Software TMS 9.3.5 Installation On Hardware 2020-11-17
Software TMS 9.3.5 Installation On Hardware 2020-11-17
Version 9.3.5
Legal Notice
The information contained within this document is subject to change without notice. NETSCOUT SYSTEMS, INC.
makes no warranty of any kind with regard to this material, including, but not limited to, the implied warranties
of merchantability and fitness for a particular purpose. NETSCOUT SYSTEMS, INC. shall not be liable for errors
contained herein or for any direct or indirect, incidental, special, or consequential damages in connection with the
furnishings, performance, or use of this material.
Use of this product is subject to the End User License Agreement available at
http://www.NetScout.com/legal/terms-and-conditions or which accompanies the product at the time of
shipment or, if applicable, the legal agreement executed by and between NetScout Systems, Inc. or one of its
wholly-owned subsidiaries (“NETSCOUT”) and the purchaser of this product (“Agreement”).
Government Use and Notice of Restricted Rights: In U.S. government (“Government”) contracts or subcontracts,
Customer will provide that the Products and Documentation, including any technical data (collectively “Materials”),
sold or delivered pursuant to this Agreement for Government use are commercial as defined in Federal
Acquisition Regulation (“FAR”) 2.101and any supplement and further are provided with RESTRICTED RIGHTS. All
Materials were fully developed at private expense. Use, duplication, release, modification, transfer, or disclosure
(“Use”) of the Materials is restricted by the terms of this Agreement and further restricted in accordance with FAR
52.227-14 for civilian Government agency purposes and 252.227- 7015 of the Defense Federal Acquisition
Regulations Supplement (“DFARS”) for military Government agency purposes, or the similar acquisition
regulations of other applicable Government organizations, as applicable and amended. The Use of Materials is
restricted by the terms of this Agreement, and, in accordance with DFARS Section 227.7202 and FAR Section 12.212,
is further restricted in accordance with the terms of NETSCOUT’S commercial End User License Agreement. All
other Use is prohibited, except as described herein.
This Product may contain third-party technology. NETSCOUT may license such third-party technology and
documentation (“Third-Party Materials”) for use with the Product only. In the event the Product contains Third-
Party Materials, or in the event you have the option to use the Product in conjunction with Third-Party Materials
(as identified by NETSCOUT in the Documentation provided with this Product), then such third-party materials are
provided or accessible subject to the applicable third-party terms and conditions contained either in the “Read
Me” or “About” file located in the Software or on an Application CD provided with this Product, or in an appendix
located in the documentation provided with this Product. To the extent the Product includes Third-Party Materials
licensed to NETSCOUT by third parties, those third parties are third-party beneficiaries of, and may enforce, the
applicable provisions of such third-party terms and conditions.
Open-Source Software Acknowledgement: This product may incorporate open-source components that are
governed by the GNU General Public License (“GPL”) or licenses that are compatible with the GPL license (“GPL
Compatible License”). In accordance with the terms of the GNU GPL, NETSCOUT will make available a complete,
machine-readable copy of the source code components of this product covered by the GPL or applicable GPL
Compatible License, if any, upon receipt of a written request. Please identify the product and send a request to:
NetScout Systems, Inc.
GNU GPL Source Code Request
310 Littleton Road
Westford, MA 01886
Attn: Legal Department
No portion of this document may be copied, photocopied, reproduced, translated, or reduced to any electronic
medium or machine form without prior consent in writing from NETSCOUT. The information in this document is
subject to change without notice and does not represent a commitment on the part of NETSCOUT.
The products and specifications, configurations, and other technical information regarding the products described
or referenced in this document are subject to change without notice and NETSCOUT reserves the right, at its sole
discretion, to make changes at any time in its technical information, specifications, service, and support programs.
All statements, technical information, and recommendations contained in this document are believed to be
accurate and reliable but are presented “as is” without warranty of any kind, express or implied. You must take
full responsibility for their application of any products specified in this document. NETSCOUT makes no implied
warranties of merchantability or fitness for a purpose as a result of this document or the information described
or referenced within, and all other warranties, express or implied, are excluded.
Except where otherwise indicated, the information contained in this document represents the planned capabilities
and intended functionality offered by the product and version number identified on the front of this document.
Screen images depicted in this document are representative and intended to serve as example images only.
© 1999-2020 NETSCOUT SYSTEMS, INC. All rights reserved. Confidential and Proprietary.
Document Number: TMS-IG-935-2020/11
17 November, 2020
Contents
Preface
About the Sightline and Threat Mitigation System Documentation 6
Conventions Used in this Guide 8
Contacting the Arbor Technical Assistance Center 10
Introduction
This guide describes how to install Software Threat Mitigation System (TMS) software on
your own hardware and configure it for your management network. You can add
Software TMS to your flexible-licensed Sightline deployment in TMS 8.3.1 and higher. You
can only add Software TMSes to flexible-licensed Sightline deployments because Software
TMS bandwidth capacity is flexible-licensed only. The Software TMS installation package
contains all the software you need to install and configure Software TMS.
