Deployment Guide PDF
Deployment Guide PDF
Contents
AlienVault Deployment Guide ...................................................................................................................... 1
About USM Appliance System Architecture and Components ................................................................. 2
USM Appliance Deployment Options ....................................................................................................... 3
USM Appliance Deployment Examples......................................................................................................... 4
Example I: Simple Deployment ............................................................................................................. 4
Example II: Extended Simple Deployment ............................................................................................ 5
Example III: Complex Deployment ........................................................................................................ 6
Minimum Hardware Requirements for USM Appliance Virtual Machines................................................... 7
Firewall Permissions...................................................................................................................................... 8
About the Use of VPN ............................................................................................................................. 10
2 Deployment Planning
6 Setup Wizard
7 IDS Configuration
8 VPN Configuration
10 Plugin Managment
USM Appliance Sensor(s) — Deployed throughout the network to collect and normalize
information from any devices in your network environment that you want to manage with USM
Appliance. A wide range of plugins are available to process raw logs and data from various
types of devices such as firewalls, routers, and host servers.
USM Appliance Server — Aggregates and correlates information that the USM Appliance
Sensors gather. (This is USM Appliance’s SIEM capability.) Provides single pane-of-glass
management, reporting, and administration through a web-based user interface.
USM Appliance Logger — Securely archives raw event log data for forensic research and
compliance mandates. (This archive of raw event data is also referred to as cold storage.)
Simple Deployment Model — All USM Appliance components (Sensor, Server, and Logger) are
combined in a USM Appliance All-in-One appliance. This configuration is most often used in
smaller environments, as well as for demonstrations and proof-of-concept deployments.
Multi-tier, Distributed Deployment Model — This model deploys each AlienVault USM
Appliance component (Sensor, Server, and Logger) as an individual virtual or hardware appliance
to create a distributed system topology.
The distributed deployment model also comes in two versions, USM Appliance Standard and USM
Appliance Enterprise, that increase scalability and performance by provisioning dedicated systems
The USM Appliance Sensor component on the USM Appliance All-in-One collects logs from the following
networks:
Office network
Wireless network
DMZ
Firewalls
The USM Appliance All-in-One also monitors the network traffic through the connected switches.
USM Appliance Remote Sensor collects logs and monitors traffic specific to the subnet. It then sends
these data to USM Appliance All-in-One on the main network for correlation and risk assessment.
On the main network at headquarters, a single USM Appliance Server, a Logger, and at least one Sensor
install as individual appliances to increase scalability and performance.
All USM Appliance Sensors connect to one USM Appliance Server where correlation and risk assessment
occur.
The USM Appliance Server forwards the events and alarms to the USM Appliance Logger for long-term
storage.
Warning: In USM Appliance version 5.4, AlienVault updated its Network IDS to include the Hyperscan
library, which requires the CPU to support SSSE3 (Supplemental Streaming SIMD Extensions 3)
instruction set.
Name Value
Firewall Permissions
USM Appliance components must use particular URLs, protocols, and ports to function correctly.
Note: If deploying USM Appliance All-in-One, you only need to open the ports associated with the
monitored assets, because All-in-One includes both USM Appliance Server and USM Appliance Sensor,
therefore the communication between them becomes internal.
If your company operates in a highly secure environment, you must change some permissions on your
firewall(s) for USM Appliance to gain access.
The following diagram shows the port numbers used by the USM Appliance components to
communicate with each other and with the monitored assets. The direction of the arrows indicate the
direction of the network traffic.
Note: When enabling the VPN, you do not need to open the other ports between the USM
Appliance Sensor and the USM Appliance Server, because all communication goes through the VPN
tunnel.
If you enable VPN, in addition to having port 33800/TCP open for the VPN tunnel, you also need to allow
TLS transport for that port in case you use a firewall/security device that can perform inspection or
interception of TLS traffic.
949.398.2600