Stealthwatch Virtual Edition (with Data Store) Appliance Installation Guide 7.3.2

Stealthwatch Virtual Edition (VE) Installation Guide

installation, v7.3, 7.3.2, SMC VE, Flow Collector VE, FCVE, Flow Sensor VE, UDP Director, Flow Replicator, Endpoint Concentrator, hardware, configuration, virtual installation

Cisco Systems, Inc.

Stealthwatch Virtual Edition (with Data Store) Appliance ...

Configuration Guide for full instructions on deploying Stealthwatch Virtual Edition. (VE) with a Data Store, including proper order of appliance deployment.

Instructions: To add PCI network interfaces to the Flow Sensor VE, refer to your. VMware documentation. © 2021 Cisco Systems, Inc. and/or its affiliates. All ...

PDF preview unavailable. Download the PDF instead.

SW 7 3 2 VE Appliance Data Store Install Guide DV 1 0
Cisco Stealthwatch
Virtual Edition (with Data Store) Appliance Installation Guide 7.3.2

Table of Contents

Introduction

6

Overview

6

Audience

6

Terminology

7

Abbreviations

7

Before You Begin

9

Installation and Configuration Order

9

First Time Setup

10

Data Store

10

Security Analytics and Logging (OP)

10

Installation Methods

11

Compatibility

12

General Requirements for All Appliances

12

VMware

12

KVM

13

Downloading Software

13

TLS

13

Third Party Applications

13

Browsers

14

Host Name

14

Domain Name

14

NTP Server

14

Time Zone

14

Resource Requirements

15

Stealthwatch Management Console VE

16

Stealthwatch Management Console

16

Flow Collector VE

17

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

-2-

Flow Collector with a Data Store

17

Data Node VE

18

Flow Sensor VE

20

Flow Sensor VE Network Environments

21

Flow Sensor VE Traffic

22

UDP Director VE

23

Data Storage

24

1. Configuring your Firewall and Ports

26

Overview

26

Placing the Appliances

26

Stealthwatch Management Console

26

Stealthwatch Flow Collector

26

Stealthwatch Flow Sensor

27

Important Considerations for Integration

27

TAPs

28

Using Electrical TAPs

28

Using Optical TAPs

29

Using TAPs Outside Your Firewall

29

Placing the Flow Sensor VE Inside Your Firewall

30

SPAN Ports

31

Stealthwatch UDP Director

32

Stealthwatch Data Node

32

Configuring Your Firewall for Communications

33

Open Ports

33

Stealthwatch Management Console (SMC), Flow Collector, Data Nodes,

Flow Sensor, and UDP Director

33

Communication Ports and Protocols

34

Optional Communication Ports

36

Stealthwatch Deployment Example

37

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

-3-

Stealthwatch Deployment with Data Store Example

38

2. Downloading VE Installation Files

41

Installation Files

41

1. Log in to Cisco Software Central

41

2. Download Files

42

3a. Installing a Virtual Appliance using VMware vCenter (ISO)

43

Overview

43

Before You Begin

43

Installing a Virtual Appliance Using vCenter (ISO)

45

Process Overview

45

1. Logging in to the VMware Web Client

45

2a. Configuring the Flow Sensor to Monitor Traffic

46

Monitoring External Traffic with PCI Pass-Through

46

Monitoring a vSwitch with Multiple Hosts

47

Configuration Requirements

47

Monitoring a vSwitch with a Single Host

50

Configuration Requirements

50

Configure the Port Group to Promiscuous Mode

50

2b. Configuring an Isolated LAN for inter-Data Node Communications

53

3. Installing the Virtual Appliance

54

4. Defining Additional Monitoring Ports (Flow Sensors only)

62

3b. Installing a Virtual Appliance on an ESXi Stand-Alone Server (ISO)

65

Overview

65

Before You Begin

65

Installing a Virtual Appliance on an ESXi Stand-Alone Server (ISO)

66

Process Overview

66

1. Logging in to the VMware Web Client

66

2. Booting from the ISO

69

3c. Installing a Virtual Appliance on a KVM Host (ISO)

71

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

-4-

Overview

71

Before You Begin

71

Installing a Virtual Appliance on a KVM Host (ISO)

