating your license is being authenticated. This may take a few minutes.
If you uploaded a valid license, a second message box will appear informing you that your license
authenticated successfully.
3. Click OK on the message box.
The system will reload and log out.
4. Log in again if prompted using admin, as the user name.
Congratulations! You have successfully installed FortiWeb-VM and can now configure your
virtual appliance.
11
Changing the hardware configuration
Changing the hardware configuration for the FortiWeb-VM to reflect the appropriate CPU for the license type.
12
Shutting down the FortiWeb-VM
13
Integration with FortiSandbox (Optional)
The FortiSandbox-VM and FortiSandbox cloud service are used for automated sample tracking, or sandboxing.
You can send suspicious email attachments to FortiSandbox for inspection when you configure antivirus profiles. If
the file exhibits risky behaviour, or is found to contain a virus, the result will be sent back to FortiWeb and a new
virus signature is created and added to the FortiGuard antivirus signature database as well.
14
15
Integration with FortiGate (Optional)
FortiGate appliances can maintain a list of source IPs that it prevents from interacting with the network and
protected systems. You can configure FortiWeb to receive this list of IP addresses at intervals you specify. Then,
you configure an inline protection profile to detect the IP addresses in the list and take an appropriate action.
This feature is available only if the operating mode is reverse proxy or true transparent proxy.
16