Installation Guide: Virtual Arbor Edge Defense
Installation Guide: Virtual Arbor Edge Defense
Installation Guide
Version 6.3.1
Legal Notice
The information contained within this document is subject to change without notice. NETSCOUT SYSTEMS, INC.
makes no warranty of any kind with regard to this material, including, but not limited to, the implied warranties
of merchantability and fitness for a particular purpose. NETSCOUT SYSTEMS, INC. shall not be liable for errors
contained herein or for any direct or indirect, incidental, special, or consequential damages in connection with the
furnishings, performance, or use of this material.
Use of this product is subject to the End User License Agreement available at
http://www.NetScout.com/legal/terms-and-conditions or which accompanies the product at the time of
shipment or, if applicable, the legal agreement executed by and between NetScout Systems, Inc. or one of its
wholly-owned subsidiaries (“NETSCOUT”) and the purchaser of this product (“Agreement”).
Government Use and Notice of Restricted Rights: In U.S. government (“Government”) contracts or subcontracts,
Customer will provide that the Products and Documentation, including any technical data (collectively “Materials”),
sold or delivered pursuant to this Agreement for Government use are commercial as defined in Federal
Acquisition Regulation (“FAR”) 2.101and any supplement and further are provided with RESTRICTED RIGHTS. All
Materials were fully developed at private expense. Use, duplication, release, modification, transfer, or disclosure
(“Use”) of the Materials is restricted by the terms of this Agreement and further restricted in accordance with FAR
52.227-14 for civilian Government agency purposes and 252.227- 7015 of the Defense Federal Acquisition
Regulations Supplement (“DFARS”) for military Government agency purposes, or the similar acquisition
regulations of other applicable Government organizations, as applicable and amended. The Use of Materials is
restricted by the terms of this Agreement, and, in accordance with DFARS Section 227.7202 and FAR Section 12.212,
is further restricted in accordance with the terms of NETSCOUT’S commercial End User License Agreement. All
other Use is prohibited, except as described herein.
This Product may contain third-party technology. NETSCOUT may license such third-party technology and
documentation (“Third-Party Materials”) for use with the Product only. In the event the Product contains Third-
Party Materials, or in the event you have the option to use the Product in conjunction with Third-Party Materials
(as identified by NETSCOUT in the Documentation provided with this Product), then such third-party materials are
provided or accessible subject to the applicable third-party terms and conditions contained either in the “Read
Me” or “About” file located in the Software or on an Application CD provided with this Product, or in an appendix
located in the documentation provided with this Product. To the extent the Product includes Third-Party Materials
licensed to NETSCOUT by third parties, those third parties are third-party beneficiaries of, and may enforce, the
applicable provisions of such third-party terms and conditions.
Open-Source Software Acknowledgment: This product may incorporate open-source components that are
governed by the GNU General Public License (“GPL”) or licenses that are compatible with the GPL license (“GPL
Compatible License”). In accordance with the terms of the GNU GPL, NETSCOUT will make available a complete,
machine-readable copy of the source code components of this product covered by the GPL or applicable GPL
Compatible License, if any, upon receipt of a written request. Please identify the product and send a request to:
NetScout Systems, Inc.
GNU GPL Source Code Request
310 Littleton Road
Westford, MA 01886
Attn: Legal Department
No portion of this document may be copied, photocopied, reproduced, translated, or reduced to any electronic
medium or machine form without prior consent in writing from NETSCOUT. The information in this document is
subject to change without notice and does not represent a commitment on the part of NETSCOUT.
The products and specifications, configurations, and other technical information regarding the products described
or referenced in this document are subject to change without notice and NETSCOUT reserves the right, at its sole
discretion, to make changes at any time in its technical information, specifications, service, and support programs.
All statements, technical information, and recommendations contained in this document are believed to be
accurate and reliable but are presented “as is” without warranty of any kind, express or implied. You must take
full responsibility for their application of any products specified in this document. NETSCOUT makes no implied
warranties of merchantability or fitness for a purpose as a result of this document or the information described
or referenced within, and all other warranties, express or implied, are excluded.
Except where otherwise indicated, the information contained in this document represents the planned capabilities
and intended functionality offered by the product and version number identified on the front of this document.
Screen images depicted in this document are representative and intended to serve as example images only.
© 2019 NETSCOUT SYSTEMS, INC. All rights reserved. Proprietary and Confidential Information of NETSCOUT
SYSTEMS, INC.
Document Number: vAED-IG-631-2019/12
11 December, 2019
Contents
Preface
How to Use the Virtual Arbor Edge Defense Documentation 5
Contacting the Arbor Technical Assistance Center 6
Index 69
Preface
This guide explains how to configure and use NETSCOUT® Virtual Arbor Edge Defense
(vAED).
