Zum Inhalt springen

Install CAN

Deploy a sovereign, end-to-end encrypted Cloud Area Network on your own infrastructure — on any hyperscaler or on-premises hypervisor.

Self-hosted
End-to-end encrypted
Azure · AWS · GCP · VMware · vCenter · Proxmox
~30 min setup
1
Install the Core

The Core is the control plane of your Cloud Area Network — it manages identity, certificates, policy, and connectivity for all nodes and users.

Get Image

The CanMe Core appliance is available in the Azure Marketplace image gallery. Contact CanMe to receive your gallery access link.

Minimum: 4 vCPUs
RAM: 16 GB
Disk: 80 GB
Deploy in Azure
  • 1
    In the Azure Portal, navigate to Virtual Machines → Create → Azure virtual machine. Under Image, select the CanMe Core image from the shared gallery or Marketplace.
  • 2
    Choose a VM size with at least 4 vCPUs and 16 GB RAM. Standard_D4s_v3 or Standard_D4as_v4 are suitable starting points.
  • 3
    Under Networking, create or assign a Network Security Group (NSG) with the inbound and outbound rules listed in the port table below.
  • 4
    Assign a Static Public IP address. Note this IP — you will use it when creating the DNS A record in the Core Rollout steps below.
  • 5
    Review and create the VM. Once booted, the Rollout Page is reachable at https://:8443 after approximately 30 seconds.
Get Image

The CanMe Core appliance is available as an Amazon Machine Image (AMI) in AWS Marketplace. Contact CanMe to receive your AMI ID or Marketplace link.

Minimum: 4 vCPUs
RAM: 16 GB
Disk: 80 GB
Deploy in AWS
  • 1
    In the AWS Console, navigate to EC2 → Launch Instance. Under Application and OS Images, search for the CanMe Core AMI by ID or via Marketplace.
  • 2
    Choose an instance type with at least 4 vCPUs and 16 GB RAM. t3.xlarge, m5.xlarge, or c5.xlarge are all suitable.
  • 3
    Under Network Settings, create or select a Security Group with the inbound and outbound rules from the port table below. Ensure the instance is in a public subnet.
  • 4
    Assign an Elastic IP for a stable address. Note this IP — you will use it when creating the DNS A record in the Core Rollout steps below.
  • 5
    Verify the root EBS volume is 80 GB (gp3) and launch the instance.
Note: AWS Security Groups are stateful — inbound rules automatically permit the corresponding outbound reply traffic. Explicit outbound rules are still recommended for clarity.
Get Image

The CanMe Core appliance is available in the Google Cloud Marketplace. Contact CanMe to receive your Marketplace listing link.

Minimum: 4 vCPUs
RAM: 16 GB
Disk: 80 GB
Deploy in Google Cloud
  • 1
    In Google Cloud Console, go to Compute Engine → VM Instances → Create Instance. Under Boot disk, select the CanMe Core image from Marketplace.
  • 2
    Choose a machine type with at least 4 vCPUs and 16 GB RAM. n2-standard-4 or c2-standard-4 are recommended.
  • 3
    Under Networking, reserve a Static External IP and configure VPC Firewall Rules for all required ports. Apply rules via the instance’s network tag.
  • 4
    Note the static external IP — you will use it when creating the DNS A record in the Core Rollout steps below.
  • 5
    Create the instance and wait for it to reach running state.
Download ISO

Download the CanMe Core ISO image directly. The ISO is a bootable appliance installer — no additional OS installation is required.

Minimum: 4 vCPUs
RAM: 16 GB
Disk: 80 GB
Deploy in VMware vSphere / ESXi
  • 1
    Upload the ISO to a vSphere datastore via the vSphere Client (Storage → Upload Files) or via the ESXi host datastore browser.
  • 2
    Create a new VM: right-click the host or cluster and select New Virtual Machine. Set 4+ vCPUs, 16 GB+ RAM, and add an 80 GB disk. Choose Other Linux (64-bit) as the guest OS if prompted.
  • 3
    Under CD/DVD Drive, select Datastore ISO file and point to the uploaded ISO. Ensure Connect at power on is checked.
  • 4
    Assign the VM to a port group with outbound internet access. Ensure your upstream firewall permits the required ports listed below.
  • 5
    Power on the VM. The appliance boots from the ISO and self-installs. Once complete, note the IP address shown in the console. Ensure port-forwarding or a public IP is configured upstream so the appliance is reachable externally.
Firewall and port-forwarding rules are the responsibility of the administrator in on-premises environments. Verify all required ports are open at both the VM firewall level and any upstream firewall or router.
Download ISO

Download the CanMe Core ISO image. This image is compatible with vCenter-managed clusters and standalone ESXi hosts equally.

