CISCO 742 Secure Network Analytics Installation Guide
- June 15, 2024
- Cisco
Table of Contents
- 742 Secure Network Analytics
- Product Information
- Specifications
- Introduction
- Product Usage Instructions
- Installation Methods
- Compatibility
- Downloading Software
- Configuration Requirements
- Installing the Virtual Appliance
- Q: What are the system requirements for running the Cisco
- Q: How can I download the installation files for the Virtual
- Q: What network configurations are required for inter-Data Node
742 Secure Network Analytics
Product Information
Specifications
-
Product Name: Cisco Secure Network Analytics Virtual Edition
Appliance -
Version: 7.4.2
Introduction
The Cisco Secure Network Analytics Virtual Edition Appliance is
a software-based network analytics solution. It provides advanced
monitoring and analysis features for network traffic. This
installation guide will help you install and configure the
appliance to ensure optimal performance and functionality.
Product Usage Instructions
Installation Methods
The Cisco Secure Network Analytics Virtual Edition Appliance can
be installed using VMware or KVM virtualization platforms. Choose
the appropriate installation method based on your environment.
Compatibility
Ensure that your system meets the compatibility requirements for
running the Cisco Secure Network Analytics Virtual Edition
Appliance. Check the system requirements provided by Cisco to
ensure a smooth installation process.
Downloading Software
Before starting the installation, make sure to download the
necessary software files from Cisco Software Central. Log in to the
portal and download the installation files for the Virtual Edition
Appliance.
Configuration Requirements
During the installation process, you will need to configure
various settings to ensure proper communication and functionality
of the appliance. These settings include:
- Firewall configuration
- Open ports and protocols
- Network configurations for inter-Data Node communications
- Monitoring configurations for traffic analysis
Installing the Virtual Appliance
To install the Cisco Secure Network Analytics Virtual Edition
Appliance, follow these steps:
-
Log in to your virtualization platform (VMware vCenter or
KVM). -
Configure the necessary network settings, such as isolated LAN
for inter-Data Node communications. -
Download the Virtual Edition installation files from Cisco
Software Central. -
Follow the installation instructions provided by Cisco for your
specific virtualization platform (VMware or KVM). -
Configure the appliance settings during the installation
process, including host name, domain name, NTP server, and time
zone. -
Complete the installation and verify the functionality of the
Virtual Edition Appliance.
FAQ
Q: What are the system requirements for running the Cisco
Secure Network Analytics Virtual Edition Appliance?
A: The system requirements vary based on the virtualization
platform used. Please refer to the compatibility guide provided by
Cisco for detailed system requirements.
Q: How can I download the installation files for the Virtual
Edition Appliance?
A: To download the installation files, log in to Cisco Software
Central using your Cisco account credentials. Navigate to the
appropriate product section and download the Virtual Edition
installation files.
Q: What network configurations are required for inter-Data Node
communications?
A: Depending on your virtualization platform, you will need to
configure either a vSphere Standard Switch or a vSphere Distributed
Switch to enable communication between Data Nodes. Please refer to
the installation guide for detailed instructions.
Cisco Secure Network Analytics
Virtual Edition Appliance Installation Guide 7.4.2
Table of Contents
Introduction
6
Overview
6
Audience
6
Installing Appliances and Configuring Your System
6
Related Information
6
Terminology
7
Abbreviations
7
Secure Network Analytics without Data Store
9
Secure Network Analytics with Data Store
10
Queries
11
Data Store Storage and Fault Tolerance
11
Telemetry Storage Example
12
General Deployment Requirements
13
Installation Methods
13
Compatibility
14
General Requirements for All Appliances
14
VMware
14
KVM
15
Downloading Software
15
TLS
15
Third Party Applications
16
Browsers
16
Host Name
16
Domain Name
16
NTP Server
16
Time Zone
16
Standard Appliance Requirements (without Data Store)
17
Manager and Flow Collector Deployment Requirements
17
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
-2-
Data Store Deployment Requirements
18
Appliance Requirements (with Data Store)
18
Manager and Flow Collector Deployment Requirements
18
Data Node Deployment Requirements
18
Multi-Data Node Deployment
19
Supported Hardware Metrics (with Analytics enabled)
20
Supported Hardware Metrics (without Analytics enabled)
20
Single Data Node Deployment
20
Data Node Configuration Requirements
21
Networking and Switching Considerations
21
Virtual Switch Example
23
Data Store Placement Considerations
23
Analytics Deployment Requirements
24
Resource Requirements
25
CPU Settings Calculation
26
Manager Virtual Edition
27
Manager
27
Flow Collector Virtual Edition
28
Flow Collector without Data Store
28
Flow Collector with Data Store
29
Data Node Virtual Edition
30
Data Store with a Single Virtual Data Node
30
Data Store with 3 Virtual Data Nodes
31
Flow Sensor Virtual Edition
32
Flow Sensor Virtual Edition Network Environments
34
Flow Sensor Virtual Edition Traffic
34
UDP Director Virtual Edition
35
Calculating Flows Per Second (Optional)
36
Calculating Flows Per Second for Flow Collector Storage (Deployments without
Data Store)
36
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
-3-
Calculating Flows Per Second for Data Node Storage
36
1. Configuring Your Firewall for Communications
38
Open Ports (All Appliances)
38
Additional Open Ports for Data Nodes
38
Communication Ports and Protocols
39
Additional Open Ports for Data Store
41
Optional Communication Ports
42
Secure Network Analytics Deployment Example
43
Secure Network Analytics Deployment with Data Store Example
44
2. Downloading Virtual Edition Installation Files
45
Installation Files
45
1. Log in to Cisco Software Central
45
2. Download Files
46
3a. Installing a Virtual Appliance using VMware vCenter (ISO)
47
Overview
47
Before You Begin
47
Installing a Virtual Appliance Using vCenter (ISO)
48
Data Nodes
48
Flow Sensors
48
All Other Appliances
48
1. Configuring an Isolated LAN for inter-Data Node Communications
49
Configuring a vSphere Standard Switch
49
Configuring a vSphere Distributed Switch
49
2. Configuring the Flow Sensor to Monitor Traffic
49
Monitoring External Traffic with PCI Pass-Through
50
Monitoring a vSwitch with Multiple Hosts
51
Configuration Requirements
51
Monitoring a vSwitch with a Single Host
54
Configuration Requirements
54
Configure the Port Group to Promiscuous Mode
54
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
-4-
3. Installing the Virtual Appliance
57
4. Defining Additional Monitoring Ports (Flow Sensors only)
64
3b. Installing a Virtual Appliance on an ESXi Stand-Alone Server (ISO)
67
Overview
67
Before You Begin
67
Installing a Virtual Appliance on an ESXi Stand-Alone Server (ISO)
68
Process Overview
68
Data Nodes
68
1. Logging in to the VMware Web Client
68
2. Booting from the ISO
71
3c. Installing a Virtual Appliance on a KVM Host (ISO)
73
Overview
73
Before You Begin
73
Installing a Virtual Appliance on a KVM Host (ISO)
74
Process Overview
74
Configuring an Isolated LAN for Data Nodes
74
1. Installing a Virtual Appliance on a KVM Host
74
Monitoring Traffic
74
Configuration Requirements
74
Installing a Virtual Appliance on a KVM Host
75
2. Adding NIC (Data Node, Flow Sensor) and Promiscuous Port Monitoring on an
Open vSwitch (Flow Sensors Only)
81
4. Configuring Your Secure Network Analytics System
84
System Configuration Requirements
84
SNA Contacting Support
87
Change History
89
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
-5-
Introduction
Introduction
Overview
Use this guide to install the following Cisco Secure Network Analytics
(formerly Stealthwatch) Virtual Edition appliances:
l Cisco Secure Network Analytics Manager (formerly Stealthwatch Management
Console) Virtual Edition
l Cisco Secure Network Analytics Data Store Virtual Edition l Cisco Secure
Network Analytics Flow Collector Virtual Edition l Cisco Secure Network
Analytics Flow Sensor Virtual Edition l Cisco Secure Network Analytics UDP
Director Virtual Edition
Audience
The intended audience for this guide includes network administrators and other
personnel who are responsible for installing and configuring Secure Network
Analytics products. If you are configuring virtual appliances, we assume you
have basic familiarity with VMware or KVM. If you prefer to work with a
professional installer, please contact your local Cisco Partner or Cisco
Support.
Installing Appliances and Configuring Your System
Please note the overall workflow for installing and configuring Secure Network
Analytics.
1. Install Appliances: Install your Secure Network Analytics Virtual Edition
appliances using this installation guide. To install hardware (physical)
appliances, follow the instructions in the x2xx Series Hardware Appliance
Installation Guide or the x3xx Series Hardware Appliance Installation Guide.
2. Configure Secure Network Analytics: After you install hardware and virtual
appliances, you are ready to configure Secure Network Analytics into a managed
system. Follow the instructions in the Secure Network Analytics System
Configuration Guide v7.4.2.
Related Information
For more information about Secure Network Analytics, refer to the following
resources:
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
-6-
Introduction
l Overview:
https://www.cisco.com/c/en/us/products/security/stealthwatch/index.html
l Data Store Design Guide:
https://www.cisco.com/c/dam/en/us/products/collateral/security/stealthwatch/st
ealthwatch-data-store-guide.pdf
Terminology
This guide uses the term “appliance” for any Secure Network Analytics product,
including virtual products such as the Flow Sensor Virtual Edition (VE).
A “cluster” is your group of Secure Network Analytics appliances that are
managed by the Manager.