Audience
This guide is intended for enterprise security operators and engineers who are
responsible for securing the internet data center edge from threats against availability.
These operators and engineers should have fundamental knowledge of their network
security policies and network configuration.
In this section
This section contains the following topics:
Related publications
After you install vAED, see the following documentation for information about how to use
AED:
Reference documentation
Document Contents
AED Online Help Online help topics from the AED User Guide . The Help is context-
sensitive to the AED UI page from which it is accessed.
AED API Reference information plus a simple code sample that you can
Programmer Guide experiment with to learn the basics of the AED API quickly.
This guide is installed with AED. You can access it at the following
link:
https://IP_address/help/AED_PG_HTML5/AED_PG.htm
IP_address = the IP address of hostname for your AED
Online AED API Complete commented code for the AED API.
Documentation This guide is installed with AED. You can access it at the following
link:
https://IP_address/api/aed/doc/v1/endpoints.html
IP_address = the IP address or hostname for your AED
Contact methods
You can contact the Arbor Technical Assistance Center as follows:
n Phone US toll free — +1 877 272 6721
Example
vAED-IG-631-2019/12
Page 9
This section describes vAED and its key features and licensing options. vAED is the version
of AED that runs on a hypervisor or in the cloud.
In this section
This section contains the following topics:
About vAED 8
About the Layer 3 Deployment Mode 9
Configuring Static Routes for the Protection Interfaces on vAED 10
Accessing vAED 13
About vAED
vAED is the virtual machine version of AED that runs on a hypervisor. vAED contains all of
the AED software packages and configurations, and provides you with a hardware-
independent resource. You only need to install the virtual machine and configure its
network settings.
Supported interfaces
vAED provides the following interfaces:
n 2 management interfaces: mgt0 and mgt1
n 2 protection interfaces: ext0 and int0
Licensing vAED
vAED uses cloud-based licenses, which you configure in the vAED UI. You need to
configure cloud-based licenses for each instance of vAED. See “About Cloud-Based
Licensing for vAED” on page 54.
If vAED does not have a valid license when it is set to layer 3 mode, then the system does
not pass traffic or process mitigations.
Accessing vAED
After the initial installation and configuration, you can access vAED through any supported
web browser.
For a list of the supported web browsers, see the Arbor Edge Defense Release Notes.
In the UI, the inline deployment mode appears as Inline Bridged and the layer 3
deployment mode appears as Inline Routed.
If vAED does not have a valid license when it is set to layer 3 mode, then the system does
not pass traffic or process mitigations.
Configuring routes
If you deploy vAED in the layer 3 mode, then you must configure routes for the protection
interfaces. See “Configuring Static Routes for the Protection Interfaces on vAED” on the
next page.
n Removes any IP addresses that are configured for the protection interfaces
n Removes any GRE tunneling settings, including local IP addresses, remote IP addresses,
and the subnet mask length
A route can be inbound or outbound. vAED routes traffic using the most specific valid
route that matches the destination address, through the protection interface that has the
same subnet as the nexthop.
You configure routes in the command line interface (CLI). See “Entering CLI Commands” in
the AED User Guide .
Note
You also can configure routes on the Interfaces page (Administration > Interfaces) in
the UI. See “Configuring Routes” in the AED User Guide .
Important
If you configure GRE tunneling when vAED is set to the layer 3 mode, vAED uses the IP
address of the external interface as the GRE tunnel destination.
For information about deployment modes, see “Setting the Deployment Mode” in the AED
User Guide .
When vAED is set to the layer 3 mode, you can configure routes on the protection
interfaces for inbound traffic and outbound traffic:
1. Log in to the CLI with your administrator user name and password.
2. Enter / services aed mitigation route add network nexthop
network = The IPv4 address and prefix length for the destination network.
nexthop = The IPv4 address for the router through which the traffic is sent to the
destination network. For a nexthop to be valid, its IP address must match a subnet for
one of the protection interfaces.
3. Repeat the previous step for each route that you want to configure.
If you expect vAED to forward outbound traffic, you must configure routes for the
outbound traffic. we recommend that you configure a default route to 0.0.0.0/0 and a
nexthop to a gateway router on the subnet that is connected to the external interface. If
necessary, configure additional routes for the outbound traffic to other external nexthops.
If you do not configure routes for the outbound traffic, vAED will drop outbound traffic.
See “Configuring the Outbound Threat Filter” in the AED User Guide .
If the IP address for the nexthop is not within any protection interface subnet, vAED
displays Unknown in the Interface column.
Important
If you delete the IP address for a protection interface, all routes that were configured to
go through that interface become invalid. However, vAED does not remove the invalid
routes. If vAED can reach a nexthop after you assign a new IP address and subnet to a
protection interface, then vAED reactivates the invalid route. This behavior is different
than the behavior for management routes.
