Requirements for Alert Logic Threat Manager for Microsoft Azure
United States firewall rules
Use the following rules to communicate with the US Data Center.
Appliance inbound
Source | Destination | Protocol | Port | Description |
---|---|---|---|---|
0.0.0.0/0 | Appliance | TCP | 80 | Appliance claim |
Agent(s) CIDR- network subnet range for the agent(s) | Appliance | TCP | 443 | Agent updates, agent routing, log collection |
Agent(s) CIDR- network subnet range for the agent(s) | Appliance | TCP | 7777 | Agent data transport (between agent and appliance on local network) |
208.71.209.32/27 | Appliance | TCP | 22 | Optional and temporary- required for troubleshooting during provisioning only |
204.110.218.96/27 | Appliance | TCP | 22 | Optional and temporary- required for troubleshooting during provisioning only |
204.110.219.96/27 | Appliance | TCP | 22 | Optional and temporary- required for troubleshooting during provisioning only |
Appliance outbound
Source | Destination | Protocol | Port | Description |
---|---|---|---|---|
Appliance | 8.8.4.4 | TCP/UDP | 53 | DNS |
Appliance | 8.8.8.8 | TCP/UDP | 53 | DNS |
Appliance | 0.0.0.0/0 | TCP | 80 | Appliance updates |
Appliance | 204.110.218.96/27 | TCP | 443 | Updates |
Appliance | 204.110.219.96/27 | TCP | 443 | Updates |
Appliance | 208.71.209.32/27 | TCP | 443 | Updates |
Appliance | 208.71.209.32/27 | TCP | 4138 | Event transport |
Appliance | 204.110.218.96/27 | TCP | 4138 | Event transport |
Appliance | 204.110.219.96/27 | TCP | 4138 | Event transport |
Appliance | 204.110.219.96/27 | UDP | 123 | NTP, time sync |
Appliance | 208.71.209.32/27 | UDP | 123 | NTP, time sync |
Agent outbound
Source | Destination | Protocol | Port | Description |
---|---|---|---|---|
Protected host | 208.71.209.32/27 | TCP | 443 | Agent updates (direct) |
Protected host | 204.110.218.96/27 | TCP | 443 | Agent updates (direct) |
Protected host | 204.110.219.96/27 | TCP | 443 | Agent updates (direct) |
Protected host | Appliance | TCP | 443 | Agent updates (single point egress) |
Protected host | Appliance | TCP | 7777 | Agent data transport (between agent and appliance on local network) |
European Union firewall rules
Use the following rules to communicate with the EU Data Center.
Appliance inbound
Source | Destination | Protocol | Port | Description |
---|---|---|---|---|
Agent(s) CIDR- network subnet range for the agent(s) | Appliance | TCP | 443 | Agent updates |
Agent(s) CIDR- network subnet range for the agent(s) | Appliance | TCP | 7777 | Agent data transport (between agent and appliance on local network) |
0.0.0.0/0 | Appliance | TCP | 80 | Appliance claim |
185.54.124.0/24 | Appliance | TCP | 22 | Optional and temporary- required for troubleshooting during provisioning only |
Appliance outbound
Source | Destination | Protocol | Port | Description |
---|---|---|---|---|
Appliance | 185.54.124.0/24 | TCP | 443 | Updates |
Appliance | 185.54.124.0/24 | TCP | 4138 | Event transport |
Appliance | 8.8.8.8 | TCP/UDP | 53 | DNS |
Appliance | 8.8.4.4 | TCP/UDP | 53 | DNS |
Appliance | 0.0.0.0/0 | TCP | 80 | Appliance updates |
Appliance | 185.54.124.0/24 | UDP | 123 | NTP, time sync |
Agent outbound
Source | Destination | Protocol | Port | Description |
---|---|---|---|---|
Protected host | Appliance | TCP | 7777 | Agent data transport (between agent and appliance on local network) |
Protected host | 185.54.124.0/24 | TCP | 443 | Agent updates (direct) |
Protected host | Appliance | TCP | 443 | Agent updates (single point egress) |
Virtual appliance requirements
Virtual appliance sizing
Use the following information to determine your virtual machine size requirements.
Throughput calculation
Use the following calculation to get the Threat Manager virtual appliance throughput requirements. The result of this calculation will provide you with the information you need to determine the correct instance type size to select during the installation procedure.
To calculate throughput requirements:
- Identify each virtual server that Threat Manager will protect.