Abbreviations
The following abbreviations may appear in this guide:
Abbreviations Definition
DNS
Domain Name System (Service or Server)
dvPort
Distributed Virtual Port
ESX
Enterprise Server X
GB
Gigabyte
IDS
Intrusion Detection System
IPS
Intrusion Prevention System
ISO
International Standards Organization
IT
Information Technology
KVM
Kernel-based Virtual Machine
MTU
Maximum Transmission Unit
NTP
Network Time Protocol
TB
Terabyte
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
-7-
Abbreviations Definition
UUID
Universally Unique Identifier
VDS
vNetwork Distributed Switch
VLAN
Virtual Local Area Network
VM
Virtual Machine
Introduction
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
-8-
Secure Network Analytics without Data Store
Secure Network Analytics without Data Store
In a Secure Network Analytics deployment without a Data Store, one or more
Flow Collectors ingests and deduplicates data, performs analysis, and reports
data and results directly to the Manager. To resolve user-submitted queries,
including graphs and charts, the Manager queries all of the managed Flow
Collectors. Each Flow Collector returns matching results to the Manager. The
Manager collates the information from the different result sets, then
generates a graph or chart displaying the results. In this deployment, each
Flow Collector stores data on a local database. See the following diagram for
an example.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
-9-
Secure Network Analytics with Data Store
Secure Network Analytics with Data Store
In a Secure Network Analytics deployment with a Data Store, the Data Store
cluster sits between your Manager and Flow Collectors. One or more Flow
Collectors ingests and deduplicates flows, performs analysis, and reports data
and results directly to the Data Store, distributing it roughly equally to all
of the Data Nodes. The Data Store facilitates data storage, keeps all of your
traffic in that centralized location as opposed to spread across multiple Flow
Collectors, and it offers greater storage capacity than multiple Flow
Collectors. See the following diagram for an example.
The Data Store provides a central repository to store your network’s telemetry, collected by your Flow Collectors. The Data Store is comprised of a cluster of Data Nodes, each containing a portion of your data, and a backup of a separate Data Node’s data. Because all of your data is in one centralized database, as opposed to spread across multiple Flow Collectors, your Manager can retrieve query results from the Data Store more quickly than if it queried all of your Flow Collectors separately. The Data Store cluster provides
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 10 –
Secure Network Analytics with Data Store
improved fault tolerance, improved query response, and quicker graph and chart
population.
Queries
To resolve user-submitted queries, including graphs and charts, the Manager
queries the Data Store. The Data Store finds matching results in the columns
relevant to the query, then retrieves the matching rows and returns the query
results to the Manager. The Manager generates the graph or chart without
needing to collate multiple result sets from multiple Flow Collectors. This
reduces the cost of querying, as compared to querying multiple Flow
Collectors, and improves query performance.
Data Store Storage and Fault Tolerance
The Data Store collects data from Flow Collectors and distributes it equally
across Data Nodes within the cluster. Each Data Node, in addition to storing a
portion of your overall telemetry, also stores a backup of another Data Node’s
telemetry. Storing data in this fashion:
l helps with load balancing l distributes processing across each node l
ensures all data ingested into the Data Store has a backup for fault tolerance
l allows for increasing the number of Data Nodes to improve overall storage
and
query performance
If your Data Store has 3 or more Data Nodes, and a Data Node goes down, as
long as the Data Node containing its backup is still available, and at least
half of your total number of Data Nodes are still up, the overall Data Store
remains up. This allows you time to repair the downed connection or faulty
hardware. After you replace the faulty Data Node, the Data Store restores that
node’s data from the existing backup stored on the adjacent Data Node, and
creates a backup of data on that Data Node.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 11 –
Secure Network Analytics with Data Store
Telemetry Storage Example
See the following diagram for an example of how 3 Data Nodes store telemetry:
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 12 –
General Deployment Requirements
General Deployment Requirements
Before you begin, review this guide to understand the process as well as the
preparation, time, and resources you’ll need to plan for the installation.
Installation Methods
You can use a VMware environment or KVM (Kernel-based Virtual Machine) for the
virtual appliance installation.
Before you start the installation, review the Compatibility information and
Resource Requirements shown in the following sections.
Method
Installation Instructions (for reference)
Installation File
Details
VMware vCenter
3a. Installing a Virtual Appliance using VMware vCenter (ISO)
Installing your virtual
ISO
appliances using VMware
vCenter.
VMware ESXi Stand-Alone Server
3b. Installing a Virtual Appliance on an ESXi StandAlone Server (ISO)
Installing your virtual
ISO
appliances on an ESXi
stand-alone host server.
KVM and Virtual Machine Manager
3c. Installing a Virtual Appliance on a KVM Host (ISO)
Installing your virtual
ISO
appliances using KVM and
Virtual Machine Manager.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 13 –
General Deployment Requirements
Compatibility
Whether you plan to install your virtual appliances in a VMware environment or
KVM (Kernel-based Virtual Machine), make sure you review the following
compatibility information:
General Requirements for All Appliances
Requirement Description
Dedicated Resources
All appliances require the allocation of dedicated resources and cannot be shared with other appliances or hosts.
No Live Migration
Appliances do not support vMotion due to the possibility of corruption.
Network Adapter
All appliances require at least 1 network adapter.
Flow Sensors can be configured with additional adapters to support additional
throughput.
Data Nodes require a second network adapter for communication with other Data
Nodes as part of the Data Store.
Storage Controller
When configuring the ISO in VMware, select the LSI Logic SAS SCSI Controller type.
Storage Provisioning
Assign Thick Provisioned Lazy Zeroed storage provisioning when deploying virtual appliances.
VMware
l Compatibility: VMware 7.0 or 8.0.
l Operating System: Debian 11 64-bit
l Network Adapter: The VMXNET3 Adapter Type is recommended for best
performance.
l ISO Deployment: Secure Network Analytics v7.4.2 is compatible with VMware
7.0 and 8.0. We do not support VMware 6.0, 6.5 ,or 6.7 with Secure Network
Analytics v7.4.x. For more information, refer to VMware documentation for
vSphere 6.0, 6.5 ,and 6.7 End of General Support.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 14 –
General Deployment Requirements
l Live migration: We do not support host to host live migration (for example,
with vMotion).
l Snapshots: Virtual machine snapshots are not supported.
Do not install VMware Tools on a Secure Network Analytics virtual appliance
because it will override the custom version already installed. Doing so would
render the virtual appliance inoperable and require reinstallation.
KVM
l Compatibility: You can use any compatible Linux distribution. l KVM Host
Versions: There are several methods used to install a virtual machine on
a KVM host. We tested KVM and validated performance using the following
components:
l libvirt 2.10 – 7.1.0 l qemu-KVM 2.6.1 – 5.2.0 l Open vSwitch 2.6.x –
2.15.x**** l Linux Kernel 4.4.x, and some 5.10.x l Operating System: Debian 11
64-bit. l Virtualization Host: For minimum requirements and best performance,
review the Resource Requirements section and see the hardware specification
sheet for your appliance at Cisco.com.
The system performance is determined by the host environment. Your performance
may vary.
Downloading Software
Use Cisco Software Central to download virtual appliance (VE) installation
files, patches, and software update files. Log in to your Cisco Smart Account
at https://software.cisco.com or contact your administrator. Refer to 2.
Downloading Virtual Edition Installation Files for instructions.
TLS
Secure Network Analytics requires v1.2.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 15 –
General Deployment Requirements
Third Party Applications
Secure Network Analytics does not support installing third party applications
on appliances.
Browsers
l Compatible Browsers: Secure Network Analytics supports the latest version of
Chrome, Firefox, and Edge.
l Microsoft Edge: There may be a file size limitation with Microsoft Edge. We
do not recommend using Microsoft Edge to install the Virtual Edition ISO
files.
Host Name
A unique host name is required for each appliance. We cannot configure an
appliance with the same host name as another appliance. Also, make sure each
appliance host name meets the Internet standard requirements for Internet
hosts.
Domain Name
A fully qualified domain name is required for each appliance. We cannot
install an appliance with an empty domain.
NTP Server
l Configuration: At least 1 NTP server is required for each appliance. l
Problematic NTP: Remove the 130.126.24.53 NTP server if it is in your list of
servers. This server is known to be problematic and it is no longer supported
in our default list of NTP servers.
Time Zone
All Secure Network Analytics appliances use Coordinated Universal Time (UTC).
l Virtual Host Server: Make sure your virtual host server is set to the
correct time.
Make sure the time setting on the virtual host server (where you will be
installing the virtual appliances) is set to the correct time. Otherwise, the
appliances may not be able to boot up.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 16 –
General Deployment Requirements
Standard Appliance Requirements (without Data Store)
If you are installing Secure Network Analytics without a Data Store, install
the following appliances:
Appliance Manager Flow Collector UDP Director Flow Sensor
Requirement l Minimum of 1 Manager l Minimum of 1 Flow Collector
Optional Optional
To review appliance installation requirements for Secure Network Analytics
with a Data Store, refer to Data Store Deployment Requirements.
Manager and Flow Collector Deployment Requirements
For each Manager and Flow Collector that you deploy, assign a routable IP
address to the eth0 management port.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 17 –
Data Store Deployment Requirements
Data Store Deployment Requirements
To deploy Secure Network Analytics with a Data Store, review the following
requirements and recommendations for your deployment.
Appliance Requirements (with Data Store)
The following table provides an overview for the appliances required to deploy
Secure Network Analytics with Data Store.
Appliance Requirement
Manager
l Minimum of 1 Manager
Data Store
l Minimum of 1 or 3 Data Nodes
l Additional sets of 3 Data Nodes to expand the Data Store, maximum of 36 Data
Nodes
l Deploying only 2 Data Nodes in a cluster is not supported.
Flow Collector
l Minimum of 1 Flow Collector
Flow Sensor Optional
Manager and Flow Collector Deployment Requirements
For each Manager and Flow Collector that you deploy, assign a routable IP
address to the eth0 management port.
Data Node Deployment Requirements
Each Data Store is comprised of Data Nodes.
l Virtual Edition: When you download a virtual Data Store, you can deploy 1,
3, or more Data Nodes Virtual Edition (in sets of 3).
l Hardware: You can also install hardware Data Nodes. A DN 6300 Data Store
provides a single Data Node hardware chassis.
Make sure your Data Nodes are all hardware or all Virtual Edition. Mixing hardware and virtual Data Nodes is not supported and hardware must be from the same hardware generation (all DS 6200 or all DN 6300).
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 18 –
Data Store Deployment Requirements
Multi-Data Node Deployment
A multi-Data Node deployment provides maximum performance results. Note the
following:
l Sets of Three: The Data Nodes can be clustered as part of your Data Store in
sets of 3, from a minimum of 3 to a maximum of 36. Deploying only 2 Data Nodes
in a cluster is not supported.
l All Hardware or All Virtual: Make sure your Data Nodes are all hardware (of
the same generation) or all Virtual Edition. Mixing hardware and virtual Data
Nodes or mixing Data Store 6200 and Data Node 6300 Data Nodes is not
supported.
l Data Node Profile Size: If you deploy Virtual Edition Data Nodes, make sure
they are all the same profile size so they have the same RAM, CPU, and disk
space. For details, refer to Data Node Virtual Edition in the Resource
Requirements section.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 19 –
Data Store Deployment Requirements
Supported Hardware Metrics (with Analytics enabled)
Number of Nodes Flows Per Second Unique Internal Hosts
1
600,000
1.3 million
3 and above
600,000
1.3 million
3 and above
850,000
700,000
These recommendations consider only telemetry. Your performance may vary
depending on additional factors, including host count, Flow Sensor use,
traffic profiles, and other network characteristics. Contact Cisco Support for
assistance with sizing.
Supported Hardware Metrics (without Analytics enabled)
Number of Nodes 1 3 and above
Flows Per Second Up to 1 million Up to 3 million
Unique Internal Hosts Up to 33 million Up to 33 million
These numbers are generated in our test environments using average customer
data with 1.3 million unique hosts. There are several factors that may affect
your specific performance, such as number of hosts, average flow size, and
more. Contact Cisco Support for assistance with sizing.
Single Data Node Deployment
If you choose to deploy a single (1) Data Node:
l Flow Collectors: A maximum of 4 Flow Collectors are supported. l Adding Data
Nodes: If you deploy only one Data Node, you can add Data Nodes to
your deployment in the future. Refer to Multi-Data Node Deployment for
details.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 20 –
Data Store Deployment Requirements
These recommendations consider only telemetry. Your performance may vary depending on additional factors, including host count, Flow Sensor use, traffic profiles, and other network characteristics. Contact Cisco Support for assistance with sizing.
Currently, the Data Store does not support deploying spare Data Nodes as
automatic replacements if a primary Data Node goes down. Contact Cisco Support
for guidance.
Data Node Configuration Requirements
To deploy a Data Store, assign the following to each Data Node. The
information you prepare will be configured in First Time Setup using the
System Configuration Guide.
l Routable IP Address (eth0): For management, ingest, and query communications
with your Secure Network Analytics appliances.
l Inter-Data Node Communications: Configure a non-routable IP address from the
169.254.42.0/24 CIDR block within a private LAN or VLAN to be used for
interData Node communication.
For improved throughput performance, connect the port channel containing eth2
and eth3 Ensure that each Data Node can reach every other Data Node through a
virtual switch or isolated network. As part of the Data Store, your Data Nodes
communicate between and among each other.
l Network Connections: You need two network connections, one for the
management, ingest, and query communications, and one for the inter-Data Node
communications.
Networking and Switching Considerations
The following table provides an overview for the networking and switching
considerations for deploying Secure Network Analytics with a Data Store.
Network Consideration
Inter-Data Node Communications
Description
l Configure an isolated LAN with a virtual switch so that the Data Nodes can
communicate with each other.
l Establish a recommended round-trip time (RTT) latency of under 200
microseconds between and among Data Nodes
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 21 –
Data Store Deployment Requirements
Data Node Switching
Secure Network Analytics Appliance Communications
l Keep clock skew at 1 second or lower between and among your Data Nodes.
l Establish a recommended throughput of 6.4Gbps or greater (10 Gbps full
duplex switched connection) between and among your Data Nodes.
l Data Nodes require their own Layer 2 VLAN to allow interData Node
communication. Virtual Data Nodes can be connected to an isolated network,
depending on how you deploy your Data Nodes VE.
l Manager and Flow Collectors must be able to reach all Data Nodes
l Data Nodes must be able to reach Manager, all Flow Collectors, and each Data
Node
Currently, the Data Store does not support deploying spare Data Nodes as automatic replacements if a primary Data Node goes down. Please contact Cisco Support for guidance.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 22 –
Data Store Deployment Requirements
Virtual Switch Example
To enable inter-Data Node communications over eth1, configure a virtual switch
with an isolated LAN or VLAN for inter-Data Node communications. Dedicate the
virtual switch to inter-Data Node communications. Also configure a public LAN
or VLAN for Data Nodes eth0 communications with the Manager and Flow
Collectors. See the following diagram for an example:
The Data Store cluster requires a continuous heartbeat between nodes within
the isolated VLAN. Without this heartbeat, Data Nodes may potentially go
offline, which increases the risk of the Data Store going down.
Contact Cisco Professional Services for assistance with planning your
deployment.
Data Store Placement Considerations
Place each Data Node so that it can communicate with all of your Flow
Collectors, your Manager, and every other Data Node. For best performance,
colocate your Data Nodes and Flow Collectors to minimize communication
latency, and colocate Data Nodes and Manager for optimum query performance.
l Firewall: We highly recommend placing the Data Nodes within your firewall,
such as within a NOC.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 23 –
Data Store Deployment Requirements
l Physical Host/Hypervisor: For ease of configuration, deploy all of your Data
Nodes Virtual Edition to the same physical host/hypervisor, to simplify
configuration of inter-Data Node configuration over an isolated LAN.
l Power: If the Data Store goes down due to loss of power or hardware failure,
you run an increased risk of data corruption and data loss. Install your Data
Nodes with constant uptime in mind.
If a Data Node loses power unexpectedly, and you reboot the appliance, the
database instance on that Data Node may not automatically restart. Refer to
the System Configuration Guide for troubleshooting and manually restarting the
database.
Analytics Deployment Requirements
Secure Network Analytics uses dynamic entity modeling to track the state of
your network. In the context of Secure Network Analytics, an entity is
something that can be tracked over time, such as a host or endpoint on your
network. Dynamic entity modeling gathers information about entities based on
the traffic they transmit and activities they perform on your network. For
more information, refer to the Analytics: Detections, Alerts, and Observations
Guide. In order to enable Analytics, your deployment must be configured
l on a Virtual or a Hardware Data Store deployment with any number of Flow
Collectors.
l with only 1 Secure Network Analytics Data Store domain.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 24 –
Resource Requirements
Resource Requirements
This section provides the resource requirements for the virtual appliances.
Use the tables provided in this section to record settings you will need to
install and configure the Secure Network Analytics Virtual Edition appliances.
l Manager Virtual Edition l Flow Collector Virtual Edition l Data Node Virtual
Edition l Flow Sensor Virtual Edition l UDP Director Virtual Edition l
Calculating Flows Per Second (Optional)
Make sure you reserve the required resources for your system. This step is
critical for system performance.
If you choose to deploy Cisco Secure Network Analytics appliances without the
required resources, you assume the responsibility to closely monitor your
appliance resource utilization and increase resources as needed to ensure
proper health and function of the deployment.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 25 –
Resource Requirements
The gigabyte or GB references in the following tables is defined as follows: A
unit of information equal to 2 raised to the 30th power, or strictly
1,073,741,824 bytes.
CPU Settings Calculation
For maximum performance when reserving CPUs on EXSi hosts, ensure that in your
CPU Settings, the Reservation setting for CPU frequency uses the following
calculation:
For more information, refer to 3b. Installing a Virtual Appliance on an ESXi StandAlone Server (ISO).
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 26 –
Resource Requirements
Manager Virtual Edition
To determine the minimum resource allocations for the Manager Virtual Edition,
determine the number of concurrent users expected to log in to the Manager.
Refer to the following specifications to determine your resource allocations:
Manager
Concurrent Users*
Required Reserved CPUs
up to 9
6
over 10
12
Required Reserved Memory
40 GB
70 GB
Required Minimum Storage
200 GB
480 GB
Flows per Internal
second
Hosts
Up to 100,000
Over 100,000
100,000 250,000
*Concurrent users include scheduled reports and people using the Manager client at the same time.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 27 –
Resource Requirements
Flow Collector Virtual Edition
To determine your resource requirements for the Flow Collector Virtual
Edition, make sure you calculate the flows per second expected on the network
and the number of exporters and hosts it is expected to monitor. Refer to the
Calculating Flows Per Second section for details.
Also, the minimum storage space may increase based on your FPS calculation and
your retention requirements.
Because the Data Nodes within a Data Store will store flows instead of the
Flow Collectors, make sure you refer to the specifications for your planned
deployment (without Data Store or with Data Store).
Flow Collector without Data Store
Flows per second
Required Reserved CPUs
Required Reserved Memory
Required Minimum Data Storage for 30 Days
Interfaces
Exporters
Internal Hosts
Up to 10,000
2
24 GB
600 GB
Up to 65535
Up to 1024 25,000
Up to 30,000
6
32 GB
900 GB
Up to 65535
Up to 1024 100,000
Up to 60,000
8
64 GB
1.8 TB
Up to 65535
Up to 2048 250,000
Up to 120,000
12
128 GB
3.6 TB
Up to 65535
Up to 4096
over 250,000
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 28 –
Resource Requirements
Flow Collector with Data Store
Flows per second
Required Reserved CPUs
Required Reserved Memory
Required Minimum Storage
Interfaces
Exporters
Internal Hosts
Up to 10,000
2
24 GB
200 GB
Up to 65535
Up to 1024 25,000
Up to 30,000
6
32 GB
200 GB
Up to 65535
Up to 1024 50,000
Up to 60,000
8
64 GB
200 GB
Up to 65535
Up to 2048 100,000
Up to 120,000
12
128 GB
200 GB
Up to 65535
Up to 4096 250,000
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 29 –
Resource Requirements
Data Node Virtual Edition
Review the following information to calculate resource requirements for the
Data Node Virtual Edition.
l Calculate Flows Per Second: Determine the flows per second expected on the
network. Refer to the Calculating Flows Per Second section for details.
l Number of Data Nodes: You can deploy 1 Data Node or 3 or more Data Nodes (in
sets of 3). For details, refer to Appliance Requirements (with Data Store).
Based on your Flows Per Second calculations, refer to the following
specifications to determine your resource requirements:
Data Store with a Single Virtual Data Node
Flows per second
Required Reserved CPUs
Up to 30,000 6
Up to 60,000 6
Up to 120,000
12
Up to 225,000
18
Required Reserved Memory 32 GB 32 GB
32 GB
64 GB
Required Minimum Storage for Single Data Node for 30 Days of Retention 2.25 TB
4.5 TB
9 TB
18 TB
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 30 –
Resource Requirements
Data Store with 3 Virtual Data Nodes
Flows per second
Required Reserved CPUs
Required Reserved Memory
Required Minimum Storage for each Data Node for 30 Days of Retention
Required Minimum Storage for 3 Data Node Data Store for 30 Days of Retention
Up to 30,000
6
32 GB
1.5 TB per Data Node
4.5 TB total for Data Store
Up to 60,000
6
32 GB
3 TB per Data Node 9 TB total for Data Store
Up to 120,000
12
32 GB
6 TB per Data Node
18 TB total for Data Store
Up to 220,000
18
64 GB
10 TB per Data Node*
30 TB total for Data Store*
Up to 500,000
18
64 GB
15 TB per Data Node*
45 TB total for Data Store*
- At scale Data Store optimizations are applied to reduce linear growth of telemetry
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 31 –
Resource Requirements
Flow Sensor Virtual Edition
This section describes the Flow Sensor Virtual Edition.
l Cache: The Flow Cache Size column indicates the maximum number of active
flows that the Flow Sensor can process at the same time. The cache adjusts
with the amount of reserved memory, and flows are flushed every 60 seconds.
Use the Flow Cache Size to calculate the amount of memory needed for the
amount of traffic being monitored.
l Requirements: Your environment may require more resources depending on a
number of variables, such as average packet size, burst rate, and other
network and host conditions.
NICs monitoring ports
Required Reserved CPUs
Required Minimum Reserved Memory
Required Minimum Data Storage
1 x 1 Gbps 2
4 GB
75 GB
Estimated Throughput
Flow Cache
Size (maximum number of concurrent flows)
850 Mbps
32,766
1,850 Mbps
2 x 1 Gbps 4
8 GB
75 GB
Interfaces configured as PCI passthrough (igb/ixgbe compliant or e1000e compliant)
65,537
3,700 Mbps
4 x 1 Gbps 8
16 GB
75 GB
Interfaces configured as PCI passthrough
131,073
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 32 –
Resource Requirements
NICs monitoring ports
Required Reserved CPUs
Required Minimum Reserved Memory
Required Minimum Data Storage
Estimated Throughput
Flow Cache
Size (maximum number of concurrent flows)
(igb/ixgbe compliant or e1000e compliant)
8 Gbps
1 x 10 Gbps* 12
24 GB
75 GB
Interfaces configured as PCI passthrough (Intel ixgbe/i40e compliant)
~512,000
16 Gbps
2 x 10 Gbps* 22
40 GB
75 GB
Interfaces configured as PCI passthrough (Intel ixgbe/i40e compliant)
~1,000,000
*For 10 Gbps throughput, configure all CPUs in 1 socket. For each additional 10 Gbps NIC, add 10 vCPUs and 16 GB of RAM.
Optional: One or more 10G NICs may be used on the physical VM host.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 33 –
Resource Requirements
Flow Sensor Virtual Edition Network Environments
Before installing the Flow Sensor Virtual Edition, make sure you know the type
of network environment you have. This guide covers all types of network
environments that a Flow Sensor Virtual Edition can monitor.
Compatibility: Secure Network Analytics supports a VDS environment, but it
does not support VMware Distributed Resource Scheduler (VM-DRS).
Virtual Network Environments: The Flow Sensor Virtual Edition monitors the
following types of virtual network environments:
l A network with virtual local area network (VLAN) trunking l Discrete VLANs
where one or more VLANs are prohibited from attaching packet
monitoring devices (for example, due to local policy) l Private VLANs l
Hypervisor hosts rather than VLANs
Flow Sensor Virtual Edition Traffic
The Flow Sensor will process traffic with the following Ethertypes:
Ethertype 0x8000 0x86dd 0x8909 0x8100 0x88a8 0x9100 0x9200 0x9300 0x8847 0x8848
Protocol Normal IPv4 Normal IPv6 SXP VLAN
VLAN QnQ
MLPS unicast MLPS multicast
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 34 –
Resource Requirements
The Flow Sensor saves the top-level MPLS label or VLAN ID and exports it. It
bypasses the other labels when it is processing packets.
UDP Director Virtual Edition
The UDP Director Virtual Edition requires that the virtual machine meets the
following specifications. Also, the minimum storage space may increase based
on your FPS calculation and your retention requirements.
Required Reserved CPU
Required Reserved Memory
Minimum Data Storage
Maximum FPS Rate
2
4 GB
75 GB
10,000
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 35 –
Resource Requirements
Calculating Flows Per Second (Optional)
If you want to calculate your resource requirements based on a different
storage amount than we have provided in the previous sections, you can use the
Flows per Second (FPS) calculations shown here.
Calculating Flows Per Second for Flow Collector Storage (Deployments without
Data Store)
If you deploy a Flow Collector (NetFlow) without a Data Store, calculate the
storage allocation as follows: [(daily average FPS/1,000) x 1.6 x days] l
Determine your daily average FPS l Divide this number by 1,000 FPS l Multiply
this number by 1.6 GB of storage for one day’s worth of storage l Multiply
this number by the number of days you want to store the flows for total
storage on the Flow Collector
For example, if your system:
l has 50,000 daily average FPS l will store flows for 30 days, calculate per
Flow Collector as follows:
[(50,000/1,000) x 1.6 x 30] = 7200 GB (7.2 TB)
l daily average FPS = 50,000 l 50,000 daily average FPS / 1,000= 50 l 50 x 1.6
GB = 80 GB for one day’s worth of storage l 80 GB x 30 days per Flow Collector
= 7200 GB per Flow Collector
Calculating Flows Per Second for Data Node Storage
If you deploy a Data Store Virtual Edition with 3 Data Nodes Virtual Edition,
we recommend that for each Data Node, calculate the storage allocation as
follows:
[[(daily average FPS/1,000) x 1.6 x days] / number of Data Nodes
l Determine your daily average FPS l Divide this number by 1,000 FPS l
Multiply this number by 1.6 GB of storage for one day’s worth of storage
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 36 –
Resource Requirements
l Multiply this number by the number of days you want to store the flows for
total Data Store storage
l Divide this number by the number of Data Nodes in your Data Store for
storage per Data Node
For example, if your system: l has 50,000 daily average FPS l will store flows
for 90 days, and l you have 3 Data Nodes
calculate per Data Node as follows: [(50,000/1,000) x 1.6 x 90] / 3 = 2400 GB
(2.4 TB) per Data Node
l daily average FPS = 50,000 l 50,000 daily average FPS / 1,000 = 50 l 50 x
1.6 GB = 80 GB for one day’s worth of storage l 80 GB x 90 days per Data Store
= 7200 GB per Data Store l 7200 GB / 3 Data Nodes = 2400 GB (2.4 TB) per Data
Node
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 37 –
1. Configuring Your Firewall for Communications
1. Configuring Your Firewall for Communications
In order for the appliances to communicate properly, you should configure the
network so that firewalls or access control lists do not block the required
connections. Use the information provided in this section to configure your
network so that the appliances can communicate through the network.
Open Ports (All Appliances)
Consult with your network administrator to ensure that the following ports are
open and have unrestricted access on your appliances (Managers, Flow
Collectors, Data Nodes, Flow Sensors, and UDP Directors):
l TCP 22 l TCP 25 l TCP 389 l TCP 443 l TCP 2393 l TCP 8910 l UDP 53 l UDP 123
l UDP 161 l UDP 162 l UDP 389 l UDP 514 l UDP 2055 l UDP 6343
Additional Open Ports for Data Nodes
In addition, if you deploy Data Nodes to your network, ensure that the
following ports are open and have unrestricted access:
l TCP 5433 l TCP 5444 l TCP 9450
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 38 –
1. Configuring Your Firewall for Communications
Communication Ports and Protocols
The following table shows how the ports are used in Secure Network Analytics:
From (Client) Admin User PC All appliances
To (Server) All appliances Network time source
Active Directory Manager
Cisco ISE
Manager
Cisco ISE
Manager
External log sources
Manager
Flow Collector
Manager
UDP Director
Manager
UDP Director
Flow Collector (sFlow)
UDP Director
Flow Collector (NetFlow)
UDP Director
3rd Party event management systems
Flow Sensor
Manager
Flow Sensor
Flow Collector (NetFlow)
NetFlow Exporters Flow Collector (NetFlow)
sFlow Exporters Flow Collector (sFlow)
Manager
UDP Director
Manager
Cisco ISE
Port TCP/443 UDP/123 TCP/389, UDP/389 TCP/443 TCP/8910
UDP/514
TCP/443 TCP/443 UDP/6343 UDP/2055
UDP/514
TCP/443 UDP/2055 UDP/2055 UDP/6343 TCP/443 TCP/443
Protocol HTTPS NTP
LDAP
HTTPS XMPP
SYSLOG
HTTPS HTTPS sFlow NetFlow
SYSLOG
HTTPS NetFlow NetFlow sFlow HTTPS HTTPS
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 39 –
1. Configuring Your Firewall for Communications
From (Client) Manager Manager Manager Manager Manager Manager Manager Manager User PC
To (Server) Cisco ISE DNS Flow Collector Flow Sensor Flow Exporters LDAP CRL Distribution Points OCSP responders Manager
Port TCP/8910 UDP/53 TCP/443 TCP/443 UDP/161 TCP/636 TCP/80 TCP/80 TCP/443
Protocol XMPP DNS HTTPS HTTPS SNMP TLS HTTP OCSP HTTPS
*This is the default port, but any UDP port could be configured on the exporter.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 40 –
1. Configuring Your Firewall for Communications
Additional Open Ports for Data Store
The following lists the communication ports to open on your firewall to deploy
the Data Store.
From (Client) To (Server)
Port
Protocol or Purpose
1 Manager
Flow Collectors and Data Nodes
22/TCP
SSH, required to initialize Data Store database
1 Data Nodes
all other Data Nodes
22/TCP
SSH, required to initialize Data Store database and for database administration tasks
Manager, Flow 2 Collectors, and NTP server
Data Nodes
123/UDP
NTP, required for time synchronization
2 NTP server
Manager, Flow Collectors, and Data Nodes
123/UDP
NTP, required for time synchronization
3 Manager
Flow Collectors and Data Nodes
443/TCP
HTTPS, required for secure communications between appliances
3 Flow Collectors Manager
443/TCP
HTTPS, required for secure communications between appliances
3 Data Nodes
Manager
443/TCP
HTTPS, required for secure communications between appliances
4
NetFlow Exporters
Flow Collectors – NetFlow
2055/UDP
NetFlow ingestion
5 Data Nodes
all other Data Nodes
4803/TCP
inter-Data Node messaging service
6 Data Node
all other Data
4803/UDP inter-Data Node messaging
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 41 –
1. Configuring Your Firewall for Communications
Nodes
service
7 Data Nodes
all other Data Nodes
4804/UDP
inter-Data Node messaging service
Manager, Flow 8 Collectors, and Data Nodes
Data Nodes
5433/TCP Vertica client connections
9 Data Node
all other Data Node
5433/UDP
Vertica messaging service monitoring
10
sFlow Exporters
Flow Collector (sFlow)
11 Data Nodes
all other Data Nodes
6343/UDP sFlow ingestion
6543/UDP
inter-Data Node messaging service
Optional Communication Ports
The following table is for optional configurations determined by your network
needs:
From (Client) To (Server)
Port
Protocol
All appliances User PC
TCP/22 SSH
Manager
3rd Party event management systems UDP/162 SNMP-trap
Manager
3rd Party event management systems UDP/514 SYSLOG
Manager
Email gateway
TCP/25 SMTP
Manager
Threat Feed
TCP/443 SSL
User PC
All appliances
TCP/22 SSH
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 42 –
1. Configuring Your Firewall for Communications
Secure Network Analytics Deployment Example
The following diagram shows the various connections used by Secure Network
Analytics. Some of these ports are optional.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 43 –
1. Configuring Your Firewall for Communications
Secure Network Analytics Deployment with Data Store Example
As shown in the figure below, you can strategically deploy Secure Network
Analytics appliances to provide optimal coverage of key network segments
throughout the network, whether in the internal network, at the perimeter, or
in the DMZ.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 44 –
2. Downloading Virtual Edition Installation Files
2. Downloading Virtual Edition Installation Files
Use the following instructions to download the ISO files for your virtual
appliance installation.
Installation Files
Virtual Machine 3a. VMware vCenter
Appliance Installation File
Details
ISO
Installing your virtual appliances using VMware vCenter.
3b. VMware ESXi Stand-Alone Server
ISO
3c. KVM and Virtual Machine Manager
ISO
Installing your virtual appliances on an ESXi stand-alone host server.
Installing your virtual appliances using KVM and Virtual Machine Manager.
1. Log in to Cisco Software Central
1. Log in to Cisco Software Central at https://software.cisco.com. 2. In the
Download and manage > Download and Upgrade section, select Access
downloads. 3. Scroll down until you see the Select a Product field. 4. You can
access Secure Network Analytics files in two ways:
l Search by Name: Type Secure Network Analytics in the Select a Product field.
Press Enter.
l Search by Menu: Click Browse All. Select Security > Network Visibility and
Segmentation > Secure Analytics (Stealthwatch).
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 45 –
2. Downloading Virtual Edition Installation Files
2. Download Files
1. Select an appliance type. l Secure Network Analytics Virtual Manager l
Secure Network Analytics Virtual Flow Collector l Secure Network Analytics
Virtual Flow Sensor l Secure Network Analytics Virtual UDP Director l Secure
Network Analytics Virtual Data Store
2. Select Secure Network Analytics System Software. 3. In the Latest Release
column, select 7.4.2 (or the version of 7.4.x that you are
installing). 4. Download: Locate the ISO installation file. Click the Download
icon or Add to Cart
icon. 5. Repeat these instructions to download the files for each appliance
type.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 46 –
3a. Installing a Virtual Appliance using VMware vCenter (ISO)
3a. Installing a Virtual Appliance using VMware vCenter (ISO)
Overview
Use the following instructions to install your virtual appliances using VMware
vCenter. To use an alternative method, refer to the following:
l VMware ESXi Stand-Alone Server: Use 3b. Installing a Virtual Appliance on an
ESXi Stand-Alone Server (ISO).
l KVM: Use 3c. Installing a Virtual Appliance on a KVM Host (ISO).
Secure Network Analytics v7.4.2 is compatible with VMware 7.0 or 8.0. We do
not support VMware 6.0, 6.5 ,or 6.7 with Secure Network Analytics v7.4.x. For
more information, refer to VMware documentation for vSphere 6.0, 6.5 ,and 6.7
End of General Support.
Before You Begin
Before you begin the installation, complete the following preparation
procedures:
1. Compatibility: Review the compatibility requirements in Compatibility. 2.
Resource Requirements: Review the Resource Requirements section to
determine the required allocations for the appliance. You can use a resource
pool or alternative method to allocate resources. 3. Firewall: Configure your
firewall for communications. Refer to 1. Configuring Your Firewall for
Communications. 4. Files: Download the appliance ISO files. Refer to 2.
Downloading Virtual Edition Installation Files for instructions. 5. Time:
Confirm the time set on the hypervisor host in your VMware environment (where
you will be installing the virtual appliance) shows the correct time.
Otherwise, the virtual appliances may not be able to boot up.
Do not install an untrusted physical or virtual machine on the same physical
cluster/system as your Secure Network Analytics appliances.
Do not install VMware Tools on a Secure Network Analytics virtual appliance
because it will override the custom version already installed. Doing so would
render the virtual appliance inoperable and require reinstallation.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 47 –
3a. Installing a Virtual Appliance using VMware vCenter (ISO)
Installing a Virtual Appliance Using vCenter (ISO)
If you have VMware vCenter (or similar), use the following instructions to
install a virtual appliance using the ISO. If you are deploying Data Nodes or
Flow Sensors, make sure you complete all required procedures.
Data Nodes
Complete the following procedures:
1. Configuring an Isolated LAN for inter-Data Node Communications. 3.
Installing the Virtual Appliance. When you install the Data Node virtual
appliance, you also need to install two network adapters.
Flow Sensors
Complete the following procedures:
2. Configuring the Flow Sensor to Monitor Traffic 3. Installing the Virtual
Appliance 4. Defining Additional Monitoring Ports (Flow Sensors only)
All Other Appliances
If the appliance is not a Data Node or Flow Sensor, complete the following
procedure:
3. Installing the Virtual Appliance
Some of the menus and graphics may vary from the information shown here.
Please refer to your VMware guide for details related to the software.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 48 –
3a. Installing a Virtual Appliance using VMware vCenter (ISO)
1. Configuring an Isolated LAN for inter-Data Node Communications
If you are deploying Data Nodes Virtual Edition to your network, configure an
isolated LAN with a virtual switch so that the Data Nodes can communicate with
each other over eth1 for inter-Data Node communication. There are two options
for configuring switches:
l Configuring a vSphere Standard Switch
l Configuring a vSphere Distributed Switch
Configuring a vSphere Standard Switch
1. Log into your VMware host environment. 2. Follow the VMware Create a
vSphere Standard Switch documentation for
configuring a vSphere Standard Switch. Note that in step 4, you will want to
choose the Virtual Machine Port Group for a Standard Switch option. 3. Go to
3. Installing the Virtual Appliance.
Configuring a vSphere Distributed Switch
1. Log into your VMware host environment. 2. Follow the VMware Create a
vSphere Distributed Switch documenation for
configuring a vSphere Distributed Switch. Note that for the number of uplinks
in step 5a, there is a requirement of at least 1 uplink, however it is not
necessary to configure an uplink unless you are distributing the nodes across
multiple hosts. If you need to distribute nodes across multiple hosts, contact
Cisco Support for assistance. 3. Go to 3. Installing the Virtual Appliance.
2. Configuring the Flow Sensor to Monitor Traffic
The Flow Sensor Virtual Edition has the ability to provide visibility into
VMware environments, generating flow data for areas that are not flow-enabled.
As a virtual appliance installed inside each hypervisor host, the Flow Sensor
Virtual Edition passively captures Ethernet frames from the host vSwitch, and
it observes and creates flow records containing valuable session statistics
that pertain to conversational pairs, bit rates, and packet rates.
You will need to install a Flow Sensor on each host within the environment you
want to monitor.
Use the following instructions to configure the Flow Sensor Virtual Edition to
monitor traffic on a vSwitch as follows:
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 49 –
3a. Installing a Virtual Appliance using VMware vCenter (ISO)
l Monitoring a vSwitch with Multiple Hosts l Monitoring a vSwitch with a
Single Host
Monitoring External Traffic with PCI Pass-Through
You can also configure your Flow Sensor Virtual Edition for direct network
monitoring using a compliant PCI pass-through.
l Requirements: igb/ixgbe compliant or e1000e compliant PCI pass-through. l
Resource Information: Refer to Flow Sensor Virtual Edition. l Integration:
Refer to 1. Configuring Your Firewall for Communications. l Instructions: To
add PCI network interfaces to the Flow Sensor Virtual Edition, refer
to your VMware documentation.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 50 –
3a. Installing a Virtual Appliance using VMware vCenter (ISO)
Monitoring a vSwitch with Multiple Hosts
Use the instructions in this section to use the Flow Sensor Virtual Edition to
monitor traffic on a Distributed vSwitch that spans multiple VM hosts or
clusters. This section applies only to VDS networks. If your network is in a
non-VDS environment, go to Monitoring a vSwitch with a Single Host.