Accessing vAED
After you install and configure vAED, you can access it through any supported web
browser.
For a list of the capabilities and limitations of vAED, see “About vAED” on page 8 .
This section describes how to create and configure vAED on a Kernel-based Virtual
Machine (KVM).
In this section
This section contains the following topics:
To increase the pps throughput rate and the number of supported protection groups,
install and configure vAED for a hypervisor with 4 CPUs and 12 GB RAM. With this
configuration, vAED can support up to 50 protection groups.
For information about changing these settings, see the KVM documentation.
To determine if your processor supports one of these extensions, enter the following
command on your system command line:
egrep -c '(vmx|svm)' /proc/cpuinfo
If the command returns 0, your CPU does not support hardware virtualization. If the
command returns 1 or greater, your CPU supports hardware virtualization. In this case,
you must enable hardware virtualization in the host server’s BIOS.
Preparation process
Prepare to install and configure vAED on KVM as follows:
2 Ensure that the host server on which you install the virtual machine has a
processor that supports hardware virtualization. See “Enabling hardware
virtualization on your CPU” above.
4 Ensure that the MTU on the hypervisor is configured properly. Consult your
hypervisor documentation for instructions.
6 Download the vAED .qcow2 image file to a suitable location under the managed
storage pool on the host server. The default location is /var/lib/libvirt/images/.
7 (Optional) If you plan to use a data source to initialize vAED, create a user date
file. See “Creating a User Data File for Cloud-Init” on page 40.
Default router (or The IP address of the first router hop that sends
gateway) outbound network traffic. Typically, this is the
subnet switch or router.
Administrator user The credentials for administrative access to vAED. The default user name
name and password is admin and the default
password is arbor.
The network bridges use the eth0, eth1, eth2, and eth3 interfaces on the host server. You
map the network bridges to the vAED mgt0, mgt1, ext0, and int0 interfaces on KVM.
# Specify 4 interfaces.
iface eth0 inet manual
iface eth1 inet manual
iface eth2 inet manual
iface eth3 inet manual
After you configure the network bridges, you can install vAED on KVM. See “Installing vAED
on KVM” on the next page.
You must perform the installation steps for each virtual machine that you want to create.
Note
To prepare to install vAED, see “Preparing to Install vAED on KVM” on page 16 .
After you complete the installation, you can configure vAED. See “Configuring vAED on
KVM” on page 22.
Command Description
sudo virt-install --connect Starts the installer on the host server command line.
qemu:///system
Command Description
--disk path=filepath/filename.qcow2, Specifies the path to and file name of the disk image
device=disk,bus=virtio,size=100,format and the size and bus type of the image.
=qcow2
--network bridge=vmbr0,model=virtio Assign the virtual bridges to the virtual machine and
--network bridge=vmbr1,model=virtio assign the virtual network.
--network bridge=vmbr2,model=virtio
--network bridge=vmbr3,model=virtio
After the commands finish executing, you should see the following output, which indicates
that the virtual machine is running:
Domain creation completed. You can restart your domain by running:
virsh --connect qemu:///system start systemName
KVM virtual machine 1. To open the KVM console, enter the following command on
console the host server command line:
~# virsh - c qemu:///session
Note
For help with terminal commands, enter help. To close the
console, enter quit.
2. To connect to the vAED CLI, enter the following command:
virsh # consolehostname
hostname = the name of the vAED
Configuring vAED
To configure vAED, access the CLI on vAED. See “Accessing the vAED command line
interface” above.
In the CLI, enter the following commands. Press ENTER after each command.
Command Description
/ system name set hostname Enter the host name for the vAED as a simple host name
or a fully qualified domain name. For example:
host.example.com
/ service dns server add IP_address Enter the IP address for the DNS server.
/ ip interfaces ifconfig mgt1 IP_ (Optional) Enter an IP address and prefix for
address/prefix up management port mgt1. For example: 198.51.100.0/24 or
2001:DB8::/32
Command Description
/ services aaa local password admin To start the AED services, you must change the default
interactive administrator password. Enter this command to change
the password and then follow these steps:
1. Enter the new password.
2. Re-enter the new password.
/ services aed mode set deployment_ (Optional) To change the deployment mode of vAED
mode from the default mode (monitor), enter inline or L3.
For a description of the deployment modes, see “About
the Deployment Modes” in the AED User Guide .
/ ip access add service mgt0 IP_ (Optional) Enter this command to create an IP access
address/prefix rule for a service. Specify the name of a valid service and
the IP address and prefix for the hosts that are allowed
to communicate with the service. For example:
/ ip access add snmp mgt0 198.51.100.0/24
Valid services are as follows:
n http
n https
n ping
n ssh
n cloudsignal
n snmp
/ ip access delete service all IP_ (Optional) Enter this command to delete an IP access
address/prefix rule for a service. Specify the name of the service and the
IP address and prefix of the hosts that were allowed to
communicate with the service.
