Rsa NW 11.4 Deployment Guide
Rsa NW 11.4 Deployment Guide
The Basics 6
Basic Deployment 7
Process 7
NetWitness Platform High-Level Deployment Diagram 8
RSA NetWitness Platform Detailed Host Deployment Diagram 9
Deployment Options 10
Deployment Optional Setup Procedures 11
Analyst User Interface 11
Features and Limitations 11
Use Case 12
Deployment 12
Group Aggregation 14
RSA Group Aggregation Deployment Recommendations 14
Advantages of Using Group Aggregation 14
Configure Group Aggregation 16
Prerequisites 16
Set up Group Aggregation 17
Health and Wellness (BETA for Standalone Virtual Host Only) 20
Hybrid Categories on Series 6 (R640) Hardware 21
NW Server Deployment on ESA Hardware 22
Second Endpoint Server 23
Warm Standby NW Server Host 24
Procedures 24
Planned Fail-Over Scenario 25
Required Fail-Over Scenario without Hardware Replacement 25
Required Fail-Over Scenario with Hardware Replacement 25
Set Up Secondary NW Server in Standby Role 26
Fail Over Primary NW Server to Secondary NW Server with Same IP Address 38
Fail Over Primary NW Server to Secondary NW Server with Different IP Address 39
VLC Using NAT IP address to connect to NW Server 40
SSO 40
Reporting Engine 41
Analyst User Interface 42
UCF 42
PAM 42
ECAT 42
Deployment Guide
4
Deployment Guide
5
The Basics
This guide describes the basic requirements of a NetWitness Platform deployment and outlines optional
scenarios to address needs of your enterprise. Even in small networks, planning can ensure that all goes
smoothly when you are ready to bring the hosts online.
Note: This document refers to several additional documents available on RSA Link. Go to the Master
Table of Contents to find all RSA NetWitness Platform 11.x documents.
There are many factors you must consider before you deploy NetWitness Platform. The following items
are just some of these factors. You need to estimate growth and storage requirements when you consider
these factors
l The size of your enterprise (that is, the number of locations and people that will use NetWitness
Platform)
l The volume of network data and logs you need to process
l The performance each NetWitness Platform user role needs to do their jobs effectively.
l The prevention of downtime (that is, how to avoid a single point of failure).
l The environment in which you plan to run NetWitness Platform
n RSA Physical Hosts (software running on hardware supplied by RSA)
See the RSA NetWitness® Platform Physical Host Installation Guide for detailed instructions on
how to deploy RSA Physical Hosts.
n Software Only provided by RSA:
l On-Premises (On-Prem) Virtual Hosts
See the RSA NetWitness® Platform Virtual Host Installation Guide for detailed instructions on
how to deploy on-prem virtual hosts.
l VCloud:
l Amazon Web Services (AWS)
See the RSA NetWitness® Platform AWS Installation Guide for detailed instructions on how
to deploy virtual hosts in AWS.
l Azure
See the RSA NetWitness® Platform Azure Installation Guide for detailed instructions on how
to deploy virtual hosts in Azure.
6 The Basics
Deployment Guide
Basic Deployment
Before you can deploy NetWitness Platform you need to:
l Consider the requirements of your enterprise and understand the deployment process.
l Have a high-level picture of the complexity and scope of a NetWitness Platform deployment.
Process
The components and topology of a NetWitness Platform network can vary greatly between installations,
and should be carefully planned before the process begins. Initial planning includes:
l Consideration of site requirements and safety requirements.
l Review of the network architecture and port usage.
l Support of group aggregation on Archivers and Concentrators, and virtual hosts.
When updating hosts and services, follow recommended guidelines under the "Running in Mixed Mode"
topic in the RSA NetWitness Platform Host and Services Getting Started Guide.
You should also become familiar with Hosts, Host Types, and Services as they are used in the context of
NetWitness Platform also described in the RSA NetWitness Platform Host and Services Getting Started
Guide.
The Basics 7
Deployment Guide
8 The Basics
Deployment Guide
The Basics 9
Deployment Guide
Deployment Options
You deploy RSA NetWitness Platform with the following options.
l Analyst User Interface
l Group Aggregation
l Health & Wellness Search (Beta Version for Virtual Host Only)
l Hybrid Categories on the NW Server
l Second Endpoint Server
l Warm Standby NW Server
l NW Server Deployment on ESA Hardware
10 The Basics
Deployment Guide
Use Case
Large environments that include Geo distribution with a single data center and multiple NW Servers
require Analyst UI instances in all their NetWitness locations or managed entities.
