Sensor Installation and Administration
This document describes the installation and administration of the Sensor in a Hosted or an On-Premises environment.
About the Sensor
The Sensor examines your network traffic in order to identify a variety of network events that can be of interest to the VMware NSX Network Detection and Response. This ranges from file transfers (for example, executables, documents, or email messages) to suspicious network interactions, to metadata on network activities observed in the environment (for example, netflow, pdns, or webrequests). All this information is extracted by the Sensor and streamed to the VMware backend that processes and presents the data to the user.
The Sensor is available as a software ISO that you install on your own hardware or in a VMware ESXi VM, as an Amazon Machine Image (AMI), or as an Azure VM.
Supported Hardware
Refer to Hardware Specifications for details about the hardware certified for use with VMware NSX Network Detection and Response appliances.
Network Connectivity
The installation and update services need to connect to external servers for downloading software and data bundles (such as sandbox images). All hosts that are contacted for such downloads are listed in this section.
To increase the availability and reduce download times, the system can be configured to download large files from content distribution network (CDN) servers. As such hosts are geographically distributed, the contacted hosts may vary from system to system, and hosts outside the documented list may be contacted for downloads.
The use of CDNs is enabled by default. You can also explicitly enable or disable
this feature with the lastline_register
command (see Register the Sensor, 11).
If you explicitly enable the use of CDNs or choose to accept the default, ensure that you adjust your firewall rules to allow access to the CDN servers.
Domain Names
For a hosted installation using the NSX Cloud, the server hosting the Sensor needs to be able to connect to:
-
management.lastline.com (for EMEA customers management.emea.lastline.com)
on TCP port 443. -
user.lastline.com (for EMEA customers user.emea.lastline.com)
on TCP port 443. -
log.lastline.com (for EMEA customers log.emea.lastline.com)
on TCP port 443. -
update.lastline.com (for EMEA customers update.emea.lastline.com)
on TCP port 443 . -
ntp.lastline.com
on UDP port 123 for time synchronization. It can be replaced with a local NTP server.
You can add FQDNs such as the CDN domain for Google. For further details and information about VMware NSX Network Detection and Response CDN operation, see VMware Knowledge Base article NSX Lastline CDN Usage (900006).
For an On-Premises installation, and assuming that
lastline.example.com
is the FQDN for your local Manager, the server hosting the Sensor needs to be able to connect to the Manager as well as to
log.lastline.example.com
, update.lastline.example.com
,
and user.lastline.example.com
. These FQDN/hostnames should all be aliases
for the Manager.
Expected IP Addresses
The domain names above may resolve to any IP addresses within the following ranges:
-
38.95.226.0/24
-
38.142.33.16/28
-
199.91.71.80/28
-
46.244.5.64/28
-
66.170.109.0/24
All connections can be optionally routed through an HTTP/HTTPS proxy (see "Registration and Configuration", 5). Proxy authentication is not supported.
Acquire the Sensor ISO
To install the Sensor, you must download the ISO from VMware.
Install Sensor
The installation process for the Sensor consists of three steps. In the first step, the base system is installed. In the second step, basic configuration information is collected and the configuration is applied to the system. In the final step, required data is retrieved from the VMware backend servers.
Base System Installation
The Sensor uses Ubuntu Server 18.04 (Bionic distribution) as its underlying operating system. Therefore, many of the steps of the installation are similar to the ones required to install Ubuntu Server. Refer to the Ubuntu guide, Installing Ubuntu 18.04.
Many of the steps involved in a standard Ubuntu installation have been automated and hidden from the Sensor Installer.
If you are running an existing installation with appliances based on an earlier Ubuntu release, you should upgrade to a version based on Bionic. To upgrade to Bionic from Xenial, you must first update the Sensor to the last version that supports Xenial (see the release notes for your specific version, and then follow the instructions on the linked support article).
Install on VMware ESXi
Before you install the Sensor on VMware ESXi, you must ensure the VM meets the minimum hardware specifications for the class of appliance. See Hardware Specifications for details. Ensure that the base hardware runs on an Intel CPU.