For example, the following command deletes the default
IP access rule for the http service on all management
interfaces: / ip access delete http all
0.0.0.0/0
/ services ssh key generate Configure the SSH host keys in one of the following ways:
/ services ssh key host set n To have AED generate the SSH host key files, enter /
disk:fileName services ssh key generate
n To import a file that contains the SSH host keys, enter
/ services ssh key host set disk:fileName
fileName = the name of the file that contains the
SSH host keys
/ exit Log out of the CLI, and then close the hypervisor,
console, or SSH window.
After you complete the installation and configuration, you can access vAED at any time. See
“Accessing vAED” on page 13.
These IP access rules do not restrict access to the services (that is, they are configured for
0.0.0.0/0). To restrict access, first add a new IP access rule that specifies an IP address
range for the service, and then delete the existing access rule.
In this section
This section contains the following topics:
To increase the pps throughput rate and the number of supported protection groups,
install and configure vAED for a hypervisor with 4 CPUs and 12 GB RAM. With this
configuration, vAED can support up to 50 protection groups.
Note
By default, the vAED OVA for VMware is configured for a hypervisor with 2 CPUs and 6 GB
RAM. You can change the configuration as follows:
1. Deploy the OVA file that Arbor provides.
2. Change the CPU and RAM settings. For information about changing these settings, see
the VMware documentation.
3. Save the modified OVA file with a different file name.
Preparation process
Prepare to install and configure vAED on VMware as follows:
3 Ensure that the MTU on the hypervisor is configured properly. Consult your
hypervisor documentation for instructions.
4 Install the VMware vSphere Client software, version 5.5. or later, on a client
computer. For more information, see
http://www.vmware.com/products/vsphere-hypervisor.
Important
This client software runs on Windows computers only.
Default router (or The IP address of the first router hop that sends
gateway) outbound network traffic. Typically, this is the subnet
switch or router.
Administrator user The credentials for administrative access to vAED. The default user
name and password name is admin and
the default password
is arbor.
Network mappings The associations between the virtual networks that you mgt0:
create and the vAED interfaces. mgt1:
When you create the virtual networks for the interfaces ext0:
as described in “Configuration Requirements for the int0:
VMware Virtual Network” on the next page, record the
network names here.
The use of management interface mgt1 is optional.
Important
If you are an experienced VMware user, you may choose to configure your networks
differently. If you do, then you must account for those differences during the vAED
installation.
This document assumes that you have some knowledge of virtual network configuration
or you have access to someone who has this knowledge.
When you create vAED, you map the source networks in the virtual image to the virtual
networks (destination networks) that you configured. The source network names are the
same as the vAED interface names (that is, mgt0, mgt1, ext0, and int0).
By default, vAED is installed in monitor mode. If you plan to keep the system in monitor
mode, then you can map all of the source networks to the same virtual network.
If you map these interfaces to the same virtual network during the initial installation, you
can remap them at any time. See “Remapping VMware Virtual Networks” on page 35.
Note
In inline mode, NETSCOUT tested the ext0 and int0 interfaces as physical interfaces
dedicated to separate virtual ports. However, other configurations should work, including
the use of VLANs to share a single physical interface, as long as the platform and
hypervisor support the configuration. Because vAED performance varies by platform and
configuration, confirm that the performance is acceptable for your situation.
To avoid dropped packets in this configuration, set the Forged Transmits option for the
virtual network to Accept . When Forged Transmits is set to Accept , the vswitch does
not compare the source MAC addresses to the VNIC address.
For instructions on how to set the Forged Transmits option, refer to your VMware
documentation.
Important
Because vAED performance varies by platform and configuration, we recommend that
you confirm that the performance of vAED in this configuration is acceptable for your
situation.
Note
Before you install vAED, see “Preparing to Install vAED on VMware” on page 26 .
When you create the virtual machine, you map the source networks in the virtual image to
the virtual networks (destination networks) that you configured. For more information
about configuring the networks, see “Configuration Requirements for the VMware Virtual
Network” on page 28.
After you complete the installation, you can configure vAED. See “Configuring vAED on
VMware” on page 32.
ext0 Select the network that you configured for the ext0 interface.
int0 Select the network that you configured for the int0 interface.
Configuring vAED
To configure vAED, access the CLI on vAED. See “Accessing the vAED command line
interface” above.
In the CLI, enter the following commands. Press ENTER after each command.
Command Description
/ system name set hostname Enter the host name for the vAED as a simple host name
or a fully qualified domain name. For example:
host.example.com
/ service dns server add IP_address Enter the IP address for the DNS server.