For example, if an Analyst UI is deployed for the EMEA SOC team, analysts can query their EMEA
NetWitness Platform hosts directly. If the EMEA team has Broker hosts and Concentrator hosts within
the region, the Analyst UI can connect and query them instead of connecting back to Primary user
Interface (Primary UI).
Deployment
You must install the Analyst UI service category on a dedicated host and you install it in the same
manner as any component service category on a host.
See the "Task 2 - Install 11.4 on Other Component Hosts" in the RSA NetWitness Platform Installation
Guides for instructions on how to install any component service. Go to the Master Table of Contents to
find all RSA NetWitness Platform 11.x documents.
After you provision the Analyst UI host (that is after you run the nwsetup-tui for the component host
designated for the Analyst UI), complete the following steps to install the Analyst UI service category
on the provisioned host.
1. Log into NetWitness Platform and go to ADMIN > Hosts.
The New Hosts dialog is displayed with the Hosts view grayed out in the background.
Note: If the New Hosts dialog is not displayed, click Discover in the Hosts view toolbar.
2. Select the host in the New Hosts dialog and click Enable.
The New Hosts dialog closes and the host is displayed in the Hosts view.
3. Select that host in the Hosts view (for example, Analyst UI) and click .
The Install Services dialog is displayed.
5. Configure NetWitness Platform for each Analyst UI instance.Go to the Master Table of Contents to
find all RSA NetWitness Platform 11.x documents.
a. Make sure that each Analyst UI instance is connected to the correct local Reporting Engine and
has the appropriate Investigation parameters set. The Getting Started Guide for RSA NetWitness
Platform 11.4 describes the default Analyst UI Dashboard and how you manage dashboards.
Note: You must add data sources to each Reporting Engine instance to execute Reports and
Charts on an Analyst UI. See "Configure the Data Sources" in the Reporting Engine
Configuration Guide for RSA NetWitness Platform 11.4 for instructions.
b. Configure whether to normalize alerts for any Respond Server (NW Server or Analyst UI) by
enabling or disabling alert normalization. "Configure Analyst UI for Respond Server Alert
Normalization" in the NetWitness Respond Configuration Guide for RSA NetWitness Platform
11.4 tells you how to configure Respond Server alert normalization for the Analyst UI.
Group Aggregation
You use Group Aggregation to configure multiple Archiver or Concentrator services as a group and
share the aggregation tasks between them. You can configure multiple Archiver services or Concentrator
services to efficiently aggregate from multiple Log Decoder services to improve query performance on
the data:
l Stored in the Archiver.
l Processed through the Concentrator.
You can have any number of Archivers or Concentrators grouped together and form an aggregation
group. The Archiver or Concentrator services in the group divide all the aggregated session between
them based on the number of sessions defined in the Aggregate Max Sessions parameter.
For example, in an aggregation group containing two Archiver services or two Concentrator services
with the Aggregate Max Sessions parameter, set to 10000 the services would divide the session between
themselves as illustrated in the following table.
Prerequisites
Plan the network design for group aggregation. The following figure is an example of a group
aggregation setup.
Ensure that you understand the Group aggregation parameters in the following table, and create a group
aggregation plan.
Parameter Description
Group Name It determines the group to which the Archiver or Concentrator belongs.
You can add any number of groups aggregating data from a Log Decoder. The Group
Name parameter is used by the Log Decoder to identify which Archiver or
Concentrator services are working together. All Archiver or Concentrator services in
the group should have the same group name.
Size It determines the number of Archiver or Concentrator services in the aggregation group.
Member It determines the position of the Archiver or Concentrator in the aggregation group. For
Number a group of size N, member number from 0 to N-1 must be set on each of the Archiver
or Concentrators services in the aggregation group.
For example: If the size of the aggregation group is 2, the member number of one of
the Archiver or Concentrator service should be set to 0 and the member number of the
other Archiver or Concentrator should be set to 1.
Membership There are two membership modes:
Mode
l New: Adding a new Archiver or Concentrator service as a member to the existing
aggregation group or creating an aggregation group. The Archiver or
Concentrator service does not aggregate any existing sessions from the service as
other members of the group would have already aggregated all the sessions on the
service. This Archiver or Concentrator service will only aggregate new sessions as
they appear on the service.
l Replace: Replacing an existing aggregation group member. The Archiver or
Concentrator will begin aggregation from the oldest session available on the service
it is aggregating from.
Note: Membership mode parameter has an effect only when no sessions have been aggregated from
the service. After some sessions are aggregated, this parameter has no effect.
e. Click .
The Edit Aggregate Service dialog is displayed.
f. Click .
The Edit Group Aggregation dialog is displayed.
Note: If the New Hosts dialog is not displayed, click Discover in the Hosts view toolbar.
2. Select the host in the New Hosts dialog and click Enable.
The New Hosts dialog closes and the host is displayed in the Hosts view.
3. Select that host in the Hosts view (for example, Health and Wellness Beta) and click .
The Install Services dialog is displayed.
Note: After you review your initial datastore configuration, you may determine that you need to add a
new volume. For information on adding a new volume see “Add New Volume and Extend Existing
File Systems” topic in the Virtual Host Installation Guide.
4. Copy the following two files from the previously deployed endpoint server to the new/second
endpoint server:
/etc/pki/nw/nwe-ca/nwerootca-cert.pem
/etc/pki/nw/nwe-ca/nwerootca-key.pem
Note: If the New Hosts dialog is not displayed, click Discover in the Hosts view toolbar.
b. Select the new host in the New Hosts dialog and click Enable.
The New Hosts dialog closes and the host is displayed in the Hosts view.
c. Select that host in the Hosts view (for example, Endpoint Server II) and click .
The Install Services dialog is displayed.
d. Select Endpoint in Host Type and click Install.
IMPORTANT: During a fail-over, if possible, assign the same IP address as the primary NW Server
to the secondary NW Server so it can assume the active role. If you cannot use the same IP address
for the secondary NW Server, you will need to follow the steps in Fail Over Primary NW Server to
Secondary NW Server with Different IP Address.
Procedures
Complete the following task to set up a secondary NW Server in the standby role for fail-over:
l Set up a secondary NW Server in the standby role.
c. Select F11 (boot menu) during reboot to select a boot device and boot to the connected media.
After some system checks during booting, the following Welcome to RSA NetWitness
Platform 11.4 installation menu is displayed. The menu graphics will render differently if you
use a physical USB flash media.
d. Select Install RSA NetWitness Platform 11.4 (default selection) and press Enter.
The Installation program runs and stops at the Enter (y/Y) to clear drives prompt that asks you
to format the drives.
Caution: You must respond y or Y to this prompt even if the host does not have an internal
RAID configuration or the installation will fail.
e. Type Y to continue.
The default action is No, so if you ignore the prompt and it will select No in 30 seconds and will
not clear the drives. The Press enter to reboot prompt is displayed.
The system displays the all installation tasks it is performing. This can take a minute or so.After
it completes the tasks, the installation program reboots the host.
Caution: Do not reboot the attached media (media that contains the ISO file, for example a
build stick).
Note: 1.) When you navigate through the Setup program prompts, use the down and up arrows to
move among fields, use the Tab key to move to and from commands (such as <Yes>, <No>,
<OK>, and <Cancel>. Press Enter to register your command response and move to the next
prompt.
2.) The Setup program adopts the color scheme of the desktop or console you use access the host.
3.) During the Setup program, when you are prompted for the network configuration of the host, be
sure to specify the same network configuration that was used for the original installation of 11.x on
this host (it must be exactly the same).
This initiates the nwsetup-tui (Setup program) and the EULA is displayed.
Your response to this prompt identifies a host as either the primary or secondary during a fresh install
(and the selected response stays constant regardless of the current or future role, that is active or
standby of the host).
4. Tab to Yes and press Enter.
The Install or Recover prompt is displayed.
6. Tab to:
l No and press Enter to set up a secondary NW Server with the standby role (most common
scenario).
l Yes and press Enter to set up a host that was previously used as a primary NW Server with the
standby role so you can execute a fail-over and fail-back (less common scenario).
The NW Active Server IP Address prompt is displayed.
7. Type the IP Address of the NW Server in the active role, tab to OK, and press Enter.
The Host Name prompt is displayed
Caution: If you include "." in a host name, the host name must also include a valid domain name.
8. Press Enter if want to keep this name. If not edit the host name, tab to OK, and press Enter to
change it.
The Master Password prompt is displayed.
Note: You must use the same Master and Deploy Admin credentials fot the Warm Standby NW
Server Host that you used for the Active NW Server Host.
The following list of characters are supported for Master Password and Deployment Password:
l Symbols : ! @ # % ^ +
l Lowercase Characters : a-z
l Uppercase Characters : A-Z
No ambiguous characters are supported for Master Password and Deployment Password. For
example: space { } [ ] ( ) / \ ' " ` ~ ; : .< > -
9. Type the Password, down arrow to Verify, retype the password, tab to OK, and press Enter.
The Deployment Password prompt is displayed.
10. Type in the Password, down arrow to Verify, retype the password, tab to OK, and press Enter.
One of the following conditional prompts is displayed.
l If the Setup program finds a valid IP Address for this host, the following prompt is displayed.
Press Enter if you want to use this IP and avoid changing your network settings. Tab to Yes and
press Enter if you want to change the IP configuration found on the host.
l If you are using an SSH connection, the following warning is displayed.
Note: If you connect directly from the host console, the following warning will not be displayed.
12. Down arrow to the network interface you want, tab to OK, and press Enter. If you do not want to
continue, tab to Exit.
The following Static IP Configuration prompt is displayed.
13. Type the configuration values (using the down arrow to move from field to field), tab to OK, and
press Enter. If you do not complete all the required fields, an All fields are required error
message is displayed (secondary DNS Server and Local Domain Name fields are not required). If
you use the wrong syntax or character length for any of the fields, an Invalid <field-name>
error message is displayed.
Caution: If you select DNS Server, make sure that the DNS Server is correct and the host can
access it before proceeding with the installation.
The Update Repository prompt is displayed.
l If you select 2 An External Repo (on an externally-managed server), the UI prompts you for a
URL. The repositories give you access to RSA updates and CentOS updates. Refer to "Appendix
B. Create an External Repo" in the Physical Host Installation Guide for instructions on how to
create this repo and its external repo URL so you can enter it in the following prompt.
Enter the base URL of the NetWitness Platform external repo and click OK. The Start Install
prompt is displayed.
See "Set Up an External Repository with RSA and OS Updates" under "Hosts and Services
Procedures" in the RSA NetWitness Platform Hosts and Services Getting Started Guide for
instructions. Go to the Master Table of Contents to find all RSA NetWitness Platform 11.x
documents.
The Disable firewall prompt is displayed.
15. Tab to No (default), and press Enter to use the standard firewall configuration. Tab to Yes, and
press Enter to disable the standard firewall configuration.
If you select Yes, confirm your selection(select Yes again) or select No to use the standard firewall
configuration.
Note: Ignore the hash code errors similar to the errors shown in the following figure that are
displayed when you initiate the nwsetup-tui command. Yum does not use MD5 for any security
operations so they do not affect the system security.
e. (Conditional) If your NetWitness Platform deployment is prohibited from accessing the Internet
(Air Gap), you must:
i. Download the capability request from NetWitness Platform User Interface.
ii. Upload the request to FNO.
iii. Upload the response from FNO to the NetWitness Platform User Interface.
18. Schedule the backup of the primary NW Server and the copying of this backed-up data to the
secondary NW Server.
a. SSH to the primary NW Server.
b. Submit the following commands.
/opt/rsa/saTools/bin/schedule-standby-admin-data-sync -di <warm-standby-
admin-server-ip>
This backs up the primary NW Server data and copies the backup archive file to the secondary
NW Server daily for future fail-over use. It also schedules the backup and copy to execute on a
daily basis. You can display help for the schedule-standby-admin-data-sync script with
the following command string.
/opt/rsa/saTools/bin/schedule-standby-admin-data-sync –-help
This returns the following help to which you can refer to customize the host data backup (such as
backup frequency).
Schedule Data Synch between AdminServer and Standby AdminServer
Script also executes a synchronization each time.
