Sensor on AWS Deployment and Administration
This document describes the deployment and administration of the Sensor in the AWS environment.
About the Sensor
The Sensor examines your network traffic in order to identify a variety of network events that can be of interest to the VMware NSX Network Detection and Response. This ranges from file transfers (for example, executables, documents, or email messages) to suspicious network interactions, to metadata on network activities observed in the environment (for example, netflow, pdns, or webrequests). All this information is extracted by the Sensor and streamed to the VMware backend that processes and presents the data to the user.
The Sensor is available as a software ISO that you install on your own hardware or in a VMware ESXi VM, as an Amazon Machine Image (AMI), or as an Azure VM.
Network Connectivity
The installation and update services need to connect to external servers for downloading software and data bundles (such as sandbox images). All hosts that are contacted for such downloads are listed in this section.
To increase the availability and reduce download times, the system can be configured to download large files from content distribution network (CDN) servers. As such hosts are geographically distributed, the contacted hosts may vary from system to system, and hosts outside the documented list may be contacted for downloads.
The use of CDNs is enabled by default. You can also explicitly enable or disable
this feature with the lastline_register
command (see Register the Sensor, 11).
If you explicitly enable the use of CDNs or choose to accept the default, ensure that you adjust your firewall rules to allow access to the CDN servers.
Domain Names
For a hosted installation using the NSX Cloud, the server hosting the Sensor needs to be able to connect to:
-
management.lastline.com (for EMEA customers management.emea.lastline.com)
on TCP port 443. -
user.lastline.com (for EMEA customers user.emea.lastline.com)
on TCP port 443. -
log.lastline.com (for EMEA customers log.emea.lastline.com)
on TCP port 443. -
update.lastline.com (for EMEA customers update.emea.lastline.com)
on TCP port 443 . -
ntp.lastline.com
on UDP port 123 for time synchronization. It can be replaced with a local NTP server.
You can add FQDNs such as the CDN domain for Google. For further details and information about VMware NSX Network Detection and Response CDN operation, see VMware Knowledge Base article NSX Lastline CDN Usage (900006).
Expected IP Addresses
The domain names above may resolve to any IP addresses within the following ranges:
-
38.95.226.0/24
-
38.142.33.16/28
-
199.91.71.80/28
-
46.244.5.64/28
-
66.170.109.0/24
Deploy the Sensor
The following topics describe how to deploy the Sensor on Amazon Web Services and then register it with the VMware backend including the User Portal. In addition, an example is provided showing how to use the Sensor to be an AWS traffic mirroring target.
Deploy the Sensor AMI
Before you can deploy the Sensor in AWS, you must have a VPC defined and configured.
Deploy a Sensor instance based on the official VMware NSX Network Detection and Response AMI in the AWS Marketplace. Configure the Sensor instance for the AWS environment.
Registration and Configuration
To register and apply the software configuration to the Sensor, you must login to the server console.
Register the Sensor
The registration process runs some tests to check hardware compatibility. The configuration is then applied to the machine. This process may take a while (20-40 minutes) depending on your network connectivity and system characteristics.
After the completed prompt is displayed, select <Ok>
or press
Enter to
exit from the registration process.
Re-registration
If the Sensor needs to be replaced or reinstalled, the existing appliance needs to be deregistered first before your new registration will succeed.
Delete the Sensor
Before you can successfully delete the Sensor from the User Portal it must be offline. This is done from the EC2 Dashboard.
To delete the Sensor, it needs to be offline and deregistered.
Configure AWS Traffic Mirroring
AWS traffic mirroring allows you to route the traffic generated by a load balancer or monitored appliance to the Sensor AMI for processing. This feature provides certain advantages:
-
VPC NAT gateways are not required to monitor outgoing traffic from private networks.
-
Traffic within a private network can be mirrored, including AWS DNS requests.
-
The Sensor does not need to be inline, reducing the risk of failures.
-
The general network setup is less complex. Traffic can be mirrored to an internal network load balancer which then distributes it to the Sensor.
-
As your workloads increase, scaling can be easily implemented by simply adding or removing the number of appliances registered at the network load balancer.
The mirrored traffic is tunneled using the VXLAN encapsulation protocol. The Sensor automatically accepts and parses these tunneled packets and analyzes the traffic.
Traffic from the mirror source that matches the (optional) filter is encapsulated as specified in RFC 7348 and delivered to the mirror target. If the target is a load balancer, the traffic gets distributed to the Sensor instances for processing. The load balancer must be configured to handle VXLAN packets. See Traffic Mirror Targets for further information.
Administer the Sensor
The Sensor was developed to require as little maintenance and administration as possible.
The following topics describe how to customize and configure some of the advanced features of the Sensor.
Configuration Tool
Use the VMware
NSX Network Detection and
Response configuration tool, lastline_setup
, to administer and manage the Sensor.
If you encounter an error running any of the lastline_setup
command options, make a note of
the error message returned and contact VMware Support.
Network Configuration
You can easily change the network configuration of the Sensor. This may be needed if its assigned IP address changes (for example, upon a reconfiguration of the network).
Update Fully Qualified Domain Name
You can update the FQDN of the Sensor.
Test the Sensor
Check the state of the Sensor with the
lastline_test_appliance
command.
Disable Automatic Updates
VMware periodically releases appliance updates or hotfixes. By default, automatic updates are enabled on newly installed appliances. As long as the appliance has automatic updates enabled, these updates and fixes will transparently be applied to the system.
If you prefer to manually update the Sensor, follow these steps to disable automatic updates.
Manual Updates
If you have disabled automatic updates for your appliances you must apply updates and hotfixes manually.
Follow these steps to manually update an appliance.