/ ip interfaces ifconfig mgt1 IP_ (Optional) Enter an IP address and prefix for
address/prefix up management port mgt1. For example: 198.51.100.0/24 or
2001:DB8::/32
/ services aaa local password admin To start the AED services, you must change the default
interactive administrator password. Enter this command to change
the password and then follow these steps:
1. Enter the new password.
2. Re-enter the new password.
Command Description
/ services aed mode set deployment_ (Optional) To change the deployment mode of vAED
mode from the default mode (monitor), enter inline or L3.
For a description of the deployment modes, see “About
the Deployment Modes” in the AED User Guide .
/ ip access add service mgt0 IP_ (Optional) Enter this command to create an IP access
address/prefix rule for a service. Specify the name of a valid service and
the IP address and prefix for the hosts that are allowed
to communicate with the service. For example:
/ ip access add snmp mgt0 198.51.100.0/24
Valid services are as follows:
n http
n https
n ping
n ssh
n cloudsignal
n snmp
/ ip access delete service all IP_ (Optional) Enter this command to delete an IP access
address/prefix rule for a service. Specify the name of the service and the
IP address and prefix of the hosts that were allowed to
communicate with the service.
For example, the following command deletes the default
IP access rule for the http service on all management
interfaces: / ip access delete http all
0.0.0.0/0
/ services ssh key generate Configure the SSH host keys in one of the following ways:
/ services ssh key host set n To have AED generate the SSH host key files, enter /
disk:fileName services ssh key generate
n To import a file that contains the SSH host keys, enter
/ services ssh key host set disk:fileName
fileName = the name of the file that contains the
SSH host keys
/ exit Log out of the CLI, and then close the hypervisor,
console, or SSH window.
After you complete the installation and configuration, you can access vAED at any time. See
“Accessing vAED” on page 13.
These IP access rules do not restrict access to the services (that is, they are configured for
0.0.0.0/0). To restrict access, first add a new IP access rule that specifies an IP address
range for the service, and then delete the existing access rule.
This section describes how to use Cloud-Init to initialize a virtual AED (vAED) on supported
hypervisors the first time you start the system.
In this section
This section contains the following topics:
After you create a user data file, you create a data source that vAED supports. Cloud-Init
uses a data source to pass the configuration settings in the user data file to vAED.
Note
You can use an orchestration environment such as OpenStack to create the data source.
You also can use the NoCloud data source, which does not require an orchestration
environment. See “Using Cloud-Init with an Orchestration Environment” on page 48
and “Using Cloud-Init without an Orchestration Environment” on page 49 .
Requirements
To use Cloud-Init to initialize vAED, ensure that you meet the requirements for installing
and running vAED on a supported hypervisor. See “Preparing to Install vAED on VMware”
on page 26 and “Preparing to Install vAED on KVM” on page 16
For information about data sources, see “Supported Cloud-Init data sources” below.
In the user data file, you include commands to perform some or all of the following
actions:
n Add a password for the system administrator
The data sources that vAED supports, in the order in which Cloud-Init searches for them,
are as follows:
ConfigDrive Mounts a file system when you start vAED. Cloud-Init finds the
mounted drive and initializes vAED by using the configuration
settings on the drive. You configure the ConfigDrive data source in
the OpenStack orchestration environment.
For instructions on how to create the drive and attach it to vAED,
refer to the OpenStack documentation:
http://docs.openstack.org/
NoCloud Provides a way to initialize vAED with Cloud-Init when you do not
have an orchestration environment. See “Using Cloud-Init without
an Orchestration Environment” on page 49.
You must create the user data file in the YAML format, and save the file with a .yaml
extension. For information about the YAML format, see http://www.yaml.org/.
After you create a user data file, Cloud-Init uses a data source to pass the configuration
settings in the file to vAED. See “Supported Cloud-Init data sources” on page 38.
For a description of the Cloud-Init modules that vAED supports, see “About the users
module” on the facing page, “About the comsh module” on page 42, and “About the
final_message module” on page 45.
These modules are optional, and you can add them to the YAML file in any order.
Important
These modules are the only Cloud-Init modules that NETSCOUT supports in a user data
file.
lock_password: Enter False for this command to allow the user to access
vAED. If you want to lock access to the account, enter True
for this command.
ssh-authorized-keys: Add this section to define public SSH key pairs for the user.
You can enter key pairs in the following forms:
ssh-rsa publicKey
ssh-dsa publicKey
The following code provides an example of the Cloud-Init parameters that you can add to
a user data file:
#cloud-config
users:
- name: user_1
priv: system_admin
passwd: passwordHash
lock_passwd: False
ssh-authorized-keys:
- ssh-rsa publicKey user@host
ip access add {mgt0|mgt1|all}service Add IP access rules for the services that are
ipAddress_Range allowed to access one management port (mgt0
or mgt1) or both management ports (all).