- For the first virtual server to protect:
- Log in to the Microsoft Azure portal.
- Select Virtual Machines from the left navigation area.
- Click the virtual server name in the list.
- Click Monitor.
- Identify the Total utilization for Network In and Network Out.
- Add these numbers together. This is the networking utilization for the first virtual server.
- Complete these steps for each virtual server you want protected by Threat Manager.
- Once you have the total networking utilization calculated for each virtual server, add these numbers together. This is the estimated throughput requirement for your Threat Manager virtual appliance. Select your instance type size based on this calculation.
Instance type sizes
Threat Manager runs on select compute instance types in the Microsoft Azure environment ranging from A1 (1 core, 1.75 GB memory) to A4 (8 cores, 14 GB memory).
Instance type | Cores | Memory (GB) |
Throughput without scanning |
Throughput with scanning |
---|---|---|---|---|
A1 | 1 | 1.75 | 30 Mbps |
This instance type does not support scanning. |
A2 | 2 | 3.5 | 150 Mbps |
This instance type does not support scanning. |
A3 | 4 | 7 | 300 Mbps | 150 Mbps |
A4 | 8 | 14 | 1 Gbps | 825 Mbps |
Microsoft Azure endpoints
All virtual machines you create in Microsoft Azure use a private network channel to automatically communicate with other virtual machines in the same virtual network. However, to allow inbound network traffic from Alert Logic, you must add endpoints and Access Control List (ACL) entries to your virtual machine.
For more information, see Microsoft's documentation about endpoints.
Create the following endpoints and ACL entries for Threat Manager in Microsoft Azure.
Endpoint | ACL entry | Protocol | Description |
---|---|---|---|
22 | 204.110.219.96/27 | SSH | Secure shell (Alert Logic primary data center) |
22 | 204.110.218.96/27 | SSH | Secure shell (Alert Logic DR data center) |
80 | n/a | HTTP | Appliance claim (temporary) |
Microsoft Azure virtual networks
Threat Manager appliances and agents must be located in the same virtual network. Since each virtual network is run as an overlay, only virtual machines and services that are part of the same network can access each other. Services outside the virtual network have no way to identify or connect to services hosted within virtual networks, unless specific endpoints are added for external Internet sources.
Virtual appliance
The following table describes the basic system requirements to install a Threat Manager virtual appliance:
Components | System Requirements |
---|---|
CPU | 4 virtual CPUs |
RAM | 8 GB |
Disk space | 40 GB minimum |
Supported virtual environment | VMware only |
Log collection support | N/A |
Encryption | TLS Standard (SSL): 1024–2048bit key encryption, 256bit AES bulk encryption |
This is the recommended basic configuration for the Threat Manager product when deployed on a virtual appliance. Bandwidth volume directly impacts the ability of the appliance to inspect traffic. Therefore, high traffic environments may require a virtual machine with additional processor and memory resources.
If you want to run scans, consider 8 virtual CPUs (cores) and 16 GB of memory.
Alert Logic agent
The following table describes the basic requirements to install the agent:
Components | System requirements |
---|---|
Operating systems | For Windows users:
For Linux users: Debian (.deb)
Ubuntu (.deb)
CentOS (.rpm)
Red Hat Enterprise Linux (.rpm)
SUSE
Amazon Linux The Alert Logic agent can be used in AWS Workspaces in conjunction with a supported operating system. |
Memory | 96 MB of available memory |
Disk space for agent | 30 MB of available disk space |
Disk space for local cache | 500 MB of available disk space |
Packet access | WinPcap 4.1.2 |
CPU Utilization | 1-10% depending on log volume |
RAM | 15 MB minimum |
Disk space | 30 MB minimum |
Log collection support | Windows, Flat File |
Supported environments | Agent-only deployments with virtual and physical appliances, VPC, and Public Clouds |
Encryption | TLS Standard (SSL): 2048-bit key encryption, 256-bit AES bulk encryption |
Log collection frequency | At minimum, every five minutes logs are collected and sent to Alert Logic Cloud |
Host permissions | LocalSystem account has all the necessary permissions by default |
Operating systems and browser support
The Alert Logic console supports the current version and the previous major version of the following operating systems and browsers:
Operating system support | Browser support |
---|---|
Mac, Linux, and Windows | Chrome, Safari, Firefox, Opera, and Internet Explorer |
Alert Logic cannot guarantee that other browsers and versions will work with its products.