AWS Deployment Guide
AWS Deployment Guide
Trademarks
For a list of RSA trademarks, go to www.emc.com/legal/emc-corporation-trademarks.htm#rsa.
License Agreement
This software and the associated documentation are proprietary and confidential to EMC, are
furnished under license, and may be used and copied only in accordance with the terms of such
license and with the inclusion of the copyright notice below. This software and the
documentation, and any copies thereof, may not be provided or otherwise made available to any
other person.
No title to or ownership of the software or documentation or any intellectual property rights
thereto is hereby transferred. Any unauthorized use or reproduction of this software and the
documentation may be subject to civil and/or criminal liability.
This software is subject to change without notice and should not be construed as a commitment
by EMC.
Third-Party Licenses
This product may include software developed by parties other than RSA. The text of the license
agreements applicable to third-party software in this product may be viewed on the product
documentation page on RSA Link. By using this product, a user of this product agrees to be fully
bound by terms of the license agreements.
Distribution
EMC believes the information in this publication is accurate as of its publication date. The
information is subject to change without notice.
September 2017
Contents
4
AWS Deployment Guide
l For packet capture in AWS, you can purchase either of the following Third-Party solutions. If
you engage one of these third-parities, they will assign an account representative and a
professional services engineer to you who will work closely with RSA staff.
l Gigamon® GigVUE
l Ixia Cloudlens™
l Make sure that compute capacity provides a write speed of 10% greater than the required
sustained capture and ingest rate for the deployment.
l Build Concentrator directory for index database on the Provisioned IOPS SSD.
Abbre- Description
viations
Abbre- Description
viations
EBS Volume Elastic Block Store (EBS) volume is a highly available and reliable stor-
age volume that you can attach to any running instance that is in the
same Availability Zone. Refer to the AWS "Amazon EBS Volumes"
documentation (http://-
docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSVolumes.html) for
more information on EBS Volumes.
EC2 instance Virtual server in AWS Elastic Compute Cloud (EC2) for running
applications on the AWS infrastructure. See also Instance.
Abbre- Description
viations
Gbps Gigabits per second or billions of bits per second. It measures band-
width on a digital data transmission medium such as optical fiber.
Instance A virtual host in the AWS (that is, virtual machine or server in the
AWS infrastructure on which you run services or applications). See
also EC2 Instance.
Instance Type Specifies the required CPU and RAM for an instance. Refer to the
AWS "Amazon EC2 Instance Types" documentation
(https://aws.amazon.com/ec2/instance-types/) for more information on
instance types.
Abbre- Description
viations
Mbps Megabits per second or millions of bits per second. It measures band-
width on a digital data transmission medium such as optical fiber.
On-Premise On-premise hosts are installed and run on computers on the premises
(in the building) of the organization using the hosts, rather than in the
AWS.
Security Group Set of firewall rules. See the "Network Architecture and Ports" doc-
umentation in RSA Link (https://community.rsa.com/docs/DOC-77879)
for a comprehensive list of the ports you must set up for all Security
Analytics components.
VM Virtual Machine
l CloudLens™ (Ixia® Solution) through Ixia clients and the CloudLens Docker installed on the
Decoder, facilitates packet data capture in AWS.
l Decoder collects packet data. The Decoder captures, parses, and reconstructs all network
traffic from Layers 2 – 7.
l Log Decoder collects logs. The Log Decoder collects log events from hundreds of devices
and event sources.
l Concentrator indexes metadata extracted from network or log data and makes it available
for enterprise-wide querying and real-time analytics while facilitating reporting and alerting.
Prerequisites
You need the following items before you begin the integration process:
l Ixia account (https://login.ixiacom.com/)
l Network rout-able (and proper AWS Security Groups) for the containers to transfer data to
the RSA Security Analytics Suite Decoder.
Supported Services
RSA provides the following Security Analytics services.
l Security Analytics Server
l Archiver
l Broker
l Concentrator
l Log Decoder
l Decoder
This topic contains the minimum AWS instance configuration settings recommended for the
Security Analytics (SA) virtual stack components.
l EC2 Instance:
o Minimum instance type - m4-xlarge is the minimum instance type required for any SA
component AMI so that it can function.
o Instance type adjustments -you must adjust instance types according to your ingestion rate,
content and parsers, dashboard reports, scheduled reports, investigations, and active users.
o Recommended settings - the recommended settings in the SA component instance tables
below were calculated under the following conditions.
o Ingestion rates of 15,000 EPS and 1.5 Gbps were used.
o All the components were integrated.
o The Log stream included a Log Decoder, Concentrator, and Archiver.
o The Packet Stream included a Packet Decoder and Concentrator.
o Incident Management was receiving alerts from the Reporting Engine and Event Stream
Analysis.
o The background load included reports, charts, alerts, investigation, and incident
management.