The valid services are as follows:
n http
n https
n ssh
n ping
services aed mode set {inline | l3 | Set the deployment mode. For example,
monitor} services aed mode set inline
For descriptions of the deployment modes, see
“About the Deployment Modes” in the AED User
Guide .
Important
If you do not specify a deployment mode, vAED
is set to the monitor mode by default.
services aed mitigation interface If vAED is set to the layer 3 (l3) deployment
protectionInterface network mode, assign an IPv4 address and prefix length
to a protection interface (for example, ext0 or
int0).
services aed mitigation route add network If vAED is set to the layer 3 (l3) deployment
nexthop mode, add a route for the layer 3 traffic. Enter an
IPv4 address and prefix length for the
destination network.
Also enter an IPv4 address for the router
(nexthop) through which the traffic is sent to the
network. The IP address for the router must
match a subnet for one of the protection
interfaces.
services aaa local add userName userGroup Creates a new user account. Enter a user name,
encrypted 'passwordHash' the user’s level of privileges (user group), and a
password hash. Valid user groups are as follows:
n system_admin
n ddos_admin
n system_user
n system_none
services aaa local apitoken generate Generate an API token for a user, to allow access
userName tokenDescription to the AED API. Enter the name of the user who
can use the token and a description for the
token.
To view the token that is generated, see “Viewing
the Cloud-Init Log” on page 52.
services ssh key generate Generate the SSH host key files.
services ssh start Start the SSH server, to allow SSH connections.
Important
Before you can start the SSH server, you must
generate the host key files.
Important
When you use Cloud-Init to initialize vAED, DHCP is enabled by default for management
port mgt0 only.
The following code provides an example of how to use the CLI commands in the comsh
module:
#cloud-config
comsh:
- ip access add http all 192.0.2.0/24
- ip access add https all 192.0.2.0/24
- ip access add ping all 192.0.2.0/24
- ip access add ping all 198.51.100.0/24
- ip access add ssh all 192.0.2.0/24
- ip access add ssh all 198.51.100.0/24
- ip access commit
- services aaa local password admin encrypted 'passwordHash'
- services aaa local add user_2 ddos_admin encrypted 'passwordHash'
- services aaa local apitoken generate api token for user_2
- services ssh key generate
- services ssh start
- services aed start
- license --license-server-id 12345678901 --mbps 1000 --aif-level Advanced
- config write
# Using py-bcrypt
# https://pypi.python.org/pypi/py-bcrypt
from bcrypt import gensalt
from bcrypt import hashpw
For information about the user data file, see “Creating a User Data File for Cloud-Init” on
page 40.
Important
The user data file that the None/Fallback data source uses does not start AED services.
You must change the default password on vAED before you can start AED services.
For information about creating a user data file and data sources, see “Creating a User
Data File for Cloud-Init” on page 40 and “Supported Cloud-Init data sources” on page 38.
For information on the hypervisors that vAED supports, see the Arbor Edge Defense
Release Notes.
Note
You also can use Cloud-Init without an orchestration environment. See “Using Cloud-Init
without an Orchestration Environment” on the facing page.
After you use Cloud-Init to initialize vAED, you can view the Cloud-Init log on vAED. See
“Viewing the Cloud-Init Log” on page 52.
For an overview of data sources, see “Supported Cloud-Init data sources” on page 38 .
The metadata file can be empty, but the disk image requires a metadata file. For
information about the metadata file, see
http://cloudinit.readthedocs.io/en/latest/topics/datasources.html?highlight=meta%20d
ata%20file#no-cloud
Command Description
After Cloud-Init finishes executing the commands, you should see the following output,
which indicates that the virtual machine is running:
# virt-install --connect qemu:///system --name <vm-hostname> -r 6144 --
vcpus=2,sockets=1,cores=2,maxvcpus=2 --arch=x86_64 --import --os-type
linux --disk path=/var/lib/libvirt/images/Arbor-vaed-#.#.#-
xxxx.qcow2,bus=virtio,size=100,format=qcow2 --disk
path=/var/lib/libvirt/images/filename.iso,device=cdrom,perms=ro --
network bridge=vmbr0,model=virtio --network bridge=vmbr1,model=virtio -
-network bridge=vmbr3,model=virtio --network bridge=vmbr4,model=virtio
--vnc --noautoconsole
In this section
This section contains the following topics:
The throughput limit is enforced on the clean traffic that vAED forwards. Clean traffic
refers to traffic that is not dropped by a protection setting.
n The ATLAS Intelligence Feed (AIF)
If vAED does not have a valid license when it is set to layer 3 mode, then the system does
not pass traffic or process mitigations.
vAED communicates with the cloud-based license server on the standard HTTPS port, 443.
If vAED is behind a firewall, we recommend that you configure a proxy server through
which vAED accesses the license server.
