Skip to content

Commit 8cbfeef

Browse files
Merge pull request #168417 from ElazarK/firewall-access
Firewall access table
2 parents 76bf95e + 2006dcc commit 8cbfeef

File tree

1 file changed

+68
-43
lines changed

1 file changed

+68
-43
lines changed

articles/defender-for-iot/organizations/how-to-set-up-your-network.md

Lines changed: 68 additions & 43 deletions
Original file line numberDiff line numberDiff line change
@@ -1,23 +1,23 @@
11
---
22
title: Set up your network
33
description: Learn about solution architecture, network preparation, prerequisites, and other information needed to ensure that you successfully set up your network to work with Azure Defender for IoT appliances.
4-
ms.date: 07/25/2021
4+
ms.date: 11/07/2021
55
ms.topic: how-to
66
---
77

88
# About Azure Defender for IoT network setup
99

1010
Azure Defender for IoT delivers continuous ICS threat monitoring and device discovery. The platform includes the following components:
1111

12-
**Defender for IoT sensors:** Sensors collect ICS network traffic by using passive (agentless) monitoring. Passive and nonintrusive, the sensors have zero performance impact on OT and IoT networks and devices. The sensor connects to a SPAN port or network TAP and immediately begins monitoring your network. Detections are displayed in the sensor console. There, you can view, investigate, and analyze them in a network map, a device inventory, and an extensive range of reports. Examples include risk assessment reports, data mining queries, and attack vectors.
12+
**Defender for IoT sensors:** Sensors collect ICS network traffic by using passive (agentless) monitoring. Passive and nonintrusive, the sensors have zero performance impact on OT and IoT networks and devices. The sensor connects to a SPAN port or network TAP and immediately begins monitoring your network. Detections are displayed in the sensor console. There, you can view, investigate, and analyze them in a network map, a device inventory, and an extensive range of reports. Examples include risk assessment reports, data mining queries, and attack vectors.
1313

14-
**Defender for IoT on-premises management console**: The on-premises management console provides a consolidated view of all network devices. It delivers a real-time view of key OT and IoT risk indicators and alerts across all your facilities. Tightly integrated with your SOC workflows and playbooks, it enables easy prioritization of mitigation activities and cross-site correlation of threats.
14+
**Defender for IoT on-premises management console**: The on-premises management console provides a consolidated view of all network devices. It delivers a real-time view of key OT and IoT risk indicators and alerts across all your facilities. Tightly integrated with your SOC workflows and playbooks, it enables easy prioritization of mitigation activities and cross-site correlation of threats.
1515

16-
**Defender for IoT portal:** The Defender for IoT application can help you purchase solution appliances, install and update software, and update TI packages.
16+
**Defender for IoT portal:** The Defender for IoT application can help you purchase solution appliances, install and update software, and update TI packages.
1717

1818
This article provides information about solution architecture, network preparation, prerequisites, and more to help you successfully set up your network to work with Defender for IoT appliances. Readers working with the information in this article should be experienced in operating and managing OT and IoT networks. Examples include automation engineers, plant managers, OT network infrastructure service providers, cybersecurity teams, CISOs, or CIOs.
1919

20-
For assistance or support, contact [Microsoft Support](https://support.microsoft.com/en-us/supportforbusiness/productselection?sapId=82c88f35-1b8e-f274-ec11-c6efdd6dd099).
20+
For assistance or support, contact [Microsoft Support](https://support.microsoft.com/supportforbusiness/productselection?sapId=82c88f35-1b8e-f274-ec11-c6efdd6dd099).
2121

2222
## On-site deployment tasks
2323

@@ -87,7 +87,7 @@ The following browsers are supported for the sensors and on-premises management
8787

8888
- Firefox (latest version)
8989

90-
For more information on supported browsers, see [Recommended browsers](../../azure-portal/azure-portal-supported-browsers-devices.md#recommended-browsers).
90+
For more information on supported browsers, see [recommended browsers](../../azure-portal/azure-portal-supported-browsers-devices.md#recommended-browsers).
9191

9292
### Set up certificates
9393

@@ -97,22 +97,42 @@ Following sensor and on-premises management console installation, a local self-s
9797