73

Process Overview

73

Configuring an isolated LAN for Data Nodes

73

1. Installing a Virtual Appliance on a KVM Host

73

Monitoring Traffic

73

Configuration Requirements

74

Installing a Virtual Appliance on a KVM Host

74

2. Adding NIC (Data Node, Flow Sensor) and Promiscuous Port Monitoring on

an Open vSwitch (Flow Sensors Only)

80

4. Configuring your Environment using First Time Setup

83

Configuring a Stealthwatch Management Console or Flow Collector

83

Configuring a Data Node

88

Configuring a Flow Sensor or UDP Director

93

Troubleshooting

97

Certificate Error

97

Accessing the Appliance

97

5. Configuring your Stealthwatch System

99

Contacting Support

100

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

-5-

Introduction
Introduction
Overview
Use this guide to install the following Cisco Stealthwatch Enterprise Virtual Edition (VE) appliances:
l Stealthwatch Management Console (SMC) VE l Stealthwatch Flow Collector VE l Stealthwatch Data Node VE
l If you plan on deploying Data Nodes as part of a Data Store, review the Data Store Virtual Edition Deployment and Configuration Guide before you begin for full instructions on deploying the Data Store, including proper order of appliance installation. Use this guide only as a reference for virtual appliance installation.
l Stealthwatch Flow Sensor VE l Stealthwatch UDP Director VE
For more information about Stealthwatch, refer to the following online resources:
l Overview: https://www.cisco.com/c/en/us/products/security/stealthwatch/index.html
l Appliances: https://www.cisco.com/c/en/us/products/security/stealthwatch/datasheetlisting.html
l Release Notes: For details, refer to the Release Notes. l Hardware Installation Guides: To install Stealthwatch x2xx series hardware,
download the guides from https://www.cisco.com/c/en/us/support/security/stealthwatch/productsinstallation-guides-list.html. l Data Node and Data Store Installation: If you plan on deploying Data Nodes as part of a Data Store, review the Data Store Virtual Edition Deployment and Configuration Guide before you begin for complete instructions on deploying the Data Store, including proper order of appliance installation.
Audience
The intended audience for this guide includes network administrators and other personnel who are responsible for installing and configuring Stealthwatch products.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

-6-

Introduction

If you are configuring virtual appliances, we assume you have basic familiarity with VMware or KVM. If you prefer to work with a professional installer, please contact your local Cisco Partner or Cisco Stealthwatch Support.
Terminology
This guide uses the term "appliance" for any Stealthwatch product, including virtual products such as the Stealthwatch Flow Sensor Virtual Edition (VE). A "cluster" is your group of Stealthwatch appliances that are managed by the Stealthwatch Management Console (SMC).
Abbreviations
The following abbreviations may appear in this guide:

Abbreviations Definition

DNS

Domain Name System (Service or Server)

dvPort

Distributed Virtual Port

ESX

Enterprise Server X

GB

Gigabyte

IDS

Intrusion Detection System

IPS

Intrusion Prevention System

ISO

International Standards Organization

IT

Information Technology

KVM

Kernel-based Virtual Machine

MTU

Maximum Transmission Unit

NTP

Network Time Protocol

SMC

Stealthwatch Management Console

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

-7-

Abbreviations Definition

TB

Terabyte

UUID

Universally Unique Identifier

VDS

vNetwork Distributed Switch

VE

Virtual Edition

VLAN

Virtual Local Area Network

VM

Virtual Machine

Introduction

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

-8-

Before You Begin
Before You Begin
Before you begin, review this guide to understand the process as well as the preparation, time, and resources you'll need to plan for the installation.
Installation and Configuration Order
Before you install your virtual appliances, please note the required order for installing and configuring Stealthwatch.
1. Review Data Store Overview: Review the Data Store Virtual Edition Deployment Overview to understand basic prerequisite information for deploying Stealthwatch with a Data Store.
2. Install Virtual Appliances: Use the Data Store Virtual Edition Deployment and Configuration Guide for full instructions on deploying Stealthwatch Virtual Edition (VE) with a Data Store, including proper order of appliance deployment. Use this Virtual Edition (with Data Store) Appliance Installation Guide as reference for the virtual appliance installation.
3. Configure Stealthwatch: After you deploy your SMC VE, Data Nodes VE, and Flow Collectors VE, configure that appliance using the Stealthwatch System Configuration Guide v7.3.2 and the Data Store Virtual Edition Deployment and Configuration Guide.
Note the following:
l Configuration Order: Make sure you configure the appliances in order. l Certificates: Appliances are installed with a unique, self-signed appliance
identity certificate. l Central Management: Use the primary SMC/Central Manager to manage
your appliances and change configuration settings.
After you install your appliances, you will configure Stealthwatch using the Stealthwatch System Configuration Guide v7.3.2. This step is critical for the successful configuration and communication of your system.
4. Configure Data Store Initialization and Retention: After the SMC VE, Data Nodes VE, and Flow Collectors VE are deployed and configured in Stealthwatch, use the Data Store Virtual Edition Deployment and Configuration Guide to

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

-9-

Before You Begin
initialize the Data Store and configure flow interface statistics data retention. The guide also includes Data Store maintenance information.
First Time Setup
As part of the 4. Configuring your Environment using First Time Setup in this guide, you will configure your environment for a Data Store deployment. You can also choose to enable SAL On Prem.
After you make these selections in First Time Setup, you cannot change the configuration. If you select the wrong choice, deploy a new virtual appliance or RFD your virtual appliance.
Data Store
When you configure Stealthwatch with a Data Store in the First Time Setup, it is important to follow the instructions and note the following:
l SMC and Flow Collectors: You need to deploy the Data Store on your SMCs and Flow Collectors.
l Guide: Use the Data Store Virtual Edition Deployment and Configuration Guide for full instructions on deploying Stealthwatch with a Data Store, including proper order of appliance deployment, initializing the Data Store, and configuring data retention.
Security Analytics and Logging (OP)
You can choose to enable Security Analytics and Logging On Prem and use your Stealthwatch deployment to store Firepower event information. Note that this disables NetFlow collection on your Flow Collector.
l SMC and Flow Collectors: If you enable Security Analytics and Logging on your SMC, you must enable SAL on the Flow Collector.
l Guide: Refer to the Security Analytics and Logging: Firepower Event Integration Guide for more information.
l App Requirement: If you configure Security Analytics and Logging On Prem, install the Security Analytics and Logging On Prem App on your Stealthwatch Management Console.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 10 -

Before You Begin

Installation Methods
You can use a VMware environment or KVM (Kernel-based Virtual Machine) for the virtual appliance installation.
Before you start the installation, review the compatibility information and resource requirements.
Use the following table to choose an installation method. Also, make sure you review the compatibility and resource requirements before you start the installation.

Method

Installation Instructions (for reference)

Installation File

Details

VMware vCenter

3a. Installing a Virtual Appliance using VMware vCenter (ISO)

Installing your virtual

ISO

appliances using VMware

vCenter.

3b. Installing a

VMware ESXi

Virtual Appliance

Installing your virtual

Stand-Alone

ISO

appliances on an ESXi

Server

on an ESXi Stand-

stand-alone host server.

Alone Server (ISO)

KVM and Virtual Machine Manager

3c. Installing a Virtual Appliance on a KVM Host (ISO)

Installing your virtual

ISO

appliances using KVM and

Virtual Machine Manager.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 11 -

Before You Begin

Compatibility
Whether you plan to install your virtual appliances in a VMware environment or KVM (Kernel-based Virtual Machine), make sure you review the following compatibility information:
General Requirements for All Appliances

Requirement Description

Dedicated Resources

All appliances require the allocation of dedicated resources and cannot be shared with other appliances or hosts.

No Live Migration

Appliances do not support vMotion due to the possibility of corruption.

Network Adapter

All appliances require at least 1 network adapter.
Flow Sensors can be configured with additional adapters to support additional throughput.
Data Nodes require a second network adapter for communication with other Data Nodes as part of the Data Store.

Storage Controller

When configuring the ISO in VMware, select the LSI Logic SAS SCSI Controller type.

Storage Provisioning

Assign Thick Provisioned Lazy Zeroed storage provisioning when deploying virtual appliances.