If vAED cannot communicate with the license server, the local licenses expire 10 days after
they were last refreshed. See “Refreshing local copies of the cloud-based licenses” on
page 59.
If the local licenses expire, your ability to use vAED is severely limited. See “About license
expiration” on the facing page.
If you decommission vAED, then release the local licenses on vAED first. If you do not
release the licenses first, then the capacity that is assigned to them is unavailable to other
systems until the local licenses expire. The licenses expire 10 days after you decommission
vAED. See “Releasing Local Licenses on vAED” on page 59.
Regardless of the throughput limit that you license on vAED, the limit is not absolute; it
allows for a buffer that accommodates occasional traffic spikes.
If the amount of traffic that vAED forwards exceeds 90 percent of its licensed limit, an alert
appears on the Summary page and System Alerts page. You can configure notifications to
send messages when a license alert occurs.
License alerts are included when you configure bandwidth notifications. See “Configuring
Notifications” in the Arbor Edge Defense User Guide .
If no licenses for a capability are available on the license server, vAED clears the Expiration
field. Without a throughput license, vAED passes traffic without inspecting it. Without an
AIF license, vAED cannot detect and block traffic that matches AIF HTTP header signatures
or AIF threat policies that are enabled.
The licenses are available through a cloud-based license server. See “About Cloud-Based
Licensing for vAED” on page 54.
2 Request a local license for a throughput limit. This limit is the amount of clean
traffic that vAED is licensed to forward. Clean traffic refers to traffic that is not
dropped by a protection setting.
See “Requesting a throughput limit for vAED” on the next page.
Note
When you request a throughput limit, vAED automatically requests an
advanced AIF license from the server.
4 (Optional) Refresh local copies of the licenses. See “Refreshing local copies of
the cloud-based licenses” on page 59.
Cloud-Based License Type the license server ID that you received from NETSCOUT
Server ID box after you purchased a cloud-based license.
Use Proxy Server Select this check box to connect to the vAED license server
check box through a proxy server.
Proxy Server box Type the IP address or the hostname for the proxy server.
Port box Type the port number for the proxy server.
Proxy Username If necessary, type the user name that is required to access the
box proxy server.
Proxy Password box If necessary, type the password that is required to access the
Verify box proxy server, and then re-type the password to confirm it. To
delete an existing password and leave the password empty,
click (Clear Password).
4. Click Save.
If the cloud-based license server is processing a request from another user, a
message notifies you that your request cannot be saved. When this message
disappears, click Save again.
The Throughput Limit for Clean Traffic field displays the throughput limit that vAED
acquired. If the throughput limit that you request is not available, then a message displays
the throughput limit that vAED could acquire.
In this case, your original throughput request remains in the Requested Throughput
Limit box. If more throughput becomes available, vAED increases the throughput, up to
the requested amount.
To increase the throughput limit for a vAED, you can purchase additional throughput
licenses. You also can reduce the throughput limit on other vAED systems that are
connected to the same license server.
n after you add more throughput capacity to the server, so that vAED can access it
immediately
n after you resolve any issues that may have caused a license refresh to fail
A refresh may take several minutes. If vAED can communicate with the cloud-based license
server, then the Last Successful Refresh section displays the new date and time. If vAED
cannot communicate with the license server, then a message notifies you that the refresh
was unsuccessful. In that situation, contact the Arbor Technical Assistance Center (ATAC) at
https://support.arbornetworks.com/.
For information about how to configure the licensed capabilities on vAED, see
“Configuring Cloud-Based Licenses for vAED” on page 57.
Expiration The first date on which a throughput license will expire on the
cloud-based license server. If no throughput license was requested
or if no throughput license is available, then this field is empty. If
the throughput license on the license server does not have an
expiration date, then this field shows No Expiration.
Below the graph, the Throughput Limit for Clean Traffic section indicates the amount of
throughput for which vAED is licensed. A black horizontal line identifies this limit on the
graph. This throughput limit is not absolute; it allows for a buffer that accommodates
occasional traffic spikes.
Note
If you restart your system, the horizontal line may drop to zero. After the restart is
complete, the correct limit is restored.
vAED continues to forward clean traffic until the traffic exceeds the buffer. At that point,
vAED may start to drop clean traffic.
The traffic segments in blue represent the clean traffic that AED forwarded. The traffic
segments in red represent the clean traffic that AED dropped after the buffer was
exceeded.
Expiration The first date on which an AIF license will expire on the cloud-
based license server. If no AIF license is available, then this field is
empty. If the AIF license on the license server does not have an
expiration date, then this field shows No Expiration.