For full performance, the Sensor must have DirectPath I/O access to the Intel I350 for 1G networks or Intel X710-DA2 for 10G networks NICs.
Using the VMware ESXi vSphere client, navigate to Configuration→Advanced Settings→Configure Passthrough. Select all Intel I350 or Intel X710-DA2 interfaces, and click OK. Then restart VMware ESXi.
Using the VMware ESXi vSphere client 7.0 update 3, create a new virtual machine and configure it to meet the requirements of the Sensor.
Registration and Configuration
Before you can configure Sensor for an On-Premises installation, you must have previously installed and configured the Manager. The Manager must be on-line and reachable.
For a hosted installation using the NSX Cloud, the User Portal must be accessible at https://user.lastline.com/ (for EMEA customers https://user.emea.lastline.com/).
To register and apply the software configuration to the Sensor, you must login to the server console.
Register the Sensor
The registration process runs some tests to check hardware compatibility. The configuration is then applied to the machine. This process may take a while (20-40 minutes) depending on your network connectivity and system characteristics.
After the completed prompt is displayed, select <Ok>
or press
Enter to
exit from the registration process.
Re-registration
If the Sensor needs to be replaced or reinstalled, the existing appliance needs to be deregistered first before your new registration will succeed.
Delete the Sensor
Before you can successfully delete the Sensor from the User Portal it must be offline. The easiest way to do this is to login to the appliance and shut it down.
To delete the Sensor, it needs to be offline and deregistered.
Administer the Sensor
The Sensor was developed to require as little maintenance and administration as possible.
The following topics describe how to customize and configure some of the advanced features of the Sensor.
Configuration Tool
Use the VMware
NSX Network Detection and
Response configuration tool, lastline_setup
, to administer and manage the Sensor.
If you encounter an error running any of the lastline_setup
command options, make a note of
the error message returned and contact VMware Support.
Network Configuration
You can easily change the network configuration of the Sensor. This may be needed if its assigned IP address changes (for example, upon a reconfiguration of the network).
Reconfigure for DHCP
To enable a network configuration using DHCP, use the network
option of
the lastline_setup
command.
Reconfigure for Static Addressing
To enable a network configuration using a static IP, you must provide values for the
address, netmask, gateway, and
dns_nameservers parameters. Use the network
options of
the lastline_setup
command to make these changes.
Passive sniffing deployment
By default during registration, the Sensor is configured for passive sniffing by defining a sniffing interface (Register the Sensor, 6) as well as an injection interface (7). This makes it possible for the Sensor to examine traffic and then enforce blocking by injecting packets into the wire.
To update the sniffing interface, use the sniffing_interfaces
option of
the lastline_setup
command.
To update the injection interface, use the inject_interface
option. This
interface must be able to communicate with the other hosts of the monitored network. It
blocks traffic by injecting packets according to the configured modes, for example, TCP RST
packet, DNS NXDOMAIN response, HTTP 302 redirect, etc.
Inline sniffing deployment
Configure the Sensor to run in inline mode. In this mode, the Sensor acts as a bridge for the traffic on its network segment. All packets flow through the Sensor to be examined and potentially blocked.
To configure the sniffing interfaces for inline mode by connecting at least two sniffing
interfaces together, use the sniffing_interfaces
and
inline_interfaces
options of the lastline_setup
command.
Update Fully Qualified Domain Name
You can update the FQDN of the Sensor.
Update On-Premises Manager FQDN
If you had selected "Use On-Premises Manager" during the registration and configuration of the Sensor and the FQDN of the Manager changes, you must update the FQDN information to ensure your appliances can continue to successfully communicate.
This process does not allow you to move appliances from one Manager to another.
If the Manager is deployed in an active-standby configuration, you must use the configured virtual IP address, either taken from DNS or using the address directly.