9898
Verify that your organizational security policy allows access to the following:
9999

100+
#### User access to the sensor and management console
101+
102+
| Protocol | Transport | In/Out | Port | Used | Purpose | Source | Destination |
103+
|--|--|--|--|--|--|--|--|
104+
| HTTPS | TCP | In/Out | 443 | To access the sensor, and on-premises management console web console. | Access to Web console | Client | Sensor and on-premises management console |
105+
| SSH | TCP | In/Out | 22 | CLI | To access the CLI. | Client | Sensor and on-premises management console |
106+
107+
#### Sensor access to Azure portal
108+
109+
| Protocol | Transport | In/Out | Port | Used | Purpose | Source | Destination |
110+
|--|--|--|--|--|--|--|--|
111+
| HTTPS / Websocket | TCP | In/Out | 443 | Gives the sensor access to the Azure portal. (Optional) Access can be granted through a proxy. | Access to Azure portal | Sensor | Azure portal |
112+
113+
#### Sensor access to the on-premises management console
114+
115+
| Protocol | Transport | In/Out | Port | Used | Purpose | Source | Destination |
116+
|--|--|--|--|--|--|--|--|
117+
| SSL | TCP | In/Out | 443 | Give the sensor access to the on-premises management console. | The connection between the sensor, and the on-premises management console | Sensor | On-premises management console |
118+
| NTP | UDP | In/Out | 123 | Time Sync | Connects the NTP to the on-premises management console. | Sensor | On-premises management console |
119+
120+
#### Additional firewall rules for external services (optional)
121+
122+
Open these ports to allow extra services for Defender for IoT.
123+
100124
| Protocol | Transport | In/Out | Port | Used | Purpose | Source | Destination |
101125
|--|--|--|--|--|--|--|--|
102-
| HTTPS | TCP | IN/OUT | 443 | Sensor and On-Premises Management Console Web Console | Access to Web console | Client | Sensor and on-premises management console |
103-
| SSH | TCP | IN/OUT | 22 | CLI | Access to the CLI | Client | Sensor and on-premises management console |
104-
| SSL | TCP | IN/OUT | 443 | Sensor and on-premises management console | Connection Between CyberX platform and the Central Management platform | sensor | On-premises management console |
105-
| NTP | UDP | IN | 123 | Time Sync | On-premises management console use as NTP to sensor | sensor | on-premises management console |
106-
| NTP | UDP | IN/OUT | 123 | Time Sync | Sensor connected to external NTP server, when there is no on-premises management console installed | sensor | NTP |
107-
| SMTP | TCP | OUT | 25 | Email | The connection between CyberX platform and the Management platform and the mail server | Sensor and On-premises management console | Email server |
108-
| Syslog | UDP | OUT | 514 | LEEF | Logs that send from the on-premises management console to Syslog server | On-premises management console and Sensor | Syslog server |
109-
| DNS | | IN/OUT | 53 | DNS | DNS Server Port | On-premises management console and Sensor | DNS server |
110-
| LDAP | TCP | IN/OUT | 389 | Active Directory | The connection between CyberX platform and the Management platform to the Active Directory | On-premises management console and Sensor | LDAP server |
111-
| LDAPS | TCP | IN/OUT | 636 | Active Directory | The connection between CyberX platform and the Management platform to the Active Directory | On-premises management console and Sensor | LDAPS server |
112-
| SNMP | UDP | OUT | 161 | Monitoring | Remote SNMP collectors. | On-premises management console and Sensor | SNMP server |
113-
| WMI | UDP | OUT | 135 | monitoring | Windows Endpoint Monitoring | Sensor | Relevant network element |
114-
| Tunneling | TCP | IN | 9000 <br /><br />- on top of port 443 <br /><br />From end user to the on-premises management console. <br /><br />- Port 22 from sensor to the on-premises management console | monitoring | Tunneling | Sensor | On-premises management console |
115-
| HTTP| TCP | OUT | 80 | Certificate validation | Download CRL file | Sensor | CRL server |
126+
| HTTP | TCP | Out | 80 | The CRL download for certificate validation when uploading certificates. | Access to the CRL server | Sensor and on-premises management console | CRL server |
127+
| LDAP | TCP | In/Out | 389 | Active Directory | Allows Active Directory management of users that have access, to log in to the system. | On-premises management console and Sensor | LDAP server |
128+
| LDAPS | TCP | In/Out | 636 | Active Directory | Allows Active Directory management of users that have access, to log in to the system. | On-premises management console and Sensor | LDAPS server |
129+
| [SNMP](how-to-set-up-snmp-mib-monitoring.md) | UDP | Out | 161 | Monitoring | Monitors the sensor's health. | On-premises management console and Sensor | SNMP server |
130+
| SMTP | TCP | Out | 25 | Email | Used to open the customer's mail server, in order to send emails for alerts, and events. | Sensor and On-premises management console | Email server |
131+
| Syslog | UDP | Out | 514 | LEEF | The logs that are sent from the on-premises management console to Syslog server. | On-premises management console and Sensor | Syslog server |
132+
| DNS | TCP/UDP | In/Out | 53 | DNS | The DNS server port. | On-premises management console and Sensor | DNS server |
133+
| [WMI](how-to-configure-windows-endpoint-monitoring.md) | TCP/UDP | Out | 135, 1025-65535 | Monitoring | Windows Endpoint Monitoring. | Sensor | Relevant network element |
134+
| Tunneling | TCP | In | 9000 </br></br> in addition to port 443 </br></br> Allows access from the sensor, or end user, to the on-premises management console. </br></br> Port 22 from the sensor to the on-premises management console. | Monitoring | Tunneling | Sensor | On-premises management console |
135+
| Proxy | TCP/UDP | In/Out | 443 | Proxy | To connect the sensor to a proxy server | On-premises management console and Sensor | Proxy server |
116136