Note
To install Software TMS in a virtual machine, see Software Threat Mitigation System
Virtual Machine Installation Guide . For Software TMS performance benchmarks, see
Software Threat Mitigation System Performance Benchmarks. You can download these
guides from the Arbor Networks Technical Assistance Center (ATAC) website
(https://support.arbornetworks.com).
After you perform the procedures in this guide, you will need to add one or more Software
TMS bandwidth licenses to your Sightline flexible license before you can add a Software
TMS to your Sightline deployment. See the Sightline and Threat Mitigation System
Licensing Guide for instructions. You can download this guide from the Arbor Networks
Technical Assistance Center (ATAC) website (https://support.arbornetworks.com).
Audience
This information is intended for network security system administrators (or network
operators) who are responsible for configuring and managing Sightline on their networks.
Administrators should have fundamental knowledge of their network security policies and
network configuration.
This guide is intended for system administrators who are responsible for installing,
configuring, and maintaining Sightline and TMS.
In this section
This section contains the following topics:
Sightline and Threat Mitigation Instructions and information that explain how to
System User Guide configure and use Sightline and TMS devices and
software via the Sightline user interface (UI) and the
command line interface (CLI).
You can access the User Guide by clicking the
icon in the Sightline UI. It is also available as a PDF.
Note
The User Guide contains all information that was
previously included in the Sightline and Threat
Mitigation System Advanced Configuration Guide .
Sightline and Threat Mitigation Descriptions of the support for multi-version, multi-
System Compatibility Guide platform Sightline and TMS deployments.
Sightline and Threat Mitigation Lists the enforced limits and guideline limits for
System Deployment and Sightline and Sightline/TMS deployments. It also
Appliance Limits covers the enforced limits and guideline limits for
each currently supported Sightline and TMS
appliance.
Sightline and Threat Mitigation Descriptions of each Sightline and TMS software
System Licensing Guide licensing mode, how to obtain licenses to run your
Sightline and TMS software, and how to add and
change the licensed capabilities and capacities in
your deployment.
Sightline and Threat Mitigation Instructions and information for the managed
System Managed Services services customers who use the Sightline user
Customer Guide interface.
Sightline and Threat Mitigation Instructions for remotely accessing Sightline and
System API Guide TMS using the REST, SOAP, and Arbor Web Services
APIs.
Installation Guide for Sightline, Instructions and requirements for the initial
Insight, and Threat Mitigation installation and configuration of Sightline, Insight,
System appliances and TMS appliances.
Monospaced A file name, folder name, path Type the server's IP address or
italics name, or other information hostname.
that you must supply.
The following table shows the syntax of commands and expressions. Do not type the
brackets, braces, or vertical bar in commands or expressions.
[ ] (square brackets) A set of choices for options or variables, any of which is optional.
For example: [variable1 | variable2].
Contact methods
You can contact the Arbor Technical Assistance Center as follows:
n Phone US toll free — +1 877 272 6721
n Phone worldwide — +1 781 362 4301
n Support portal — https://support.arbornetworks.com
Example
Software TMS Installation on Hardware Guide
TMS-IG-935-2020/11
Page 9
This guide contains the information and steps you need to install and configure Software
TMS on your own hardware.
When you are ready to install Software TMS, follow the instructions in "Installing Software
TMS" on page 18. Then, follow the steps in "Configuring Software TMS for Your Network"
on page 19 to allow Software TMS to communicate with your management network and
Sightline leader. Before you start Software TMS services, you can optionally remap the
Software TMS management and mitigation interfaces to suit your deployment. See
"Remapping Software TMS Interfaces" on page 20.
The last section in this guide, "Adding Software TMS to your Sightline Deployment" on
page 22, summarizes the following procedures:
n Adding Software TMS bandwidth capacity licenses to your Sightline flexible license and
uploading a new Sightline flexible license. For complete details, see the Sightline and
Threat Mitigation System Licensing Guide .
n Adding a Software TMS to your Sightline deployment and configuring administrative
settings for Software TMS in the Sightline UI. For complete details, see "Configuring TMS
Devices" in the Sightline and Threat Mitigation System User Guide .
Use the information in this section to determine the hardware configuration that you need
in order to provide the mitigation performance you require.