Minimum: 4 vCPUs
RAM: 16 GB
Disk: 80 GB
Deploy via vCenter
  • 1
    Log in to the vSphere Web Client connected to your vCenter Server. Navigate to the target cluster or host in the inventory.
  • 2
    Upload the ISO to a shared datastore accessible from the target host (Datastore → Upload Files).
  • 3
    Right-click the target host and select New Virtual Machine. Set 4+ vCPUs, 16 GB+ RAM, and add an 80 GB disk. Select Other Linux (64-bit) as the guest OS type.
  • 4
    Add a CD/DVD Drive backed by the uploaded ISO. Ensure Connect at power on is enabled.
  • 5
    Assign the VM to a distributed port group (or standard port group) with outbound internet access and the required firewall rules in place.
  • 6
    Power on the VM. The appliance boots and self-installs. Note the IP address from the console once complete. Ensure public reachability via port-forwarding or a public IP upstream.
vCenter does not manage external network access or firewall rules — those must be configured on your physical switches, NSX-T, or upstream router.
Download ISO

Download the CanMe Core ISO image. Upload it to Proxmox storage and boot a new VM from it directly.

Minimum: 4 vCPUs
RAM: 16 GB
Disk: 80 GB
Deploy in Proxmox VE
  • 1
    Upload the ISO to Proxmox storage via Datacenter → Storage → ISO Images → Upload, or via the CLI: scp canme-core.iso root@proxmox:/var/lib/vz/template/iso/
  • 2
    Create a new VM in the Proxmox UI: click Create VM. Set 4+ vCPUs, 16 GB+ RAM, and add an 80 GB disk (virtio-scsi recommended).
  • 3
    Under CD/DVD, select the uploaded ISO as the boot media. Ensure Boot Order has the CD drive first.
  • 4
    Set the network bridge (e.g. vmbr0) with outbound internet access. Configure port-forwarding or assign a public IP upstream for external reachability.
  • 5
    Start the VM. The appliance boots from the ISO and self-installs. Note the IP address shown in the Proxmox console once the appliance is running.
Port-forwarding and firewall rules must be configured at the Proxmox host level or on the upstream router. Verify all required ports are reachable from the internet before proceeding.
Required Firewall Ports — Core

Configure these rules in your cloud provider’s security group, NSG, or firewall before booting the appliance.

Inbound (to appliance)

PortPurpose
80/TCPHTTP redirect and certificate provisioning
443/TCPManagement UI (Cansole), API, authentication, overlay network
8440/TCPOverlay network control plane — edge node connections
9000/TCPOverlay network inter-node links
8443/TCPRollout page — temporary, only during initial setup

Outbound (from appliance)

PortDestinationPurpose
53/TCP1.1.1.1, 8.8.8.8DNS
443/TCPsupport.canme.networkSupport access
443/TCPlicense.canme.networkLicense server
443/TCPacrcanme.azurecr.ioSystem updates
443/TCPacme-v02.api.letsencrypt.orgTLS certificate provisioning

Core Rollout Same for all platforms

The Rollout Page is a one-time setup wizard served by the appliance at https://:8443. Once the Core is installed, Cansole will be available at the FQDN you configure below.

  1. 1
    Open the Rollout Page
    Navigate to https://:8443 in your browser and accept the self-signed certificate warning.
  2. 2
    Click “Install Core”
    On the choice screen, select Install Core to begin the Core installation process.
  3. 3
    Fill in the installation form
    FieldDescription
    License KeyYour CanMe license key (from your CanMe account)
    Core AddressThe network-wide FQDN for your Core and Cansole, e.g. canme.example.com. This address becomes the entry point for the entire Cloud Area Network — choose it carefully.
    Customer NameUsed to derive the internal domain name
  4. 4
    Create a DNS A record
    In your DNS provider, create an A record pointing your chosen Core Address (e.g. canme.example.com) to the appliance’s public IP address. This record must resolve before you click Install, as the Core uses it to provision a TLS certificate from Let’s Encrypt.
  5. 5
    Click “Install” and wait
    The progress bar updates in real time. Installation typically takes 3–8 minutes. Wait until the status shows Completed.
  6. 6
    Retrieve your credentials
    Enter your License Key in the verification field and click Retrieve Credentials. Credentials are displayed once only — copy or save them before closing the page.
  7. 7
    Access Cansole
    The rollout service disables itself automatically. Cansole is now reachable at your configured Core Address (e.g. https://canme.example.com). You will be prompted to set your password on first login.
Troubleshooting: If the installation fails, a Download Logs button appears on the error screen. Download the log bundle and send it to support@canme.cloud.