117137
### Plan rack installation
118138

@@ -123,10 +143,15 @@ To plan your rack installation:
123143
1. Allocate the rack space for the appliance.
124144

125145
1. Have AC power available for the appliance.
146+
126147
1. Prepare the LAN cable for connecting the management to the network switch.
127-
1. Prepare the LAN cables for connecting switch SPAN (mirror) ports and or network taps to the Defender for IoT appliance.
148+
149+
1. Prepare the LAN cables for connecting switch SPAN (mirror) ports, and network taps to the Defender for IoT appliance.
150+
128151
1. Configure, connect, and validate SPAN ports in the mirrored switches as described in the architecture review session.
152+
129153
1. Connect the configured SPAN port to a computer running Wireshark and verify that the port is configured correctly.
154+
130155
1. Open all the relevant firewall ports.
131156

132157
## About passive network monitoring
@@ -359,7 +384,7 @@ An active or passive aggregation TAP is installed inline to the network cable. I
359384

360385
The terminal access point (TAP) is a hardware device that allows network traffic to flow from port A to port B, and from port B to port A, without interruption. It creates an exact copy of both sides of the traffic flow, continuously, without compromising network integrity. Some TAPs aggregate transmit and receive traffic by using switch settings if desired. If aggregation is not supported, each TAP uses two sensor ports to monitor send and receive traffic.
361386

362-
TAPs are advantageous for various reasons. They're hardware-based and can't be compromised. They pass all traffic, even damaged messages, which switches often drop. They're not processor sensitive, so packet timing is exact where switches handle the mirror function as a low-priority task that can affect the timing of the mirrored packets. For forensic purposes, a TAP is the best device.
387+
TAPs are advantageous for various reasons. They're hardware-based and can't be compromised. They pass all traffic, even damaged messages, which the switches often drop. They're not processor sensitive, so packet timing is exact where switches handle the mirror function as a low-priority task that can affect the timing of the mirrored packets. For forensic purposes, a TAP is the best device.
363388

364389
TAP aggregators can also be used for port monitoring. These devices are processor-based and are not as intrinsically secure as hardware TAPs. They might not reflect exact packet timing.
365390

@@ -553,7 +578,7 @@ Review this list before site deployment:
553578
| 13 | Rack and cable the appliances. || |
554579
| 14 | Allocate site resources to support deployment. || |
555580
| 15 | Create Active Directory groups or local users. || |
556-
| 16 | Set-up training (self-learning). || |
581+
| 16 | Set up training (self-learning). || |
557582
| 17 | Go or no-go. || |
558583
| 18 | Schedule the deployment date. || |
559584

@@ -568,7 +593,7 @@ Review this list before site deployment:
568593

569594
An overview of the industrial network diagram will allow you to define the proper location for the Defender for IoT equipment.
570595

571-
1. **Global network diagram** - View a global network diagram of the industrial OT environment. For example:
596+
1. **Global network diagram** - View a global network diagram of the industrial OT environment. For example:
572597