In this section
This section contains the following topics:
Hardware Requirements 14
Hardware Configuration Options 15
Hardware Requirements
This section describes the hardware requirements needed for Software TMS. Once you
have determined that your hardware meets the requirements, review the information in
"Hardware Configuration Options" on the facing page to determine the hardware
configuration you need in order to meet your desired level of mitigation performance.
n Intel 82599-based interface cards (such as Intel X520 10G NICs) or interface cards that
use the ixgbe driver
n Intel X710-based interface cards (such as Intel X710-DA4 NICs) or interface cards that
use the i40e driver
n interface cards that use the igb driver
Hardware requirements
Before you install Software TMS on your hardware, confirm that your hardware meets the
requirements in the following table:
Component Quantity
CPU cores with the MMX, SSE, SSE2, SSE3 (PNI), and 4 to 64 physical CPU cores
SSSE3 instruction sets with hyper-threading
Note enabled (8 to 128 logical
To check which instruction sets the CPU supports, enter CPU cores)
cat /proc/cpuinfo in the shell command line. The
supported instruction sets are listed in the Flags field.
RAM 14 to 194 GB
See “Calculating RAM
requirements” on page 16.
Important
Software TMS requires that your hardware is booted using Legacy BIOS mode, not UEFI
mode. Refer to your hardware documentation if you need to switch the boot mode from
UEFI to Legacy BIOS.
The tables below list the quantities of each component in the recommended Software
TMS configurations.
8-core low–performance
Component Quantity
CPU cores with the MMX, SSE, SSE2, SSE3 8 physical CPU cores with hyper-threading
(PNI), and SSSE3 instruction sets enabled (16 logical CPU cores)
16-core mid–performance
Component Quantity
CPU cores with the MMX, SSE, SSE2, SSE3 16 physical CPU cores with
(PNI), and SSSE3 instruction sets hyper-threading enabled (32 logical CPU
cores)
32-core high-performance
Component Quantity
CPU cores with the MMX, SSE, SSE2, SSE3 32 physical CPU cores with
(PNI), and SSSE3 instruction sets hyper-threading enabled (64 logical CPU
cores)
n if you want to install one of the recommended configurations shown in the previous
tables, follow the RAM requirements listed for it
n if you want to install a different configuration, use the following formula to determine
the amount of RAM that your configuration requires:
(8 GB RAM for the first two physical CPU cores) + (3 GB RAM for each additional physical
CPU core) = the amount of RAM required
Use the steps in this section to install and configure Software TMS on your hardware. The
steps are summarized below:
In this section
This section contains the following topics:
Installation
Follow the steps below to install Software TMS:
1. Download the Software TMS software ISO disc image (.iso) file onto your computer
from the Arbor Networks Software Downloads Service.
To access the Downloads Service, go to the ATAC website
(https://support.arbornetworks.com) and click Software Downloads. The
Downloads Service requires a separate login. See the Downloads Service page for
instructions.
2. Write the downloaded Software TMS file to a USB device or CD-ROM. The USB device
or CD-ROM must be bootable, so the file must be written using a block-based tool. For
example, you can use the dd command that is present on some operating systems to
write to a USB device:
dd if=Software_TMS_iso_file of=USB_drive_block_device bs=1024k
3. Power down the hardware.
4. Insert the USB device or CD-ROM into the hardware.
5. Restart the appliance.
6. To start the boot menu, press any key when you see the message Press any key
to continue.
7. At the boot menu, select [Serial Console] (re)install from CD.
8. To confirm that you want to reinstall when the warning message appears, enter y.
After the installation completes, follow the instructions in "Configuring Software TMS for
Your Network" on the facing page to configure Software TMS.
Configuration
Follow the steps below to configure Software TMS:
1. Log in to the TMS CLI for the Software TMS. See “Using CLI Commands" in the Sightline
and Threat Mitigation System User Guide .
2. Set a static IP address for mgt0 by entering the following command:/ ip
interfaces ifconfig mgt0 X.X.X.X/XX up
3. Enter / services aaa local password admin interactive to change the
default administrator password from arbor to a different password.
Important
Do not leave the administrator password set to the default value.
4. Update any access rules to restrict access. We strongly recommend you update the
default ssh and ping access rules. To show the current access rules, enter / ip
access show
Caution
Do not enter 0.0.0.0/0 or ::/0 as a CIDR for a service unless absolutely necessary.
We recommend that you use the narrowest CIDR you can for each service.
5. Enter / services tms bootstrap X.X.X.X secrethere to bootstrap Software
TMS using the Sightline leader IP address and zone secret.
X.X.X.X = the IPv4 address of the Sightline leader
secrethere = the zone secret
6. (Optional) To remap the management or mitigation interfaces on Software TMS, stop
here and perform the procedure in "Remapping Software TMS Interfaces" on the
next page.
7. Enter / services tms start
8. Enter / config write to commit the changes to the management network
configuration for Software TMS.