Enable the monitoring user
The Sensor has a
monitoring user who can access the system using console or via SSH
(password only without using the SSH key). To enable the monitoring user, use the
monitoring_user_password
option of the lastline_setup
command.
Once the monitoring user is enabled, you can SSH to the Sensor using that account:
server# ssh monitoring@ip_appliance
monitoring@ip_appliance's password:
...
monitoring@lastline-manager:~$
Enable Password-Based SSH Authentication
The Sensor supports specifying
users who can access the system using console or via SSH (password only without using the
SSH key). To enable existing users to authenticate with password-based SSH use the
enable_additional_password_auth_ssh_usernames
option of the
lastline_setup
command.
Once the user has been added, you can SSH to the Sensor using that account:
server# ssh ghopper@ip_appliance
ghopperg@ip_appliance's password:
...
ghopper@lastline-manager:~$
Test the Sensor
Check the state of the Sensor with the
lastline_test_appliance
command.
Disable Automatic Updates
VMware periodically releases appliance updates or hotfixes. By default, automatic updates are enabled on newly installed appliances. As long as the appliance has automatic updates enabled, these updates and fixes will transparently be applied to the system.
If you prefer to manually update the Sensor, follow these steps to disable automatic updates.
Manual Updates
If you have disabled automatic updates for your appliances you must apply updates and hotfixes manually.
Follow these steps to manually update an appliance.
About Hardening
During the development process, steps were taken to lock down the Sensor by default to help reduce any attack surfaces. These include:
-
Default Applications — All unnecessary applications included in the base Ubuntu server build have been removed from the system. What remains are the libraries and applications necessary for the normal functioning, routine maintenance, and troubleshooting of the Sensor.
-
Default Firewall — The Sensor image comes with Uncomplicated FIrewall (UFW) installed and configured to restrict inbound access to the system.
-
Security Patches — The system will install daily OS security updates by default. You can disable automatic updates.
-
Least privilege — VMware has taken care to ensure a paradigm of least privilege regarding the permissions of services and file system access.
-
Secure SSH — SSH is configured to use certificate-based authentication by default.
-
TLS encryption — Communications between the appliances are TLS encrypted.
Harden the Sensor
We recommend the following guidelines for hardening the Sensor after installation. These steps are not required, but they will allow you to further restrict access to your VMware NSX Network Detection and Response appliances.
Hardware Specifications
The hardware certified for use with VMware NSX Network Detection and Response appliances is listed below:
Dell Hardware
Supported Dell Hardware
Manager | |
---|---|
Server Model | Dell PowerEdge R450 |
CPU Type |
|
CPU Quantity | 1 CPU |
Minimum RAM | 96 GB |
RAID Controller |
Dell EMC PowerEdge RAID Controller (PERC) H745/H755 (with flash-backed cache) |
RAID Configuration |
RAID 10 Note: If the Dell website does not allow RAID 10 configuration from
factory, purchase the server with RAID unconfigured and then manually create a RAID 10
virtual volume before software installation.
|
Persistent Storage | Recommended: 4 × 4 TB HDDs |
Additional Network Card | None |
Redundant Power Supply | Recommended for reliability |
iDRAC9 Enterprise | Recommended for remote management and installation |
Data Node | |
---|---|
Server Model | Dell PowerEdge R450 |
CPU Type |
|
CPU Quantity | 1 CPU |
Minimum RAM | 96 GB |
RAID Controller |
Dell EMC PowerEdge RAID Controller (PERC) H745/H755 (with flash-backed cache) |
RAID Configuration |
RAID 10 Note: If the Dell website does not allow RAID 10 configuration from
factory, purchase the server with RAID unconfigured and then manually create a RAID 10
virtual volume before software installation.