Refresh Local Copy Click this button to refresh the connection to the cloud-based
of License license server. You may want to refresh the connection in the
following situations:
n after a network change occurs, to ensure that vAED still can
contact the license server
n after you add more throughput capacity to the server, so that
vAED can access it immediately
n after you resolve any issues that may have caused a license
refresh to fail
Proxy Server, Port, If you configure a proxy server for the cloud-based license
Proxy Authentication server, these fields show the IP address or hostname, port
Method number, and authentication method for the server.
This section provides information about the vAED performance benchmark tests.
In this section
This section contains the following topics:
For information about the KVM installation, see “Installing vAED on KVM” on page 20 .
n VMware
For information about the VMware installation, see “Installing vAED on VMware” on
page 30.
For information about vAED, see “About vAED” on page 8 .
Dell™ PowerEdge™ 2x Intel® Xeon® CPU E5-2699 v3 72 512 GB 6 x 1.2 TB 10K SAS
R730xd @ 2.30GHz
HP® o ProLiant DL380 2x Intel® Xeon® CPU E5-2690 v3 48 256 GB 4 x 1.2 TB 10K SAS
Gen9 @ 2.60GHz
Important
For the 2 CPU tests, Arbor ran the VMware tests on the Dell platform and the KVM tests
on the HP platform. Arbor extrapolated the 2 CPU results on the other platforms from
the results on these platforms.
Arbor configured the host server for the 2 CPU vAED benchmark tests as follows:
2 CPU configuration
Component Configuration
CPUs 2
RAM 6 GB
Arbor configured the host server for the 4 CPU vAED benchmark tests as follows:
4 CPU configuration
Component Configuration
CPUs 4
RAM 12 GB
Test Setup
The test components consisted of an Ixia appliance and the device under test (DUT). The
DUT was vAED on VMware or KVM. The Ixia chassis was connected directly to the DUT with
no physical switch between the two devices. The physical cabling varied, based on the DUT
and the test that was being run.
Each vAED interface used its own virtual switch or Linux bridge, which was bound to a
physical interface on the host server. The virtual switches were not shared among vAED
virtual machines.
Throughput testing
The purpose of the inspection throughput metric is to establish and illustrate the
maximum traffic throughput that the vAED can inspect.
Note
This test differs from a pure network throughput test, in which the raw packet handling
capacity is determined without inspection.
Latency testing
Traffic delays can trigger timeout conditions, which may cause critical applications to fail. In
some cases, time-to-live values may cause traffic to be re-sent, which can make traffic
problems worse. For these reasons, latency is an important consideration for an inline
network security device.
Note
Latency can vary due to the hardware configuration of the virtual machine’s host server
and the number of virtual machines that the server is hosting.
Note
Arbor incorporated latency improvement measures during the installation process.
The 1 Gb performance benchmark results for VMware on a host server with 2 CPUs are as
follows:
Note
Arbor extrapolated the 2 CPU results for the UCS and HP platforms from the results on
the Dell platform.
The 1 Gb performance benchmark results for VMware on a host server with 4 CPUs are as
follows:
Note
Arbor extrapolated the 2 CPU results for the UCS and Dell platforms from the results on
the HP platform.
The 1 Gb performance benchmark results for KVM on a host server with 4 CPUs are as
follows:
A I
AIF (ATLAS Intelligence Feed) inspected throughput
cloud-based licenses 55 vAED 54
license on vAED 55 installation
license, viewing on vAED 61 vAED on KVM virtual machine 16, 20
API Guide online 5 vAED on VMware 26, 30
Arbor Technical Assistance Center, contacting 6 interfaces
ATAC, contacting 6 vAED 8
ATLAS Intelligence Feed (AIF) IP access rules
cloud-based licenses 55 adding 23, 33
license on vAED 55 deleting 23, 33
C K
cloud-based license server, configuring for vAED 57 KVM
cloud-based licenses, vAED using QEMU guest agent with 21
about 54 KVM virtual machine
AIF 55, 61 configuring network bridges 18
configuring 57 installing vAED on 16, 20
expiration 55 performance benchmarks 67
refreshing local copies 59
releasing 59 L
status 56
l3
throughput, viewing 60
see layer 3 mode 10
viewing information about 60
layer 3 mode
Cloud-Init
about 9
about 38, 48-49, 52
configuring routes 10
password hash for user data file 46
license information
supported data sources 38
vAED 60
user data file 38, 40, 47
license server, vAED
Cloud-Init modules
configuring 57
supported 41
viewing information 61
configuration, vAED 22, 32
Licenses page 60
customer support, contacting 6
licenses, releasing on vAED 59
D M
data sources for Cloud-Init 38
mitigation interfaces
deployment mode
configuring 10
layer 3 9-10
E N
network bridges
expiration
configuring for KVM virtual machine 18
cloud-based licenses 55
vAED licenses 55
V
vAED
about 8
accessing 13
configuring CPU settings in vSphere 31
To read the complete end user license agreement online, click one of the following links: