Deploy the SMC
When the NGFW Engine launch is complete, deploy the SMC.
Before you begin
All configuration information for the NGFW Engines is stored on the Management Server component of the SMC. The NGFW Engines continue to operate normally even when the Management Server is unreachable, so there is no interruption to any network services.
To deploy the SMC on your own hardware, you must have a computer with a 64-bit Linux operating system, such as Ubuntu 16.04 LTS. For compatible operating systems, see the Forcepoint NGFW Security Management Center Release Notes .
If you deploy the SMC in an instance on AWS, we recommend using the M4.xlarge instance type. If the SMC manages a large number of NGFW Engines, the M4.2xlarge or M4.4xlarge instance types might provide improved performance. Use a 64-bit Linux operating system, such as Ubuntu 16.04 LTS, and a 64-bit JRE. For compatible operating systems, see the Forcepoint NGFW Security Management Center Release Notes .
Steps
-
If you deploy the SMC in an
instance on AWS, implement security groups for the instance to allow traffic only on the ports that the SMC uses.
Note: If the SMC is already behind a firewall that restricts access, it is not necessary to implement security groups for the instance in which the SMC runs.
-
To allow traffic on the necessary ports for system communication, add the following rules to the security group:
TCP ports UDP ports Direction Purpose 53 53 Outbound DNS queries 443 Outbound HTTPS connections to the Forcepoint NGFW update service for downloading dynamic update packages, engine upgrades, and licenses 3020 Inbound Alert sending from the Log Server and optional Web Portal Server. Log and alert messages from NGFW Engines. Monitoring of blacklists, connections, status, and statistics for NGFW Engines. 3021 Inbound Certificate requests or certificate renewal for system communications 3023 Inbound Status monitoring for the Log Server and the optional Web Portal Server 8914-8918 Inbound Log browsing connections from the Management Client to the Log Server. Database replication (push) to the Log Server, log browsing on the optional Web Portal Server. -
To allow traffic on ports for optional features, add the following rules for the optional features that you use:
TCP ports UDP ports Direction Purpose 389 Outbound External LDAP queries for display/editing users from external LDAP domains in the Management Client. This port is only needed if you store user information in external LDAP domains. 1812 Outbound RADIUS. Only needed if you use RADIUS to authenticate administrator logons to the Management Client. 514, 5514 514, 5514 Outbound Log data forwarding to syslog servers. Only needed if you forward data from the Log Server or Management Server to external syslog servers. 514, 5514 514, 5514 Inbound Syslog reception from third-party components. Only needed if you have configured monitoring of third-party devices. 8082 Inbound SMC API. Only needed if you have enabled the SMC API. 8083 Inbound Communication from SMC Web Access clients to the optional Web Portal Server. Only needed if you use the optional Web Portal Server and have enabled SMC Web Access. 8085 Inbound Communication from SMC Web Access clients to the Management Server. Only needed if you have enabled SMC Web Access. 8902-8913 Inbound and Outbound Database replication from the active Management Server to additional Management Servers for high availability. Only needed if you have configured multiple Management Servers for high availability. 8931 Outbound Connections from the Log Server to the Web Portal Server. Only needed if you have installed the optional Web Portal Server component of the SMC. 161 Outbound SNMP status probing to external IP addresses. Only needed if you have configured monitoring of third-party devices. 2055 Inbound NetFlow or IPFIX forwarding to third-party components. Only needed if you have configured monitoring of third-party devices. 162, 5162 Inbound SNMPv1 trap reception from third-party components. Only needed if you have configured monitoring of third-party devices.
-
To allow traffic on the necessary ports for system communication, add the following rules to the security group:
-
On the computer or instance where you want to deploy the SMC, open a terminal program, then enter the following command to copy the
SMC installation files from the NGFW Engine EC2 instance to the local
computer:
scp -p -i <your ssh private key>.pem aws@<aws instance public ip address>:/spool/<smc installation files>.zip .
The SMC installation files are included in the NGFW Engine instance.
-
Decompress the SMC installation files using compression utilities in your operating system.
For example:
unzip <smc installation files>.zip
- Navigate to the <smc installation files>/Forcepoint_SMC_Installer/Linux-x64 directory.
-
To start the SMC installation, enter the following command:
sudo ./setup.sh
- Install the SMC components.