573598
:::image type="content" source="media/how-to-set-up-your-network/backbone-switch.png" alt-text="Diagram of the industrial OT environment for the global network.":::
574599

@@ -577,7 +602,7 @@ An overview of the industrial network diagram will allow you to define the prope
577602
578603
1. **Committed devices** - Provide the approximate number of network devices that will be monitored. You will need this information when onboarding your subscription to the Azure Defender for IoT portal. During the onboarding process, you will be prompted to enter the number of devices in increments of 1000.
579604

580-
1. **(Optional) Subnet list** - Provide a subnet list for the production networks and a description (optional).
605+
1. **(Optional) Subnet list** - Provide a subnet list for the production networks and a description (optional).
581606

582607
| **#** | **Subnet name** | **Description** |
583608
|--| --------------- | --------------- |
@@ -617,25 +642,25 @@ An overview of the industrial network diagram will allow you to define the prope
617642
- Rockwell automation – Ethernet or IP
618643

619644
- Emerson – DeltaV, Ovation
620-
621-
1. **Serial connection** - Are there devices that communicate via a serial connection in the network? Yes or No
622645

623-
If yes, specify which serial communication protocol: ________________
646+
1. **Serial connection** - Are there devices that communicate via a serial connection in the network? Yes or No
647+
648+
If yes, specify which serial communication protocol: ________________
624649

625-
If yes, mark on the network diagram what devices communicate with serial protocols, and where they are:
626-
627-
*Add your network diagram with marked serial connection*
650+
If yes, mark on the network diagram what devices communicate with serial protocols, and where they are:
628651

629-
1. **Quality of Service** - For Quality of Service (QoS), the default setting of the sensor is 1.5 Mbps. Specify if you want to change it: ________________
652+
*Add your network diagram with marked serial connection*
630653

631-
Business unit (BU): ________________
654+
1. **Quality of Service** - For Quality of Service (QoS), the default setting of the sensor is 1.5 Mbps. Specify if you want to change it: ________________
632655

633-
1. **Sensor** - Specifications for site equipment
656+
Business unit (BU): ________________
657+
658+
1. **Sensor** - Specifications for site equipment
634659

635660
The sensor appliance is connected to switch SPAN port through a network adapter. It's connected to the customer's corporate network for management through another dedicated network adapter.
636-
637-
Provide address details for the sensor NIC that will be connected in the corporate network:
638-
661+
662+
Provide address details for the sensor NIC that will be connected in the corporate network:
663+
639664
| Item | Appliance 1 | Appliance 2 | Appliance 3 |
640665
|--|--|--|--|
641666
| Appliance IP address | | | |
@@ -644,7 +669,7 @@ An overview of the industrial network diagram will allow you to define the prope
644669
| DNS | | | |
645670
| Host name | | | |
646671

647-
1. **iDRAC/iLO/Server management**
672+
1. **iDRAC/iLO/Server management**
648673

649674
| Item | Appliance 1 | Appliance 2 | Appliance 3 |
650675
|--|--|--|--|
@@ -653,7 +678,7 @@ An overview of the industrial network diagram will allow you to define the prope
653678
| Default gateway | | | |
654679
| DNS | | | |
655680

656-
1. **On-premises management console**
681+
1. **On-premises management console**
657682

658683
| Item | Active | Passive (when using HA) |
659684
|--|--|--|
@@ -678,18 +703,18 @@ An overview of the industrial network diagram will allow you to define the prope
678703
1. **On-premises management console SSL certificate**
679704

680705
Are you planning to use an SSL certificate? Yes or No
681-
706+
682707
If yes, what service will you use to generate it? What attributes will you include in the certificate (for example, domain or IP address)?
683708

684709
1. **SMTP authentication**
685710

686711
Are you planning to use SMTP to forward alerts to an email server? Yes or No
687-
712+
688713
If yes, what authentication method you will use?
689-
714+
690715
1. **Active Directory or local users**
691716

692-
Contact an Active Directory administrator to create an Active Directory site user group or create local users. Be sure to have your users ready for the deployment day.
717+
Contact an Active Directory administrator to create an Active Directory site user group or create local users. Be sure to have your users ready for the deployment day.
693718

694719
1. IoT device types in the network
695720

0 commit comments

Comments
 (0)