VMware
l Compatibility: VMware v6.5, v6.7, v7.0. l Operating System: Debian 10 64-bit. l ISO Deployment: We validated VMware v6.5 using update 2 and the vSphere
flash-based web client. There may be issues using other clients from vSphere. You can use the ESXi 6.5 update 2 HTML5 client, but you may encounter system time-outs. l Live migration: We do not support host to host live migration (for example, with vMotion). l Snapshots: Virtual machine snapshots are not supported.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 12 -

Before You Begin
Do not install VMware Tools on a Stealthwatch virtual appliance because it will override the custom version already installed. Doing so would render the virtual appliance inoperable and require reinstallation.
KVM
l Compatibility: You can use any compatible Linux distribution. l KVM Host Versions: There are several methods used to install a virtual machine
on a KVM host. We tested KVM and validated performance using the following components:
l libvirt 3.0.0 - 6.5.0 l qemu-KVM 2.8.0 - 5.0.0 l Open vSwitch 2.6.1 - 2.13.0 l Linux Kernel 4.4.38 - 5.4.55 l Operating System: Debian 10 64-bit. l Virtualization Host: For minimum requirements and best performance, review the Resource Requirements section and see the hardware specification sheet for your appliance at Cisco.com.
The system performance is determined by the host environment. Your performance may vary.
Downloading Software
Use Cisco Software Central to download virtual appliance (VE) installation files, patches, and software update files. Log in to your Cisco Smart Account at https://software.cisco.com or contact your administrator. Refer to 2. Downloading VE Installation Files for instructions.
TLS
Stealthwatch requires v1.2.
Third Party Applications
Stealthwatch does not support installing third party applications on appliances.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 13 -

Before You Begin
Browsers
l Compatible Browsers: Stealthwatch supports the latest version of Chrome, Firefox, and Edge.
l Microsoft Edge: There may be a file size limitation with Microsoft Edge. We do not recommend using Microsoft Edge to install the VE ISO files.
Host Name
A unique host name is required for each appliance. We cannot configure an appliance with the same host name as another appliance. Also, make sure each appliance host name meets the Internet standard requirements for Internet hosts.
Domain Name
A fully qualified domain name is required for each appliance. We cannot install an appliance with an empty domain.
NTP Server
l Configuration: At least 1 NTP server is required for each appliance. l Problematic NTP: Remove the 130.126.24.53 NTP server if it is in your list of
servers. This server is known to be problematic and it is no longer supported in our default list of NTP servers.
Time Zone
All Stealthwatch appliances use Coordinated Universal Time (UTC). l Virtual Host Server: Make sure your virtual host server is set to the correct time.
Make sure the time setting on the virtual host server (where you will be installing the virtual appliances) is set to the correct time. Otherwise, the appliances may not be able to boot up.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 14 -

Resource Requirements
Resource Requirements
This section provides the resource requirements for the virtual appliances. Use the tables provided in this section to record settings you will need to install and configure the Stealthwatch VE appliances.
l Stealthwatch Management Console (SMC) l Flow Collector l Data Node l Flow Sensor l UDP Director l Data Storage
Make sure you reserve the required resources for your system. This step is critical for system performance.
If you choose to deploy Cisco Stealthwatch appliances without the required resources, you assume the responsibility to closely monitor your appliance resource utilization and increase resources as needed to ensure proper health and function of the deployment.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 15 -

Resource Requirements

Stealthwatch Management Console VE
To determine the minimum resource allocations for the Stealthwatch Management Console VE, you should determine the number of concurrent users expected to log in to the SMC. Refer to the following specifications to determine your resource allocations.
Stealthwatch Management Console

Concurrent Users*
up to 9 10 or more

Required Reserved Memory
32 GB
64 GB

Required Reserved CPUs
4
8

Minimum Storage Space
125 GB
200 GB

*Concurrent users include scheduled reports and people using the SMC client at the same time.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 16 -

Resource Requirements

Flow Collector VE
Because the Data Nodes within a Data Store will store flows instead of the Flow Collectors, the resource requirements are different depending on whether you deploy a Data Store.
Flow Collector with a Data Store

