Description | This article describes the steps to enable vTPM (Virtual Trusted Platform Module) on a FortiGate Virtual Machine running in a Nutanix environment. |
Scope | FortiOS 7.2.9 or more recent. |
Solution |
A vTPM is a software-based representation of a traditional TPM 2.0 chip. It performs the same hardware-based security functions as a TPM, including attestation, key generation, and random number generation, without requiring a physical chip. The open-source Kernel-based Virtual Machine (KVM) will be used to make vTPM support available in virtual FortiGate running in Nutanix AHV. Prerequisites:
--tpm backend.type=emulator,backend.version=2.0,model=tpm-tis Exporting from KVM:
/etc/libvirt/qemu/
virsh domblklist <VM-NAME>
Importing in Nutanix:
Additional hard drive (~30GB) for logging purposes.
Do not power it on after the Virtual Machine has been created.
vm.update <vm-name> virtual_tpm=true
Replace <vm-name> with the name of the FortiGate VM.
Start FortiGate VM.
The FortiGate should take a few minutes to boot and is expected to preserve the configuration and log present on the FortiGate deployed in the KVM environment (the hard disk imported is a sector-by-sector copy of the original). Verify the vTMP:
Check if vTMP is enabled and works correctly, and confirm it using the following command:
diagnose hardware deviceinfo tpm
diagnose tpm get-property
diagnose tpm selftest
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.