Note
You do not need to back up the current Software TMS management configuration before
you remap mitigation (tms) interfaces.
n To export the Software TMS management network configuration before you remap
management interfaces, enter / config export disk:MyTmsName.conf (where
MyTmsName.conf is the name of your Software TMS).
n To import the Software TMS management network configuration that you exported to
MyTmsName.conf, enter / config import disk:MyTmsName.conf
The mapping for the first interface appears with the current interface name in square
brackets. For example:
* 00:03.0 igb24:6e:96:5d:2a:b6 mgt0 [mgt0]
8. Enter a new interface name, for example, mgt1. Or, press ENTER to continue without
changing the interface name.
The mapping for the second interface appears with its current interface name in
brackets.
9. Repeat Step 8 for the second interface and subsequent interfaces. For each interface,
you either enter a new interface name or press ENTER to keep the name in brackets
and continue. If you enter an invalid interface name or a duplicate name, an error
message appears.
10. After you enter the name of the last interface, the following prompt appears:
[r]ename interfaces, [s]ave and reboot immediately, [q]uit without
saving, [h]elp?
Enter s to save your new interface mapping and reboot, or, enter q to quit without
saving and keep the current interface mapping.
11. If you saved a new interface mapping, log back in to the TMS CLI after the Software
TMS reboots and continue.
12. If you quit without saving, continue.
13. Enter / services tms start
14. Enter / config write to commit the changes to the interface mapping for the
Software TMS.
3 Add Software TMS to the TMS groups that you "Using a Software TMS in
use for mitigations. TMS mitigations" on the
facing page
Note
You can view the status of the licensed capacities in your Sightline flexible license,
including the licensed Software TMS bandwidth capacity, on the Deployment Status page
(System > Status > Deployment Status). For more information, see "About
monitoring Software TMSes in your deployment" on page 24.
You purchase licensed capacities for Software TMS bandwidth separately. A licensed
capacity can be temporary or permanent. Each capacity that you add increases the pool of
available Software TMS bandwidth for Software TMSes. When a temporary licensed
capacity for Software TMS bandwidth expires, the available Software TMS bandwidth
capacity is reduced.
The total of all (permanent and non-expired temporary) licensed capacities for Software
TMS bandwidth determines how much bandwidth capacity you can configure for each
Software TMS. You configure the bandwidth capacity for a Software TMS in the Sightline UI
when you add the Software TMS to your deployment. See "Adding a Software TMS to the
Sightline deployment" on the facing page. If your Sightline flexible license has at least 50
Mbps of licensed capacity for Software TMS bandwidth available, you can add a Software
TMS to your deployment. When you configure multiple Software TMSes in a Sightline
deployment, you can distribute the available licensed capacity among the Software TMSes
in any valid amounts you choose.
For information and instructions on how to add flexible-licensed Software TMS bandwidth
capacity to your Sightline flexible license, see the following sections in the Sightline and
Threat Mitigation System Licensing Guide :
n "About Flexible Licensing"
n "About License Capability and Capacity Enforcement"
You can also contact ATAC (https://support.arbornetworks.com) for help adding
Software TMS bandwidth capacity to your Sightline flexible license.
Groups). To add a Software TMS to a group, see "Configuring TMS Groups" in the Sightline
and Threat Mitigation System User Guide .
Once a Software TMS is a member of a TMS Group, it can mitigate attack traffic in any TMS
mitigation that is configured to use that TMS Group. The amount of traffic that an
individual Software TMS can mitigate depends on its configured bandwidth capacity. For
more information, see "Adding Software TMS bandwidth capacity to your Sightline
flexible license" on page 22.
For example, on the Deployment Status page (System > Status > Deployment Status):
n The Software TMS Total Bandwidth - flexible graph shows the IPv4 and IPv6
bandwidth consumed by all Software TMSes in your deployment for the selected
timeframe.
n The Software TMS IPv6 Bandwidth - flexible graph shows the IPv6 bandwidth
consumed by all Software TMSes in your deployment for the selected timeframe.
n The Software TMS Bandwidth - flexible entry in the Licensed Capacities and
Capabilities table shows the current total amount of Software TMS bandwidth capacity
configured for (or “allocated to”) all Software TMSes in the deployment, out of the total
Software TMS bandwidth capacity in the Sightline flexible license.
In addition, you can monitor statistics for individual Software TMSes in your deployment
on the TMS Statistics tab on the Appliance Status page (System > Status > Appliance
Status). For example, you can track the Software TMS bandwidth currently being
consumed by each Software TMS. You can use this information for mitigation capacity
planning and utilization.
For more information, see "Monitoring Your Deployment" and "Viewing TMS Appliance
Statistics" in the Sightline and Threat Mitigation System User Guide .