Flows per second

Interfaces

Exporters

Required Reserved Memory

Required Reserved CPUs

Required Minimum Data Storage

Up to

50,000

Up to 65535 Up to 2048 32 GB

6

200 GB

Up to

120,000 Up to 65535 Up to 4096 70 GB

8

200 GB

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 17 -

Resource Requirements
Data Node VE
If you plan on deploying Data Nodes as part of a Data Store, review the Data Store Installation and Configuration Guide before you begin for full instructions on initializing the Data Store, including proper order of appliance deployment.
To determine your resource requirements for the Data Node VE, you should determine the flows per second expected on the network. This also affects the resource requirements for your Flow Collectors VE. Refer to Flow Collector VE for more information on resource requirements. You can deploy only 3 Data Nodes VE to your network. You cannot deploy additional Data Nodes VE. If you deploy a Data Store VE with 3 Data Nodes VE, we recommend that for each Data Node, calculate the storage allocation as follows:
[[(daily average FPS/1,000) x 1.6 x days] / number of Data Nodes
l Determine your daily average (FPS) l Divide this number by 1,000 FPS l Multiply this number by 1.6 GB of storage for one day's worth of storage l Multiply this number by the number of days you want to store the flows for total
Data Store storage l Divide this number by the number of Data Nodes in your Data Store for
storage per Data Node
For example, if your system:
l has 50,000 daily average (FPS) l will store flows for 90 days, and l you have 3 Data Nodes calculate per Data Node as follows:
[(50,000/1,000) x 1.6 x 90] / 3 = 2400 GB (2.4 TB) per Data Node
l daily average FPS = 50,000 l 50,000 daily average FPS / 1,000= 50 l 50 x 1.6 GB = 80 GB for one day's worth of storage

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 18 -

Resource Requirements

l 80 GB x 90 days per Data Store = 7200 GB per Data Store l 7200 GB / 3 Data Nodes = 2400 GB (2.4 TB) per Data Node Refer to the following specifications to determine your resource requirements:

Flows per second

Required Reserved Memory

Required

Required Minimum Data

Reserved CPUs Storage for 30 days

32 GB per Data 6 per Data Node

Up to 50,000 Node VE

VE

l 800 GB per Data Node
l 2.4 TB total across 3 Data Nodes

Up to 120,000

32 GB per Data 12 per Data Node

Node VE

VE

l 1.92 TB per Data Node
l 5.76 TB total across 3 Data Nodes

Up to 220,000

64 GB per Data 16 per Data Node

Node VE

VE

l 3.52 TB per Data Node
l 10.56 TB total across 3 Data Nodes

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 19 -

Resource Requirements

Flow Sensor VE
Stealthwatch offers various types of Flow Sensor VEs depending upon the number of NICs for the Flow Sensor VE.
l Cache: The Flow Cache Size column indicates the maximum number of active flows that the Flow Sensor can process at the same time. The cache adjusts with the amount of reserved memory, and flows are flushed every 60 seconds. Use the Flow Cache Size to calculate the amount of memory needed for the amount of traffic being monitored.
l Requirements: Your environment may require more resources depending on a number of variables, such as average packet size, burst rate, and other network and host conditions.

NICs monitoring ports

Required Reserved CPUs

Required Minimum Reserved Memory

Estimated Throughput

Flow Cache Size (maximum number of concurrent flows)

1 x 1 Gbps

2

4 GB

850 Mbps

32,766

1,850 Mbps

2 x 1 Gbps

4

8 GB

Interfaces configured as PCI pass-through (igb/ixgbe compliant or e1000e compliant)

65,537

3,700 Mbps

4 x 1 Gbps

8

1 x 10 Gbps* 12

16 GB 24 GB

Interfaces configured as PCI pass-through (igb/ixgbe compliant or e1000e compliant)

131,073

8 Gbps

~512,000

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 20 -

Resource Requirements

NICs monitoring ports

Required Reserved CPUs

Required Minimum Reserved Memory

Estimated Throughput

Flow Cache Size (maximum number of concurrent flows)

Interfaces configured as PCI pass-through (Intel ixgbe/i40e compliant)
16 Gbps

2 x 10 Gbps* 22

40 GB

Interfaces configured as PCI pass-through (Intel ixgbe/i40e compliant)

~1,000,000

*For 10 Gbps throughput, configure all CPUs in 1 socket. For each additional 10 Gbps NIC, add 10 vCPUs and 16 GB of RAM. Optional: One or more 10G NICs may be used on the physical VM host. These figures are based on tests with Cisco UCS C220 M4, which contains the following:
l Processors: 2 Intel(R) Xeon(R) CPU E5-2620 v3 @ 2.40 GHz, 2 sockets, 12 cores per socket
l Memory: 128 GB l Storage: 800 GB l ESXi: VMware vSphere 6.7.0 l Monitoring Interfaces: PCI pass-through with 1 Gbps and 10 Gbps interfaces
Flow Sensor VE Network Environments
Before installing the Flow Sensor VE, make sure you know the type of network environment you have. This guide covers all types of network environments that a Flow Sensor VE can monitor.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 21 -