Note: The Concentrator index volume must be allocated on Provisioned IOPS SSD.
l Index
l Meta
l Session
l Packet
Archiver
EC2 Instance
Tenancy Type -
Enhanced
Dedicated -
EPS Instance Type Networking
Run a Dedicated
Enabled
Instance
IOPS/Baseline
Volumes Device Volume Type
Throughput
Broker
EC2 Instance
m4.xlarge No Yes
No of CPU: 4
Memory: 16 GB
IOPS/Baseline
Volumes Device Volume Type
Throughput
EC2 Instance
Tenancy Type -
Enhanced
Dedicated -
EPS Instance Type Networking
Run a Dedicated
Enabled
Instance
IOPS/Baseline
Volumes Device Volume Type
Throughput
EC2 Instance
Tenancy Type -
Enhanced
Dedicated -
Mbps/Gbps Instance Type Networking
Run a Dedicated
Enabled
Instance
IOPS/Baseline
Volumes Device Volume Type
Throughput
EC2 Instance
Tenancy Type -
Enhanced
Dedicated -
Mbps/Gbps Instance Type Networking
Run a Dedicated
Enabled
Instance
IOPS/Baseline
Volumes Device Volume Type
Throughput
EC2 Instance
Tenancy Type -
Enhanced
Dedicated -
EPS Instance Type Networking
Run a Dedicated
Enabled
Instance
IOPS/Baseline
Volumes Device Volume Type
Throughput
EC2 Instance
Tenancy Type -
Enhanced
Dedicated -
EPS Instance Type Networking
Run a Dedicated
Enabled
Instance
IOPS/Baseline
Volumes Device Volume Type
Throughput
Log Decoder
EC2 Instance
Tenancy Type -
Enhanced
Dedicated -
EPS Instance Type Networking
Run a Dedicated
Enabled
Instance
IOPS/Baseline
Volumes Device Volume Type
Throughput
EC2 Instance
m4.2xlarge No Yes
No of CPU: 8
Memory: 32 GB
m4.4xlarge No Yes
No of CPU: 16
Memory: 64 GB
IOPS/Baseline
Volumes Device Volume Type
Throughput
Rules
You must adhere to the following rules when deploying Security Analytics in AWS.
l SSH to the Security Analytics Server instance at least once after deployment to initialize the
system.
l Do not interrupt the execution of netconfig.sh script during the first SSH console login to any
Security Analytics AWS instance
l Always use private IP addresses when you provision AWS Security Analyticsinstances.
l Before you enable the out-of-the-box (OOTB) dashboards, set the default data source in
Reporting Engine configuration page.
l If you reboot the Packet Decoder instance, the tunnel is not retained. Create the tunnel on
Packet Decoder again and restart the decoder service.
Checklist
Step Description √
Recommendations .
4. Type "RSA-SA" in the search field to find the Security Analytics AMIs.
3. Click Next: Configure Instance Details at the bottom right of the Step 2: Choose an
Instance Type page.
The Step 3. Configure Instance Details page is displayed.
For Security Analytics, the subnet and VPC are defaulted to the values in the following
example.
4. Click Next: Add Storage at the bottom right of the Step 3: Configure Instance Details
page.
The Step 4. Add Storage page is displayed.
5. Click Next: Add Tags at the bottom right of the Step 4: Add Storage page.
The Step 5. Add Tags page is displayed. Enter the name of your Instance.
6. Click Next: Configure Security Group at the bottom right of the Step 5: Add Tags page.
The Step 6. Configure Security Group page is displayed.
b. Create a rule that opens all the firewall for the Security Analytics component.
You must configure the security group correctly to configure the instance (host) from the
Security Analytics) User Interface and SSH to it.
Note: See the "Network Architecture and Ports" documentation in RSA Link
(https://community.rsa.com/docs/DOC-77879) for a comprehensive list of the ports you
must set up for all Security Analytics components..
Note: After you configure a Security Group, you can change it at any time.
7. Click Review and Launch at the bottom right of the Step 6: Configure Security Group
page.
The Step 7. Review Instance Launch page is displayed.
8. Click Launch at the bottom right of the Step 7. Review Instance Launch page.
The Select an existing key pair or create a new key pair dialog is displayed.
12. Select Instances in the left navigation panel to review all instances that AWS is initializing
(for example, the SA-Concentrator) .