|
Persistent Storage | Recommended: 4 × 2 TB 10k RPM HDDs |
Additional Network Card | None |
Redundant Power Supply | Recommended for reliability |
iDRAC9 Enterprise | Recommended for remote management and installation |
Engine | |
---|---|
Server Model | Dell PowerEdge R450 |
CPU Type |
|
CPU Quantity | 1 CPU |
Minimum RAM |
128 GB Recommended: 4 GB per CPU virtual core |
RAID Controller |
Dell EMC PowerEdge RAID Controller (PERC) H745/H755 (with flash-backed cache) |
RAID Configuration | RAID 1 |
Persistent Storage | Minimum: 2 × 1 TB HDDs |
Additional Network Card | None |
Redundant Power Supply | Recommended for reliability |
iDRAC9 Enterprise | Recommended for remote management and installation |
Sensor — 1G Networks | |
---|---|
Server Model | Dell PowerEdge R450 |
CPU Type |
|
CPU Quantity | 1 CPU |
Minimum RAM | 64 GB |
RAID Controller |
Dell EMC PowerEdge RAID Controller (PERC) H745/H755 (with flash-backed cache) |
RAID Configuration | RAID 1 |
Persistent Storage | Minimum: 2 × 1 TB HDDs |
Additional Network Card | Intel i350 Quad Port 1GbE |
Redundant Power Supply | Recommended for reliability |
iDRAC9 Enterprise | Recommended for remote management and installation |
Sensor — 10G Networks | |
---|---|
Server Model | Dell PowerEdge R450 |
CPU Type |
|
CPU Quantity | 2 CPUs |
Minimum RAM | 128 GB |
RAID Controller |
Dell EMC PowerEdge RAID Controller (PERC) H745/H755 (with flash-backed cache) |
RAID Configuration | RAID 1 |
Persistent Storage | Minimum: 2 × 1 TB HDDs |
Additional Network Card | Intel X710 Dual Port 10GbE |
Redundant Power Supply | Recommended for reliability |
iDRAC9 Enterprise | Recommended for remote management and installation |
Previously Supported Dell Hardware
The following Dell hardware are no longer supported.
Manager | |
---|---|
Server Model | Dell PowerEdge R440 |
Chassis Type | Chassis with Hot-plug Hard Drives |
CPU Type | Intel® Xeon® Silver 4114 — or better (minimum 12 threads/cores) |
CPU Quantity | 1 CPU |
Minimum RAM | 64 GB ECC RAM |
RAID Controller | HW RAID10 |
RAID Configuration |
|
Minimum Persistent Storage | 4 × 2 TB 7.2K RPM SATA 6Gbps 3.5in |
Power Supply | Dual Hot-plug Power — Optional |
iDRAC9 Enterprise | Optional |
ProSupport Service Plan | Optional |
Data Node | |
---|---|
Server Model | Dell PowerEdge R440 |
Chassis Type | Chassis with Hot-plug Hard Drives |
CPU Type | Intel® Xeon® Silver 4114 — or better (minimum 24 threads/cores) |
CPU Quantity | 1 CPU |
Minimum RAM | 64 GB ECC RAM |
RAID Controller | HW RAID10 |
RAID Configuration |
|
Minimum Persistent Storage | 2 × 1 TB SATA HDD |
Power Supply | Dual Hot-plug Power — Optional |
iDRAC9 Enterprise | Optional |
ProSupport Service Plan | Optional |
Engine | |
---|---|
Server Model | Dell PowerEdge R440 |
Chassis Type | Chassis with Hot-plug Hard Drives |
CPU Type | Intel® Xeon® Silver 4114 — or better (minimum 20 threads/cores) |
CPU Quantity | 1 CPU |
Minimum RAM | 96 GB ECC RAM |
RAID Controller | HW RAID10 |