Configuration Requirements
You will need to install a Flow Sensor on each host within the environment you
want to monitor. This configuration has the following requirements: l
Distributed Virtual Port (dvPort): Add a dvPort group with the correct VLAN
settings for each VDS that the Flow Sensor Virtual Edition will monitor. If
the Flow Sensor Virtual Edition monitors both VLAN and non-VLAN traffic on the
network, you need to create two dvPort groups, one for each type. l VLAN
Identifier: If your environment uses a VLAN (other than VLAN trunking or a
private VLAN), you need the VLAN identifier to complete this procedure. l
Promiscuous Mode: Enabled. l Promiscuous Port: Configured to the vSwitch.
Complete the following steps to configure the network using a VDS: 1. Click
the Networking icon.
2. In the Networking tree, right-click the VDS. 3. Select Distributed Port
Group > New Distributed Port Group.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 51 –
3a. Installing a Virtual Appliance using VMware vCenter (ISO)
4. Use the New Distributed Port Group dialog box to to configure the port
group, including the specifications in the following steps.
5. Select Name and Location: In the Name field, enter a name to identify this
dvPort group.
6. Configure Settings: In the Number of Ports field, enter the number of Flow
Sensor Virtual Editions in your cluster of hosts.
7. Click the VLAN type drop-down list.
l If your environment doesn’t use a VLAN, select None. l If your environment
uses a VLAN, select the VLAN type. Configure it as
follows:
VLAN
VLAN Type
Detail In the VLAN ID field, enter the number
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 52 –
3a. Installing a Virtual Appliance using VMware vCenter (ISO)
VLAN Trunking Private VLAN
(between 1 and 4094) that matches the identifier.
In the VLAN trunk range field, enter 0-4094 to monitor all VLAN traffic.
Select Promiscuous from the dropdown list.
8. Ready to Complete: Review the configuration settings. Click Finish. 9. In the Networking tree, right-click the new dvPort group. Select Edit Settings. 10. Select Security. 11. Click the Promiscuous Mode drop-down list. Select Accept.
12. Click OK to close the dialog box. 13. Does the Flow Sensor Virtual
Edition monitor both VLAN and non-VLAN network
traffic?
l If yes, repeat the steps in this section Monitoring a vSwitch with Multiple
Hosts.
l If no, continue to the next step.
14. Is there another VDS in the VMware environment that the Flow Sensor
Virtual Edition will monitor?
l If yes, repeat the steps in this section Monitoring a vSwitch with Multiple
Hosts for the next VDS.
15. Go to 3. Installing the Virtual Appliance.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 53 –
3a. Installing a Virtual Appliance using VMware vCenter (ISO)
Monitoring a vSwitch with a Single Host
Use the instructions in this section to use the Flow Sensor Virtual Edition to
monitor traffic on a vSwitch with a single host.
This section applies only to non-VDS networks. If your network uses a VDS, go
to Monitoring a vSwitch with Multiple Hosts.
Configuration Requirements
This configuration has the following requirements: l Promiscuous Port Group:
Add a promiscuous port group for each virtual switch that the Flow Sensor
Virtual Edition will be monitoring. l Promiscuous Mode: Enabled. l Promiscuous
Port: Configured to the vSwitch.
Configure the Port Group to Promiscuous Mode
Use the following instructions to add a port group, or edit a port group, and
set it to Promiscuous.
1. Log in to your VMware ESXi host environment. 2. Click Networking.
3. Select the Port groups tab. 4. You can create a new port group or edit a
port group.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 54 –
3a. Installing a Virtual Appliance using VMware vCenter (ISO)
l Create Port Group: Click Add port group. l Edit Port Group: Select the port
group. Click Edit Settings.
5. Use the dialog box to configure the port group. Configure the VLAN ID or
VLAN Trunking:
VLAN Type VLAN ID VLAN Trunking
Detail
Use VLAN ID to specify a single VLAN. In the VLAN ID field, enter the number
(between 1 and 4094) that matches the identifier.
Use VLAN Trunking to monitor all VLAN traffic. The range defaults to 0-4095.
6. Click the Security arrow.
7. Promiscuous Mode: Choose Accept.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 55 –
3a. Installing a Virtual Appliance using VMware vCenter (ISO)
8. Will the Flow Sensor Virtual Edition be monitoring another virtual switch
in this VMware environment?
If yes, go back to 2. Configuring the Flow Sensor to Monitor Traffic, and
repeat all the steps for the next virtual switch.
9. Go to 3. Installing the Virtual Appliance
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 56 –
3a. Installing a Virtual Appliance using VMware vCenter (ISO)
3. Installing the Virtual Appliance
Use the following instructions to install a virtual appliance on your
hypervisor host and define the virtual appliance management and monitoring
ports.
Some of the menus and graphics may vary from the information shown here.
Please refer to your VMware guide for details related to the software.
1. Log in to your VMware Web Client. 2. Locate the virtual appliance software
file (ISO) that you downloaded from Cisco
Software Central. 3. Make the ISO available in vCenter. You have the following
options:
l Upload the ISO to a vCenter datastore. l Add the ISO to a content library. l
Keep the ISO on your local workstation, and configure the deployment to
reference that file. See the VMware documentation for more information. 4.
From the vCenter UI, select Menu > Hosts and Clusters. 5. In the navigation
pane, right click a cluster or host and select New Virtual Machine… to access
the New Virtual Machine wizard. 6. From the Select a creation type window,
select Create a new virtual machine, then click Next.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 57 –
3a. Installing a Virtual Appliance using VMware vCenter (ISO)
7. From the Select a name and folder window, enter a Virtual machine name,
select a location for the virtual machine, then click Next.
8. From the Select a compute resource window, select a cluster, host,
resource pool, or vApp to which you will deploy the appliance, then click
Next.
9. From the Select storage window, select a VM Storage Policy from the drop- down, then select a storage location, then click Next.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 58 –
3a. Installing a Virtual Appliance using VMware vCenter (ISO)
10. From the Select compatibility window, select a virtual machine version from the Compatible with drop-down, based on your current deployed ESXi version. For example, the following screenshot shows ESXi 7.0 and later because ESXi 7.0 is deployed. Click Next.
11. From the Select a guest OS screen, select the Linux Guest OS Family and the Debian GNU/Linux 11 (64-bit) Guest OS Version. Click Next.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 59 –
3a. Installing a Virtual Appliance using VMware vCenter (ISO)
12. From the Customize hardware window, configure the virtual hardware. Refer
to Resource Requirements for specific recommendations for your appliance type.
This step is critical for system performance. If you choose to deploy Cisco
Secure Network Analytics appliances without the required resources, you assume
the responsibility to closely monitor your appliance resource utilization and
increase resources as needed to ensure proper health and function of the
deployment.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 60 –
3a. Installing a Virtual Appliance using VMware vCenter (ISO)
In addition to the resource requirements, make sure the following settings are
selected:
l Click New Hard disk to expand the configuration options. Select Thick
Provision Lazy Zeroed from the Disk Provisioning drop-down.
l Click New SCSI controller to expand the configuration options. Select LSI
Logic SAS from the Change Type drop-down. If you do not select LSI Logic SAS,
your virtual appliance may fail to properly deploy.
l In the New CD/DVD Drive field, select an ISO location based on where you
have stored the ISO. Click New CD/DVD Drive to expand the configuration
options. Check Connect At Power On.
l If the appliance is a Flow Sensor, and you are configuring 10 Gbps
throughput for the NIC, click CPU to expand the configuration options.
Configure all Cores per Socket so all CPUs are in one socket.
13. Data Nodes: If you are deploying a Data Node virtual appliance, also add
a second network adaptor.
Click Add New Device, then select Network Adapter and ensure the Adapter Type
is VMXNET3.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 61 –
3a. Installing a Virtual Appliance using VMware vCenter (ISO)
l For the first network adaptor, select a switch that will allow the Data Node
Virtual Edition to communicate on a public network with other appliances.
l For the second network adaptor, select the switch that you created in 1.
Configuring an Isolated LAN for inter-Data Node Communications that will allow
the Data Node Virtual Edition to communicate on a private network with other
Data Nodes.
Ensure that you properly assign the network adaptors and virtual switches for
every Data Node in your deployment as you deploy each Data Node.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 62 –
3a. Installing a Virtual Appliance using VMware vCenter (ISO)
14. From the Ready to complete window, review your settings, then click
Finish.
15. The deployment starts when you click the Power On icon. Monitor the
deployment progress in the Recent Tasks section. Make sure the deployment is
completed and shown in the Inventory tree before you go to the next steps.
16. Next Steps:
l Flow Sensors: If the appliance is a Flow Sensor and will be monitoring more
than one virtual switch in the VMware environment, or more than one VDS in a
cluster, continue with the next section 4. Defining Additional Monitoring
Ports (Flow Sensors only).
l All Other Appliances: Repeat all of the procedures in this section 3.
Installing the Virtual Appliance to deploy another virtual appliance.
17. If you have finished installing all virtual appliances in your system, go
to 4. Configuring Your Secure Network Analytics System.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 63 –
3a. Installing a Virtual Appliance using VMware vCenter (ISO)
4. Defining Additional Monitoring Ports (Flow Sensors only)
This procedure is required if the Flow Sensor Virtual Edition will be
monitoring more than one virtual switch in a VMware environment or more than
one VDS in a cluster.
If this is not the monitoring configuration for your Flow Sensor, you do not
need to complete this procedure. To add Flow Sensor Virtual Edition monitoring
ports, complete the following steps: 1. In the Inventory tree, right-click the
Flow Sensor Virtual Edition. Select Edit Settings.
