WedgeARP AMB v2.1 Training - Module F - Deployment and Configuration
WedgeARP AMB v2.1 Training - Module F - Deployment and Configuration
August, 2019
Outline
Part I - Deployment
• System Deployment
• High Availability Deployment
Internet
Unprotected
Egress
Ingress
Protected
4
Router/Proxy Mode
This mode is out-of-line with network traffic. WedgeARP must be specified as
a next hop in the network routing for the protected traffic. Use this mode
when you require the INGRESS (protected network) and the EGRESS (external
network) interfaces on different networks and when using the same physical
port.
In router mode, WedgeARP can act as an explicit proxy for HTTP clients, such
as web browsers. Each browser must be configured with this device’s IP
address as an HTTP proxy.
Internet Unprotected
Ingress
Protected
5
Restricted Auto-Route Mode
Restricted Auto-Route (RAR) is an additional feature that can be enabled in two
interface router mode. RAR has the advantage that static routes do not have to
be added for each network configured to route through the WedgeARP device.
In this mode, all traffic that is received on the ingress interface should be routed
out the egress interface to the configured egress gateway. Also, all traffic that is
received on the egress interface should be routed out the ingress interface to
the configured ingress gateway. To satisfy the two requirements above, an
ingress gateway and egress gateway must be configured.
Gateway
Router
Internet Unprotected
Egress
Ingress
Protected
6
ICAP Mode
Internet Content Adaptation Protocol, or ICAP, is a lightweight HTTP based
protocol designed to off-load responsibility for specific content handling to
dedicated servers. ICAP is generally used in proxy servers to integrate with third
party products like anti-virus software, malicious content scanners, and URL filters.
If a network already has a web proxy that supports ICAP, WedgeARP functions can
be added to the list of services available to this proxy.
WedgeARP will work in router mode in order to support ICAP deployment.
Internet Unprotected
Client
Ingress
Client
HTTP
Proxy
Wedge Networks, Inc. Confidential -7-
7
WCCP Mode
Web Cache Communication Protocol (WCCP) is a Cisco-developed content-
routing protocol that provides a mechanism to redirect traffic flows in real-
time. It has built-in load balancing, scaling, fault tolerance, and service-
assurance mechanisms. If a network router can act as a WCCP server,
WedgeARP functions can be added out-of-line from the data traffic by placing
the WedgeARP in the network, and by configuring it to register itself as a
WCCP client offering a service.
WedgeARP will work in router mode in order to support WCCP deployment.
Internet Unprotected
Client
Switch
Ingress w/WCCP
GRE
Tunnel Client
8
DCI TAP Mode
Full TAP mode is supported for HTTP, SMTP, POP3 and IMAP protocols in addition
to the DPI engine.
This network infrastructure mirrors client/server traffic to WedgeARP. The packets
are processed by the DPI engine, while in parallel, the TAP cluster will re-assemble
the network streams for processing by the DCI engine. Malware events may be
detected but not blocked in this configuration, and events are recorded in
WedgeIQ.
Network Traffic Network Traffic
Switch
Corporate
Internet Network
Mirrored Traffic
Ingress
Control Port
9
DPI Web Filter in TAP-WF Mode
(Two-Interfaced Router)
Switch
Corporate
Internet Network
Mirrored Traffic
Reset/Redirect URL
Ingress
Control Port
Egress
Switch
Corporate
Internet Network
Reset/Redirect URL
Mirrored Traffic
Ingress
Control Port
X
Egress
Zone 1
Primary
Zone
Public
Network
Zone 2
12
Network Integration with Divert Mode
WedgeARP supports network integration with DPI engines that selectively divert
traffic to a network entity, where the DPI engine expects the diverted network entity
to return responses via a MAC address re-write.
An example of this operations is in Sandvine’s PTS Half-Divert Mode. The internet side
traffic from WedgeARP is not IP transparent, as the WedgeARP IP is substituted for
the original client IP. However, the interaction is transparent from the client.
Traffic Redirecting
Device
Ingress
Switch
Internet
Egress
13
Hairpin Support
East-West traffic scanning Internet Gateway
Router
14
PART I - DEPLOYMENT
HIGH AVAILABILITY DEPLOYMENT
WedgeARP High Availability is designed for redundancy and failover purposes. It supports multiple deployment
modes as listed below. Users can choose suitable HA deployment modes according to their own network
topology.
1. Bridge Mode HA
2. Router Mode HA
3. LACP-based Bridge Mode HA (HA Bond mode)
4. LACP-based Bridge Mode Load Balance HA
5. Dual Interface Router Mode Load Balance HA
6. WCCP Cluster HA
Bridge Mode HA
WedgeARP bridge mode HA (RSTP) uses the Rapid Spanning Tree Protocol (RSTP). With RSTP, a cluster of
WedgeARP systems can be deployed in a redundant parallel bridging scenario with one WedgeARP system
handling traffic management in Active mode, with the others, waiting to take over in case of a failure in the
active machine, in Stand By mode.
Control
192.168.30.1
Egress Ingress
Internal
192.168.10.2 Network
192.168.10.0/24
Control
192.168.30.2
Internal
Firewall
Network
192.168.10.1
192.168.10.0/24
Ingress Ingress
Virtual IP
192.168.10.2 192.168.10.3
192.168.10.4
Control Control
192.168.30.2 192.168.30.3
192.168.30.1
To account for this, the ingress and egress interfaces should work in link bonding mode. Also, a heartbeat cable link between
two WedgeARP hosts is required. The management port of both WedgeARPs must be enabled and within the same network.
Egress Ingress
Internal
Internet LACP 802.3ad Heartbeat LACP 802.3ad
vPC
Network
WedgeOS HA WedgeIQ HA
192.168.6.123
192.168.4.1 192.168.3.21
192.168.6.1 192.168.3.1
192.168.4.254
192.168.3.200 Internet
192.168.5.1
192.168.4.200
192.168.5.234
192.168.4.2 192.168.3.22
192.168.4.132
Internet
WedgeARP Configuration:
5. Click Update.
Egress
WedgeIQ
OVS Wedge Service Conductor
Data Path
WedgeOS
Ingress
Event router
Terminal
user
interface
KVM LXD
Ubuntu
Wedge NDP platform
Wedge Networks, Inc. Confidential -35-
Hardware Appliance Cabling
1. Plug in the power cable.
Use the left, right, up, and down arrow keys on the keyboard and press Enter when you make a selection.
Use the space bar on your keyboard to select a checkbox.
Wedge Networks, Inc. Confidential -38-
Management Settings
Virtualization Platform
Data Subnet
Ingress
Gateway Egress
Internet WedgeOS
(Scanning)
Gateway
Control Mgmt. Subnet
WedgeIQ
(Policy & Reporting)
3. Set transparency
net transparency enable ip
net transparency enable mac
net transparency enable route
Wedge Networks, Inc. Confidential -45-
Configuring the WedgeOS Instance –
Route Mode
1. Log in to the WedgeOS virtual machine with username admin and password admin.
2. From the admin command-line interface, enter the following commands:
net inet set device <IP> netmask <netmask>
net gateway set <gateway IP>
net mode set router
net dns server add <IP>
net inet show
net gateway show
1. Log in to the WedgeIQ virtual machine with username ubuntu and password
changeme.
2. Run the ifconfig eth0 command to check the IP address of the WedgeIQ virtual
machine. DHCP is used by default. To change the WedgeIQ to a static IP, modify the
/etc/network/interfaces file accordingly.
3. Leave the console open if you intend to run the resize script (next steps)
The WedgeIQ virtual machine is initially set to 16GB in size and allows for an increase
to the necessary size requirements for the deployment as defined in the system
requirements.
If the virtual machine is set up with a different disk size, the resize script will need to
be run. Perform the following steps.