RAID Configuration |
|
Minimum Persistent Storage | 2 × 1 TB SATA HDD |
Power Supply | Dual Hot-plug Power — Optional |
iDRAC9 Enterprise | Optional |
ProSupport Service Plan | Optional |
Sensor — 1G Networks | |
---|---|
Server Model | Dell PowerEdge R440 |
Chassis Type | Chassis with Hot-plug Hard Drives |
CPU Type | Intel® Xeon® Silver 4114 — or better (minimum 20 threads/cores) |
CPU Quantity | 1 CPU |
Minimum RAM | 32 GB ECC RAM |
RAID Controller | HW RAID10 |
RAID Configuration |
|
Minimum Persistent Storage | 2 × 1 TB SATA (7.2K RPM) HDD |
Power Supply | Dual Hot-plug Power — Optional |
Network Card | Intel Ethernet I350 Quad-Port 1Gb Server Adapter |
iDRAC9 Enterprise | Optional |
ProSupport Service Plan | Optional |
Sensor — 10G Networks | |
---|---|
Server Model | Dell PowerEdge R440 |
Chassis Type | Chassis with Hot-plug Hard Drives |
CPU Type | Intel® Xeon® Silver 4114 — or better (minimum 20 threads/cores) |
CPU Quantity | 2 CPUs |
Minimum RAM | 128 GB ECC RAM |
RAID Controller | HW RAID10 |
RAID Configuration |
|
Minimum Persistent Storage | 2 × 1 TB SATA (7.2K RPM) HDD |
Power Supply | Dual Hot-plug Power — Optional |
Network Card | Intel Ethernet X710-DA2 10Gbps network card |
iDRAC9 Enterprise | Optional |
ProSupport Service Plan | Optional |
All-In-One | |
---|---|
Server Model | Dell PowerEdge R440 |
Chassis Type | Chassis with Hot-plug Hard Drives |
CPU Type | Intel® Xeon® Silver 4114 — or better (minimum 20 threads/cores) |
CPU Quantity | 2 CPUs |
Minimum RAM | 128 GB ECC RAM |
RAID Controller | HW RAID10 |
RAID Configuration |
|
Minimum Persistent Storage | 4 × 2 TB 7.2K RPM SATA 6Gbps 3.5in |
Power Supply | Dual Hot-plug Power — Optional |
Network Card | Intel Ethernet X710-DA2 10Gbps network card |
iDRAC9 Enterprise | Optional |
ProSupport Service Plan | Optional |
Analyst | |
---|---|
Server Model | Dell PowerEdge R440 |
Chassis Type | Chassis with Hot-plug Hard Drives |
CPU Type | Intel® Xeon® Silver 4114 — or better (minimum 12 threads/cores) |
CPU Quantity | 1 CPU |
Minimum RAM | 96 GB ECC RAM |
RAID Controller | HW RAID10 |
RAID Configuration |
|
Minimum Persistent Storage | 4 × 2 TB 7.2K RPM SATA 6Gbps 3.5in |
Power Supply | Dual Hot-plug Power — Optional |
iDRAC9 Enterprise | Optional |
ProSupport Service Plan | Optional |
HPE Hardware
- Manager
-
Intel® Xeon® Silver 4114 2.2GHZ
64 GB RAM
4 × 2 TB in RAID 10 (6 Gbps SATA)
On-board NIC
- Data Node
-
Intel® Xeon® Silver 4114 2.2GHZ
64 GB RAM
4 × 2 TB in RAID 10 (SAS 10K RPM)
On-board NIC
- Engine
-
Intel® Xeon® Silver 4114 2.2GHZ
96 GB RAM
2 × 2 TB HDDs in RAID 1 (6 Gbps SATA)
On-board NIC
- Sensor — 1G Networks
-
Intel® Xeon® Silver 4114 2.2GHZ
32 GB RAM
2 × 2 TB HDDs in RAID 1 (6 Gbps SATA)
Intel I350 Quad port (or HPE 366T)
- Sensor — 10G Networks
-
2 × Intel® Xeon® Silver 4114 2.2GHZ
128 GB RAM
2 × 2 TB HDDs in RAID 1 (6 Gbps SATA)
Intel X710-DA2
- Analyst
-
2 × Intel® Xeon® Silver 4114 2.2GHZ
128 GB RAM
2 × 2 TB HDDs in RAID 1 (6 Gbps SATA)
On-board NIC