Note: After you successfully launch an instance, AWS assigns a default hostname to it.
Seethe "Change the Name and Hostname of a Host" documentation in RSA Link
(https://community.rsa.com/docs/DOC-74112) for instructions on changing a hostname.
l Ixia CloudLens™
Gigamon® Visibility Platform on AWS will be available through the AWS Marketplace and
activated by a BYOL license. A thirty-day free trial is also available.
For more information on the Gigamon® solution refer to the "Gigamon® Visibility Platform for
AWS Data Sheet" (https://www.gigamon.com/sites/default/files/resources/datasheet/ds-
gigamon-visibility-platform-for-aws-4095.pdf ).
For deployment details refer to the "Gigamon® Visibility Platform for AWS Getting Started
Guide" (https://www.gigamon.com/sites/default/files/resources/deployment-guide/dg-visibility-
platform-for-aws-getting-started-guide-4111.pdf).
After the “Monitoring Session” is deployed within the Gigamon GigaVUE-FM, you can
configure the Security AnalyticsTunnel.
$ sudo ifconfig (to verify if the tunnel tun0 is being listed in the
list of interfaces)
$ sudo lsmod | grep gre ( to make sure if the below kernel modules
are running:
ip_gre 18245 0
ip_tunnel 25216 1)
If they are not running then execute the below commands to enable the
modules
3. Create a firewall rule in the Packet Decoder to allow traffic through the tunnel.
b. Append the line -A INPUT -p gre -j ACCEPT before the commit statement
a. Log in to Security Analytics, select the decoder/config node in Explorer view for the
Packet Decoder service.
a. Restart Decoder service after you create the tunnel in Packet Decoder.
b. Log in to Security Analytics, select the decoder/config node in Explorer view for the
Packet Decoder service, and set the following parameters.
capture.device.params = interfaces=tun0,tun1,tun2
capture.selected = packet_mmap_,All
n Deploy client machines onto which you want to route the traffic to Security Analytics
Decoder. See the Ixia CloudLens documentation (https://store.ixiacom.com/product/cloudlens-
public) for specifications needed for supported client machines.
Complete the following steps to create a new project and get your project key.
1. Get Cloudlens login credentials and access to a sandbox.
b. Send your Ixia login account email to [email protected] so Ixia can provide you
with access to the Sandbox.
3. Click + (add) to create a new project with a name of your choosing (for example,
Netwitness-IxiaIntegration).
4. Click on your newly created project and make note of your Project Key.
You need the key later for the API key configured on the Host & Tool agents.
Complete the following steps to install the Docker container onto the Security Analytics
Decoder.
1. SSH to the Packet Decoder.
2. Enter the following command to install the Docker RPM onto the Decoder.
#rpm -iUvh http://dl.fedoraproject.org/pub/epel/6/x86_64/epel-
release-6-8.noarch.rpm
4. Enter the following commands to complete the install the Docker service on the Decoder.
#yum clean all
# yum –y install docker-io
Complete the follow steps to Y install the Docker Container onto the client machines for which
you want to route the traffic to the Security Analytics Decoder.
1. SSH to the AWS Client instance.
Caution: You must enable the required repository to install the Docker RPM on the AWS
Client instance.
Warning: If you cut and paste commands from a PDF, first paste them into a test editor such
as Notepad to confirm the syntax before pasting into the OS CLI. Direct cut and paste
between PDF and CLI can contain dashes or other special characters that should not be part of
the commands.
Complete the following steps to map the Packet Decoder to the client machines to route the
traffic to the Packet Decoder.
1. Go to the Cloudlens public site (https://www.ixia-sandbox.cloud/).
7. Filter the client host instance from the list, and click Save Search.
9. Drag a connection between the your client machine instance and Decoder instance to allow
the flow of packets.
Complete the following steps to validate that packets are actually arriving at the Packet
Decoder.
1. SSH to the Packet Decoder.
3. Generate traffic from the client OS instance CLI (for example, wget
http://www.google.com/).
5. Enter the following commands to look for suitable results in the tcpdump.
tcpdump -I Cloudlens0
Complete the following steps in the Packet Decoder to set the interface to use for the Ixia
integration.
1. SSH to the Packet Decoder.
4. In the Admin Services view, select a Decoder service and click > View > Explore.
5. Expand the decoder node and click config to view the configuration settings.
7. (Conditional) - If you have multiple capture interfaces on the Packet Decoder, set the
parameters with the following values.
capture.device.params --> interfaces=cloudlens0,cloudlens1
8. Restart the Decoder service after you set the capture.selected parameter.