1. Log in to the WedgeIQ virtual machine with username ubuntu and password
changeme.
$cd /usr/share/wiq_installer/scripts
$sudo bash ./configure_vm.sh resize-vm
This will now extend partition number <PARTITION_NUMBER> on disk using start
sector <SECTOR_NUMBER>. Are you sure? [y/N]
The virtual machine will reboot with the increased disk size.
3. Click Login.
Once the WedgeOS is registered, the WedgeOS syslog is also configured automatically.
HTTP 443
SMTP 587
IMAP 993
POP 995
• WedgeARP acts as the server to the requesting client and as the client to the destination server, in effect creating two separate, secure
connections.
• The request from the client is intercepted and WedgeARP makes the request to the destination server on behalf of the client. Upon receipt of the
server certificate, WedgeARP determines whether the server is trusted based upon its own internal CA (certification authority) trust certificate
store.
• If the server can be trusted, WedgeARP completes the connection to the remote server and presents its own signed certificate to the client,
creating a second secure connection between the client and WedgeARP.
Setup SSL/TLS Scanning
Certificate Management
If uploading an existing organization Certificate, a key file is also required. Located in System > SSL/TLS
Define the IP or
subnet for the policy
*this policy is not bidirectional*
Choose Signing
(Dynamic)
What Alerts to
notify
SMTP Email
Server settings
Email Alert
details
Responds to
SNMP
commands and
send traps
Traps to send
MIB file
Community
and
Network
definition
from which
requests
can be
made
Trap Sink
configuration.
Community list
populated from
defined
communities.
4. Restart logstash:
•sudo service logstash restart
5. Set remote logging of your security device to the WedgeARP IP address on port 514:
•Open the /etc/rsyslog.d/50-default.conf file of your device.
•Add the following line with the WedgeIQ IP address :
•*.* @@1.2.3.4
•Restart the rsyslog service with the following command:
•sudo service rsyslogd restart
6. Add Visuals:
•Create the visualization.
W_DATE (?:%{SYSLOGTIMESTAMP}|%{TIMESTAMP_ISO8601})
W_TIMESTAMP %{W_DATE:timestamp}
W_LOGHOST %{HOSTNAME:loghost}
W_APP %{WORD:app}
W_APPACTION %{STR_APPACTION:appaction}
W_APPSCAN %{STR_APPSCAN:appscan}
W_PROTO %{WORD:protocol}
W_UID %{QUOTEDSTRING:userid}
W_GID %{QUOTEDSTRING:groupid}
W_SIP %{IP:srcip}
W_DIP %{IP:dstip}
W_ACTION %{WORD:action}
W_REASON %{WORD:reason}
W_UNUSED %{QUOTEDSTRING}
W_DINFO %{QUOTEDSTRING:dstinfo}
W_SINFO %{QUOTEDSTRING:srcinfo}
W_SUBJECT %{QUOTEDSTRING:subject}
W_DETAIL %{QUOTEDSTRING:detail}
W_POLICYTAG %{QUOTEDSTRING:wptag}
W_HASH %{QUOTEDSTRING:sha1hash}
W_EVENT_SOURCE "%{IP:eventsource}"
Enter a new
syslog server host
IP address and
port , press the
green button to
add it.
• timestamp: the date and time of the event, according to the system clock
• hostname: the host name assigned to WedgeOS on the WedgeOS > System >
Settings console page
• event: the WedgeOS event that generated this log message,
o APPSCAN – Event generated by an application scanning operation
o APPACTION – Action taken by a WedgeOS scanning event.
o APPEVENT - Event generated by a WedgeOS application’s normal operation,
such as system and process status
o APPERROR – Error caused by a WedgeOS application level exception
o APPCHANGE – Configuration changes done through the web console or the
CLI
• data: the event-specific message fields
user ID An ID from a directory s ervi ce mapped to Empty i f there is no matching user ID for Al l
the requesting cl ient’s IP a ddress the IP a ddress
content type The content type of the data Any MIME type Al l
85