2. Use the Edit Settings dialog box to configure the following specified settings. 3. Click Add New Device. Select Network Adapter.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 64 –
3a. Installing a Virtual Appliance using VMware vCenter (ISO)
4. Locate the new network adapter. Click the arrow to expand the menu, and
configure the following: l New Network: Select an unassigned promiscuous port
group. l Adapter Type: Select VMXNET 3. l Status: Check the Connect at Power
On check box.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 65 –
3a. Installing a Virtual Appliance using VMware vCenter (ISO)
5. After reviewing the settings, click OK. 6. Repeat this procedure to add
another Ethernet adapter as needed. 7. Next Steps:
l Flow Sensors: To configure another Flow Sensor, go to 2. Configuring the
Flow Sensor to Monitor Traffic.
l All Other Appliances: Repeat all of the procedures in this section 3.
Installing the Virtual Appliance to deploy another virtual appliance.
l If you have completed installing all virtual appliances in your system, go
to 4. Configuring Your Secure Network Analytics System.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 66 –
3b. Installing a Virtual Appliance on an ESXi Stand-Alone Server (ISO)
3b. Installing a Virtual Appliance on an ESXi Stand-Alone Server (ISO)
Overview
Use the following instructions to install your virtual appliances using a
VMware environment with an ESXi Stand-alone server.
Secure Network Analytics v7.4.2 is compatible with VMware v7.0 or 8.0. We do
not support VMware v6.0, v6.5, or v6.7 with Secure Network Analytics v7.4.x.
For more information, refer to VMware documentation for vSphere 6.0, 6.5, and
6.7 End of General Support.
To use an alternative method, refer to the following:
l VMware vCenter: Use 3a. Installing a Virtual Appliance using VMware vCenter
(ISO) .
l KVM: Use 3c. Installing a Virtual Appliance on a KVM Host (ISO).
Before You Begin
Before you begin the installation, complete the following preparation
procedures:
1. Compatibility: Review the compatibility requirements in Compatibility. 2.
Resource Requirements: Review the Resource Requirements section to
determine the required allocations for the appliance. You can use a resource
pool or alternative method to allocate resources. 3. Firewall: Configure your
firewall for communications. Refer to 1. Configuring Your Firewall for
Communications. 4. Files: Download the appliance ISO files. Refer to 2.
Downloading Virtual Edition Installation Files for instructions. 5. Time:
Confirm the time set on the hypervisor host in your VMware environment (where
you will be installing the virtual appliance) shows the correct time.
Otherwise, the virtual appliances may not be able to boot up.
Do not install an untrusted physical or virtual machine on the same physical
cluster/system as your Secure Network Analytics appliances.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 67 –
3b. Installing a Virtual Appliance on an ESXi Stand-Alone Server (ISO)
Do not install VMware Tools on a Secure Network Analytics virtual appliance
because it will override the custom version already installed. Doing so would
render the virtual appliance inoperable and require reinstallation.
Installing a Virtual Appliance on an ESXi Stand-Alone Server (ISO)
Use the following instructions to install your virtual appliances using a
VMware environment with an ESXi Stand-alone server.
Process Overview
Installing a virtual appliance involves completing the following procedures,
which are covered in this chapter:
1. Logging in to the VMware Web Client
2. Booting from the ISO
Data Nodes
If you are deploying Data Nodes, follow the instructions in the previous
section 1. Configuring an Isolated LAN for inter-Data Node Communications
before you complete the procedures in this section.
1. Logging in to the VMware Web Client
Some of the menus and graphics may vary from the information shown here.
Please refer to your VMware guide for details related to the software.
1. Log in to the VMware Web Client. 2. Click Create/Register a Virtual
Machine. 3. Use the New Virtual Machine dialog box to configure the appliance
as specified in
the following steps. 4. Select Creation Type: Select Create a New Virtual
Machine.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 68 –
3b. Installing a Virtual Appliance on an ESXi Stand-Alone Server (ISO)
5. Select a Name and Guest OS: Enter or select the following: l Name: Enter a
name for the appliance so you can identify it easily. l Compatibility: Select
the version you are using (v7.0 or 8.0). l Guest OS family: Linux. l Guest OS
version: Select Debian GNU/Linux 11 64-bit.
6. Select Storage: Select an accessible datastore. Review Resource
Requirements to confirm you have enough space.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 69 –
3b. Installing a Virtual Appliance on an ESXi Stand-Alone Server (ISO)
Review Resource Requirements to allocate sufficient resources. This step is
critical for system performance.
If you choose to deploy Cisco Secure Network Analytics appliances without the
required resources, you assume the responsibility to closely monitor your
appliance resource utilization and increase resources as needed to ensure
proper health and function of the deployment.
7. Customize Settings: Enter or select your appliance requirements (refer to
Resource Requirements for details).
Make sure you select the following:
l SCSI Controller: LSI Logic SAS l Network Adapter: Confirm the management
address for the appliance. l Hard Disk: Thick Provisioning Lazy Zeroed
If the appliance is a Flow Sensor, you can click Add Network Adapter to add
another management or sensing interface. If the appliance is a Flow Sensor,
and you are configuring 10 Gbps throughput for the NIC, click CPU to expand
the configuration options. Configure all all CPUs in one socket. If the
appliance is a Data Node, add another network interface to allow interData
Node communications. Click Add Network Adapter.
l For the first network adaptor, select a switch that will allow the Data Node
Virtual Edition to communicate on a public network with other appliances.
l For the second network adaptor, select the switch that you created in 1.
Configuring an Isolated LAN for inter-Data Node Communications that will allow
the Data Node Virtual Edition to communicate on a private network with other
Data Nodes.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 70 –
3b. Installing a Virtual Appliance on an ESXi Stand-Alone Server (ISO)
8. Click the arrow next to Network Adapter. 9. For the Adapter Type, select
VMXnet3.
While Cisco supports the use of E1000 (1G dvSwitch), 1G PCI-passthrough, and
VMXNET 3 interfaces, Cisco strongly recommends that you use the VMXNET3
interface as it has been proven to provide the best network performance for
Cisco virtual appliances.
10. Review your configuration settings and confirm they are correct.
11. Click Finish. A virtual machine container is created.
2. Booting from the ISO
1. Open the VMware console. 2. Connect the ISO to the new virtual machine.
Refer to the VMware guide for details. 3. Boot the virtual machine from the
ISO. It runs the installer and reboots automatically. 4. Once the installation
and reboot are completed, you will see the login prompt.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 71 –
3b. Installing a Virtual Appliance on an ESXi Stand-Alone Server (ISO)
5. Disconnect the ISO from the virtual machine. 6. Repeat all of the
procedures in 3b. Installing a Virtual Appliance on an ESXi
Stand-Alone Server (ISO) for the next virtual appliance. 7. Flow Sensors: If
the appliance is a Flow Sensor, finish the setup using the previous
sections of this manual:
l 2. Configuring the Flow Sensor to Monitor Traffic (use Monitoring a vSwitch
with a Single Host)
l If the Flow Sensor will be monitoring more than one virtual switch in the
VMware environment, or more than one VDS in a cluster, go to 4. Defining
Additional Monitoring Ports (Flow Sensors only).
8. If you have completed installing all virtual appliances in your system, go
to 4. Configuring Your Secure Network Analytics System.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 72 –
3c. Installing a Virtual Appliance on a KVM Host (ISO)
3c. Installing a Virtual Appliance on a KVM Host (ISO)
Overview
Use the following instructions to install your virtual appliances using KVM
and Virtual Machine Manager. To use an alternative method, refer to the
following:
l VMware vCenter: Use 3a. Installing a Virtual Appliance using VMware vCenter
(ISO) .
l VMware ESXi Stand-Alone Server: Use 3b. Installing a Virtual Appliance on an
ESXi Stand-Alone Server (ISO).
Linux KVM has been tested and validated on a number of KVM host versions.
Refer to KVM for a detailed list of the KVM components that we have tested and
validated for Secure Network Analytics versions 7.3.1 and above.
Before You Begin
Before you begin the installation, make sure you’ve completed the following
procedures:
1. Compatibility: Review the compatibility requirements in Compatibility. 2.
Resource Requirements: Review the Resource Requirements section to
determine the required allocations for the appliance. You can use a resource
pool or alternative method to allocate resources. 3. Firewall: Configure your
firewall for communications. Refer to 1. Configuring Your Firewall for
Communications. 4. Files: Download the appliance ISO files and copy them to a
folder on the KVM host. We use the following folder in the example provided in
this section: var/lib/libvirt/image. Refer to 2. Downloading Virtual Edition
Installation Files for instructions. 5. Time: Confirm the time set on the
hypervisor host in your VMware environment (where you will be installing the
virtual appliance) shows the correct time. Otherwise, the virtual appliances
may not be able to boot up.
Do not install an untrusted physical or virtual machine on the same physical
cluster/system as your Secure Network Analytics appliances.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 73 –
3c. Installing a Virtual Appliance on a KVM Host (ISO)
Installing a Virtual Appliance on a KVM Host (ISO)
If you have a KVM host, use the following instructions to install a virtual
appliance using the ISO.
Process Overview
Installing a virtual appliance involves completing the following procedures,
which are covered in this chapter:
Configuring an Isolated LAN for Data Nodes
1. Installing a Virtual Appliance on a KVM Host
2. Adding NIC (Data Node, Flow Sensor) and Promiscuous Port Monitoring on an
Open vSwitch (Flow Sensors Only)
Configuring an Isolated LAN for Data Nodes
If you are deploying Data Nodes Virtual Edition to your network, configure an
isolated LAN with a virtual switch so that the Data Nodes can communicate with
each other over eth1 for inter-Data Node communication. See your virtual
switch’s documentation for more information on creating an isolated LAN.
1. Installing a Virtual Appliance on a KVM Host
There are several methods to install a virtual machine on a KVM host using a
ISO file. The following steps give one example for installing a virtual
Manager through a GUI tool called Virtual Machine Manager running on a Ubuntu
box. You can use any compatible Linux distribution. For compatibility details,
refer to Compatibility.