Usage:
schedule-standby-admin-data-sync command [options]
Commands:
-h, --help Display Help
-d, --daily Schedule daily data synchronization
-w, --weekly Schedule weekly data synchronization
-c, --custom <crontab formatted> Schedule custom data synchronization
i.e. to schedule for midnight on 1st
- and 10th of the month: '0 0 1,10 * *'
-i, --standby-ip <ip address> IP address of standby Admin Server
-v, --verbose Enable verbose output
Note: If you have a catastrophic failure, you may need to provision a new host or re-image
the primary NW Server and complete the Set Up secondary NW Server in Standby Role
procedure for this host to create a new primary NW Server so you can fail back to it.
Note: If you are keeping the primary server up and running, you must complete this step.
4. You have two options for configuring your NW Servers. Start by running the commands in step 4a. If
anything fails to run for these two commands on any NW Server systems, run the commands in step
4b.
a. Run the following commands on the primary (formerly active) server (where <secondary-nw-
server-ip> is the former standby, now active, secondary NW Server):
l salt -C 'not G@master:127.0.0.1' cmd.run "netconfig --update-dns --dns
<secondary-nw-server-ip> && sed -Ei 's/^master:.*/master: <secondary-
nw-server-ip>/g' /etc/salt/minion"
b. If the commands in step 4a fail on any NW Server system, run the following commands on each
component host:
l netconfig --update-dns --dns <secondary-nw-server-ip>
l sed -Ei 's/^master:.*/master: <secondary-nw-server-ip>/g'
/etc/salt/minion
SSO
If you are using SSO, run the following commands:
1. SSH to admin server node.
2. Connect to nw-shell.
3. Connect to admin server service using the connect --service admin-server command.
4. Log in to the NW Server using the login command.
5. Enter the admin username and password.
7. Generate the new metadata and reupload it in ADFS. For more information, see the Configure SAML
2.0 provider settings for portals topic in the Microsoft documentation (https://docs.microsoft.com/en-
us/powerapps/maker/portals/configure/configure-saml2-settings).
Reporting Engine
If you are using the Reporting Engine, you must manually configure the new IP address.
1. Log in to NetWitness Platform.
2. Go to Admin > Services > Reporting Engine > View > Config.
3. Click the Output Actions tab.
4. Add the new IP address in the Hostname field.
5. Click Apply.
6. Click the Sources tab and add the data sources again.
UCF
To enable UCF to communicate with NetWitness Platform:
1. On the UCF server, execute the runConnectionManager.bat file (the same file that is used for
adding connection details).
2. Select Option #2, Edit endpoints.
3. Select the NW Server connection from the options that are displayed.
4. When you are prompted for Host Address (the old IP address is shown in parentheses) enter the new
IP address.
PAM
If you have PAM configured, after the failover, you must configure the system again using the
instructions in the "Configure PAM Login Capability" topic in the System Security and User
Management Guide. Go to the Master Table of Contents to find all RSA NetWitness Platform 11.x
documents.
ECAT
Update the following services:
l Incident Message Broker
l NetWitness Suite
l Orchestrator
2. Update the server Hostname and IP Address to the current active server and test the settings.
NetWitness Suite
1. Log in to the NetWitness Endpoint user interface and go to Configure > Monitoring and External
Components Configuration > Netwitness Suite.
2. Update the server Hostname and IP address to the current active server and test settings.
Orchestrator
1. Log in to Orchestrator and go to Settings > server&services.
2. Edit the RSA NetWitness V11.1 instance by updating the server URL to the current active NW
Server to fetch respond incidents and alerts.
Caution: If you have any Broker hosts (other than NW Server) that are aggregating from the Broker
service on the NW Server, remove and re-add the Broker service on those hosts.
Note: If you added any content to the /etc/hosts file on the primary server, the contents of that file
are available under /var/netwitness/standby-data/unmanaged/etc on the failover server.
You can manually copy those files to the /etc/hosts file on the failover server after the failover is
complete.
Source
Destination Host Ports
Host
NW Server Network Decoder TCP: 22, 5671, 50004 (Non-SSL), 50006 (Non-SSL),
50104 (REST), 50106 (REST), 56004 (SSL), 56006
(SSL)
UDP: 123
NW Server Concentrator (Network & TCP: 22, 5671, 50005 (Non-SSL), 50006 (Non-SSL),
Logs) 50105 (REST), 50106 (REST), 56005 (SSL), 56006
(SSL)
UDP: 123
NW Server Network Hybrid TCP: 22, 5671, 50004 (Non-SSL), 50005 (Non-SSL),
50006 (Non-SSL), 50104 (REST), 50105 (REST), 50106
(REST), 56004 (SSL), 56005 (SSL), 56006 (SSL)
UDP: 123
NW Server Log Decoder TCP: 22, 5671, 50001 (Non-SSL), 50002 (Non-SSL),
50006 (Non-SSL), 50101 (REST), 50102 (REST), 50106
(REST), 56001 (SSL), 56002 (SSL), 56006 (SSL)
UDP: 123
NW Server Log Hybrid TCP: 22, 5671, 50001 (Non-SSL), 50002 (Non-SSL),
50005 (Non-SSL), 50006 (Non-SSL), 50101 (REST),
50102 (REST), 50105 (REST), 50106 (REST), 56001
(SSL), 56002 (SSL), 56005 (SSL), 56006 (SSL)
UDP: 123
Source
Destination Host Ports
Host
NW Server Log Hybrid - Retention TCP: 22, 5671, 50001 (Non-SSL), 50002 (Non-SSL),
50006 (Non-SSL), 50101 (REST), 50102 (REST), 50105
(REST), 50106 (REST), 56001 (SSL), 56002 (SSL),
56006 (SSL)
UDP: 123
NW Server Endpoint Log Hybrid TCP: 22, 5671, 7050, 7054, 50001 (Non-SSL), 50002
(Non-SSL), 50005 (Non-SSL), 50006 (Non-SSL), 50101
(REST), 50102 (REST), 50105 (REST), 50106 (REST),
56001 (SSL), 56002 (SSL), 56005 (SSL), 56006 (SSL),
56202 (Endpoint)
UDP: 123
NW Server Malware TCP: 22, 5671, 5432, 50003 (Non-SSL), 50006 (Non-
SSL), 50103 (REST), 50106 (REST), 56003 (SSL),
56006 (SSL), 60007
UDP: 123
NW Server UEBA TCP: 22, 15671, 5671, 443
UDP: 123
ESA NW Server TCP: 53, 80, 443, 4505, 4506, 5671, 15671, 27017
UDP: 123, 53
Network NW Server TCP: 53, 80, 443, 4505, 4506, 5671, 15671, 27017,
Decoder UDP: 53, 123
Source
Destination Host Ports
Host
Concentrator NW Server TCP: 53, 80, 443, 4505, 4506, 5671, 15671, 27017
(Network & UDP: 53, 123
Logs)
Network NW Server TCP: 53, 80, 443, 4505, 4506, 5671, 15671, 27017)
Hybrid UDP: 53, 123
Log NW Server TCP: 53, 80, 443, 4505, 4506, 5671, 15671, 27017
Decoder UDP: 53, 123
Log Hybrid NW Server TCP: 53, 80, 443, 4505, 4506, 5671,15671, 27017
UDP: 53, 123
Log Hybrid - NW Server TCP: 53, 80, 443, 4505, 4506, 5671,15671, 27017
Retention UDP: 53, 123
VLC NW Server TCP: 53, 80, 443, 4505, 4506, 5671,15671, 27017
UDP: 53, 123
Endpoint NW Server TCP: 53, 80, 443, 5671, 4505, 4506, 15671, 27017
Log Hybrid UDP: 53, 123
Endpoint Log Decoder TCP: 50202 (Non-SSL), 50102 (REST), 56202 (SSL)
Log Hybrid UDP: 514
www connections
Source
Destination Host Ports
Host
Analyst UI Host
Archiver Host
Source Destination
Destination Ports Comments
Host Host
Broker Host
Source Destination
Destination Ports Comments
Host Host
Concentrator Host
Source Destination
Destination Ports Comments
Host Host
Source Destination
Destination Ports Comments
Host Host
Endpoint Log Decoder TCP 50102 (REST) To forward meta to an external Log Decoder
Log Hybrid (External) 56202 (Protobuf SSL)
50202 (Protobuf)
Endpoint NW Server TCP 443 RSA Update Repository
Log Hybrid
Endpoint Agent Relay Server TCP 443 To forward host data to the Relay
Server
Endpoint Log Relay Server TCP 443 Pull host data from the Relay Server
Hybrid
Source Destination
Destination Host Comments
Host Ports
NW Server Standalone Health & TCP 5671 RabbitMQ (AMQPS) message bus for
Wellness Host all NW hosts.
NW Server Standalone Health & TCP 15671 RabbitMQ Management UI
Wellness Host
NW Server Standalone Health & TCP 7018 Metrics Server Launch Port
Wellness Host
NW Server Standalone Health & TCP 7020 Node Infra Server Launch Port
Wellness Host
iDRAC Ports
Destination
Source Host Destination Ports Comments
Host
NW Server Log Hybrid TCP 56006 (SSL), NetWitness
50106 (REST) Appliance
Ports
Malware Host
Source
Destination Host Destination Ports Comments
Host
UEBA Host
Source Destination
Destination Ports Comments
Host Host
UEBA NW Server TCP 443 RSA Update Repository
Server
UEBA Broker TCP 56003 (SSL), 50103 (REST) Broker Application Ports
Server
UEBA Concentrator TCP TCP 50005 (Non-SSL), 56005 Concentrator Application Ports
Server (SSL), 50105 (REST)
Admin UEBA Server 443 UEBA Monitoring
Workstation
Admin UEBA Server 22 SSH
Workstation
Admin UEBA Server TCP 15671 RabbitMQ Management UI
Workstation
UEBA NW Server TCP15671 UEBA Alerts forwarding to
Server Respond
NW Server NFS Server TCP 111, 2049 iDRAC Installations
UDP 111, 2049
NW Server UEBA Server TCP 5671 RabbitMQ (AMQPS) message
bus for all NW hosts
For more information on the services running on Endpoint Log Hybrid, see RSA NetWitness Endpoint
Configuration Guide.
1. In the NetWitness Platform menu, select ADMIN > Endpoint Sources > Policies.
The Policies view is displayed.
2. Select the Default EDR Policy and click Edit from the toolbar.
3. roll down to find the UDP PORT and change the value (for example, change from 444 to 555).
4. Click Publish Policy at the bottom of the view.
Task 2 - Update the Port on All Endpoint Log Hybrid Hosts in Your
Environment
SSH to each Endpoint Log Hybrid host in your environment with admin credentials and make the
following updates.
1. Update the iptables rules to allow 555 in place of 444.
a. Replace 444 with 555 in the following file.
vi /etc/sysconfig/iptables
2. Update the SELinux policy. 555 is a privileged port, so you must update SELinux policy to allow this
port.
a. Run the following command string.
semanage port -a -t http_port_t -p udp 555
If you received any python errors or warnings, ignored them.
b. Verify the change with the following command string.
semanage port -l | grep http_port_t
The following is an example of what is displayed for a correct change.
http_port_t udp 555, 444
b. Wait for 30 seconds because the port sends out a beacon every 30 seconds. If t everything is
working correctly, information similar to the following will be displayed.
09:20:12.571316 IP 10.40.15.103.60807 > EPS1.rsa.lab.emc.com.dsf: UDP,
length 20
09:20:12.572433 IP EPS1.rsa.lab.emc.com.dsf > 10.40.15.103.60807: UDP,
length 1
Both lines must be returned. One is the size request (20 bytes) and the other is the response size
(1 byte).
Service
There are no user‐serviceable components inside of this device. Please contact Customer Care in the
event of a malfunction. In a fault condition, high temperatures may arise inside the system causing an
alarm signal. In the event of the alarm signal, immediately disconnect the device from the power source
and contact Customer Care. Further operation of the device will be unsafe and may cause personal
injury or property damage.
Safety Information
Site Selection
The system is designed to operate in a typical office environment. Choose a site that is:
l Clean, dry, and free of airborne particles (other than normal room dust).
l Well‐ventilated and away from sources of heat, including direct sunlight and radiators.
l Away from sources of vibration or physical shock.
l Isolated from strong electromagnetic fields produced by electrical devices.
l In regions that are susceptible to electrical storms, we recommend you plug your system into a surge
suppressor.
l Provided with a properly grounded wall outlet.
l Provided with sufficient space to access the power supply cords, because they serve as the productʹs
main power disconnect.
l Reducing the weight for easier handling by removing any easily detachable components.
l Do not attempt to modify or use an AC power cord if it is not the exact type required. A separate AC
cord is required for each system power supply.
l This product contains no user‐serviceable parts. Do not open the system.
l When replacing a hot‐plug power supply, unplug the power cord to the power supply being replaced
before removing it from the server.