Monitoring Traffic
The Flow Sensor Virtual Edition has the ability to provide visibility into KVM
environments, generating flow data for areas that are not flow-enabled. As a
virtual appliance installed inside each KVM host, the Flow Sensor Virtual
Edition passively captures Ethernet frames from traffic it observes and
creates flow records containing valuable session statistics that pertain to
conversational pairs, bit rates, and packet rates.
Configuration Requirements
This configuration has the following requirements:
l Promiscuous Mode: Enabled. l Promiscuous Port: Configured to an open
vSwitch.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 74 –
3c. Installing a Virtual Appliance on a KVM Host (ISO)
We recommend that you use virt-manager 2.2.1 to install a virtual appliance on
a KVM host.
Installing a Virtual Appliance on a KVM Host
To install a virtual appliance, and enable the Flow Sensor Virtual Edition to
monitor traffic, complete the following steps:
1. Use Virtual Machine Manager to connect to the KVM Host and configure the
appliance as specified in the following steps.
2. Click File > New Virtual Machine.
3. Select QEMU/KVM for your connection, and then select Local install media
(ISO image or CDROM). Click Forward.
4. Click Browse to select the appliance image.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 75 –
3c. Installing a Virtual Appliance on a KVM Host (ISO)
5. Select the ISO file. Click Choose Volume. Confirm the ISO file is
accessible by the KVM Host.
6. Deselect the “Automatically detect from the installation media/source”
checkbox. Under Choose an operating system type and version, begin typing
“Debian” and select the Debian 11 (debian 11) option that appears. Click
Forward.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 76 –
3c. Installing a Virtual Appliance on a KVM Host (ISO)
7. Increase the Memory (RAM) and CPUs to the amount shown in the Resource
Requirements section. Review Resource Requirements to allocate sufficient
resources. This step is critical for system performance. If you choose to
deploy Cisco Secure Network Analytics appliances without the required
resources, you assume the responsibility to closely monitor your appliance
resource utilization and increase resources as needed to ensure proper health
and function of the deployment.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 77 –
3c. Installing a Virtual Appliance on a KVM Host (ISO)
8. Select Create a disk image for the virtual machine. 9. Enter the data
storage amount shown for the appliance in the Resource
Requirements section. Click Forward.
Review Resource Requirements to allocate sufficient resources. This step is
critical for system performance.
If you choose to deploy Cisco Secure Network Analytics appliances without the
required resources, you assume the responsibility to closely monitor your
appliance resource utilization and increase resources as needed to ensure
proper health and function of the deployment.
10. Assign a Name for the virtual machine. This will be the display name, so
use a name that will help you find it later.
11. Check the Customize configuration before install check box. 12. In the
Network selection drop-down box, select the applicable network and port
group for installation.
Data Nodes: If this is a Data Node, select a network and port group that will
allow the Data Node to communicate on a public network with other appliances.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 78 –
3c. Installing a Virtual Appliance on a KVM Host (ISO)
13. Click Finish. The configuration menu opens.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 79 –
3c. Installing a Virtual Appliance on a KVM Host (ISO)
14. In the navigation pane, select NIC. 15. Under Virtual Network Interface,
select e1000 in the Device model drop-down box.
Click Apply.
16. Click VirtIO Disk 1. 17. In the Advanced Options drop-down list, select
SCSI in the Disk bus drop-down
box. Click Apply. 18. Do you need to add additional NICS for monitoring ports
on the Flow Sensor Virtual
Edition, or to enable inter-Data Node communications on a Data Node VE?
l If yes, go to 2. Adding NIC (Data Node, Flow Sensor) and Promiscuous Port
Monitoring on an Open vSwitch (Flow Sensors Only).
l If no, go to the next step.
19. Click Begin Installation. 20. Go to 4. Configuring Your Secure Network
Analytics System.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 80 –
3c. Installing a Virtual Appliance on a KVM Host (ISO)
2. Adding NIC (Data Node, Flow Sensor) and Promiscuous Port Monitoring on an
Open vSwitch (Flow Sensors Only)
To add additional NICs for the Flow Sensor Virtual Edition monitoring ports or
Data Node Virtual Edition and to complete the installation, complete the
following steps:
1. In the Configuration Menu, click Add Hardware. The Add New Virtual
Hardware dialog box displays.
2. In the left navigation pane, click Network.
If this is a Data Node, select a network and port group that will allow the
Data Node to communicate on a public network with other appliances.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 81 –
3c. Installing a Virtual Appliance on a KVM Host (ISO)
3. Flow Sensors: If this is a Flow Sensor, click the Portgroup drop-down list
to select an unassigned promiscuous port group you want to monitor. Click the
Device Model drop-down list to select e1000. Data Nodes: If this is a Data
Node, select a network source that will allow for interData Node communication
on an isolated LAN, using the configuration that you created in Configuring an
Isolated LAN for Data Nodes.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 82 –
3c. Installing a Virtual Appliance on a KVM Host (ISO)
4. Click Finish. 5. If you need to add another monitoring port, repeat these
instructions. 6. After you have added all monitoring ports, click Begin
Installation.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 83 –
4. Configuring Your Secure Network Analytics System
4. Configuring Your Secure Network Analytics System
If you’ve finished installing your Virtual Edition appliances and/or hardware
appliances, you are ready to configure Secure Network Analytics into a managed
system.
To configure Secure Network Analytics, follow the instructions in the Secure
Network Analytics System Configuration Guide v7.4.2. This step is critical for
the successful configuration and communication of your system.
Make sure you configure your appliances in the order specified in the System
Configuration Guide.
System Configuration Requirements
Make sure you have access to the appliance console through the hypervisor host
(virtual machine host). Use the following table to prepare the required
information for each appliance.
Configuration Requirement
Details
Appliance
IP Address
Assign a routable IP address to the eth0 management port.
Netmask
Gateway
Host Name
A unique host name is required for each appliance. We cannot configure an appliance with the same host name as another appliance. Also, make sure each appliance host name meets the Internet standard requirements for Internet hosts.
Domain Name
A fully qualified domain name is required for each appliance. We cannot install an appliance with an empty domain.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 84 –
4. Configuring Your Secure Network Analytics System
DNS Servers
Internal DNS server for name resolution
NTP Servers
Internal Time server for synchronization between servers. At least 1 NTP
server is required for each appliance.
Remove the 130.126.24.53 NTP server if it is in your list of servers. This
server is known to be problematic and it is no longer supported in our default
list of NTP servers.
Mail Relay Server
SMTP Mail server to send alerts and notifications
Flow Collector Export Port
Required for Flow Collectors only. NetFlow Default: 2055
Non-routable IP Address within a private LAN or VLAN (for inter-Data Node communication)
Required for Data Nodes only.
l Hardware eth2 or bond of eth2 and eth3. Creating an LACP eth2/eth3 bonded
port channel for up to 20G throughput enables faster communication between and
among Data Nodes, and quicker Data Node addition or replacement to the Data
Store. Note that LACP port bonding is the only bonding option available for
hardware Data Nodes.
l Virtual eth1
IP Address: You can use the provided IP address or enter a value that meets
the following requirements for inter-Data Node communications.
l Non-routable IP Address from the 169.254.42.0/24 CIDR block,
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 85 –
4. Configuring Your Secure Network Analytics System
between 169.254.42.2 and 169.254.42.254.
l First Three Octets: 169.254.42
l Subnet: /24
l Sequential: For ease of maintenance, select sequential IP addresses (such as
169.254.42.10, 169.254.42.11, and 169.254.42.12).
eth0 Hardware Connection Port
Netmask: The Netmask is hard coded to 255.255.255.0 and cannot be modified.
Required for Secure Network Analytics with Data Store hardware appliances
only:
l Manager l Flow Collector l Data Nodes
eth0 Hardware Connection Port Options:
l SFP+:
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 86 –
SNA Contacting Support
SNA Contacting Support
If you need technical support, please do one of the following: l Contact your
local Cisco Partner l Contact Cisco Support l To open a case by web:
http://www.cisco.com/c/en/us/support/index.html l To open a case by email:
tac@cisco.com l For phone support:
1-800-553-2447 (U.S.) l For worldwide
support numbers: https://www.cisco.com/c/en/us/support/web/tsd-cisco-
worldwide-contacts.html
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
– 87 –
Copyright Information
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco
and/or its affiliates in the U.S. and other countries. To view a list of Cisco
trademarks, go to this URL: https://www.cisco.com/go/trademarks. Third-party
trademarks mentioned are the property of their respective owners. The use of
the word partner does not imply a partnership relationship between Cisco and
any other company. (1721R)
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
Change History
Document Version
Published Date
Description
1_0
February 27, 2023
Initial version.
1_1
March 27, 2023
Updated the Communication Ports and Protocols table.
1_2
March 27, 2023
Corrected a typo.
Improved descriptions of VMware support. Removed
1_3
April 20, 2023
“Supported Hardware Metrics” table as this is a virtual guide. Improved descriptions of KVM host version
support.
1_4
August 15, 2023
Changed memory resource note from GB to GiB.
1_5
April 27, 2023
Added support for VMware 8.0. Revised Deployment recommendations.
© 2023 Cisco Systems, Inc. and/or its affiliates. All rights reserved.
References
- Support - Cisco Support and Downloads – Documentation, Tools, Cases - Cisco
- Create a vSphere Distributed Switch
- Create a vSphere Standard Switch
- Cisco Software Central
- Cisco Secure Network Analytics - Cisco
- Cisco Secure Network Analytics - Install and Upgrade Guides - Cisco
- Cisco Secure Network Analytics - Install and Upgrade Guides - Cisco
- Cisco Secure Network Analytics - Install and Upgrade Guides - Cisco
- Cisco Secure Network Analytics - Technical References - Cisco
- Cisco Worldwide Support Contacts - Cisco
- Cisco Trademarks - Cisco
Read User Manual Online (PDF format)
Read User Manual Online (PDF format) >>