Resource Requirements

Compatibility: Stealthwatch supports a VDS environment, but it does not support VMware Distributed Resource Scheduler (VM-DRS). Virtual Network Environments: The Flow Sensor VE monitors the following types of virtual network environments:
l A network with virtual local area network (VLAN) trunking l Discrete VLANs where one or more VLANs are prohibited from attaching packet
monitoring devices (for example, due to local policy) l Private VLANs l Hypervisor hosts rather than VLANs
Integration: For integration information, review Stealthwatch Flow Sensor.
Flow Sensor VE Traffic
The Flow Sensor will process traffic with the following Ethertypes:

Ethertype 0x8000 0x86dd 0x8909 0x8100 0x88a8 0x9100 0x9200 0x9300 0x8847 0x8848

Protocol Normal IPv4 Normal IPv6 SXP VLAN
VLAN QnQ
MLPS unicast MLPS multicast

The Flow Sensor saves the top-level MPLS label or VLAN ID and exports it. It bypasses the other labels when it is processing packets.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 22 -

Resource Requirements

UDP Director VE
The UDP Director VE requires that the virtual machine meets the following specifications:

Required Reserved CPU
2

Required Reserved Memory
4 GB

Minimum Data Storage
60 GB

Maximum FPS Rate
10,000

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 23 -

Resource Requirements
Data Storage
The appliance data storage expands automatically when the appliance reboots. Also, you may want to expand the appliance resource allocations to improve performance. Use the following information to allocate storage for each appliance.
Make sure you reserve the required resources for your system. This step is critical for system performance.
If you choose to deploy Cisco Stealthwatch appliances without the required resources, you assume the responsibility to closely monitor your appliance resource utilization and increase resources as needed to ensure proper health and function of the deployment.
l Expansion Calculation: The virtual appliance uses approximately 75% of the server for data storage, leaving 25% for the operating system and cache. Therefore, always expand the data storage to 40% more than the desired amount.
l FPS Calculation: Allocate a minimum of 1 GB of data storage for every 1,000 flows per second (FPS) your system averages daily multiplied by the number of days you want to store the flows. For example, if your system averages 2,000 FPS and you want to store flows for 30 days, allocate a minimum of 60 GB (2 X 30) of data storage space.
l Syslog: If the External Event processing (syslog) feature is used, more memory and processing resources are required.
l Data Storage: Use the following table to determine the data storage required for each appliance.
l Restart: If you increase the virtual machine memory using another method on your Hypervisor host, restart the appliance after you have saved your changes.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 24 -

Resource Requirements

Stealthwatch VE Model

Required Minimum Data Storage

Maximum Addressable Storage/ Hardware Equivalent

Stealthwatch Management Console VE 125 GB

5.6 TB

Flow Collector NetFlow or sFlow VE

200 GB

n/a, depends on Data Store

Data Node VE

See Data Node VE Resource Requirements for more information

See Data Node VE Resource Requirements for more information

Flow Sensor

60 GB

n/a

UDP Director

60 GB

n/a

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 25 -

1. Configuring your Firewall and Ports
1. Configuring your Firewall and Ports
Overview
Before you can install your virtual appliance, complete the following procedures to prepare your network:
1. Placing the Appliances 2. Configuring Your Firewall for Communications 3. Stealthwatch Flow Sensor
Placing the Appliances
Review the placement information for each appliance you are installing.
l Stealthwatch Management Console (SMC) l Flow Collector l Flow Sensor l UDP Director l Data Node
Stealthwatch Management Console
As the management device, install the Stealthwatch Management Console at a location on your network that is accessible to all the devices sending data to it. If you have a failover pair of Stealthwatch Management Consoles, we recommend installing the primary and the secondary consoles in separate physical locations. This strategy will enhance a disaster recovery effort should it become necessary.
Stealthwatch Flow Collector
As collection and monitoring devices, the Stealthwatch Flow Collector should be installed at a location on your network that is accessible to the NetFlow or sFlow devices sending the data to a Flow Collector, as well as any devices you plan to use to access the management interface. When you place a Flow Collector outside a firewall, we recommend that you turn off the setting Accept traffic from any exporter.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 26 -

1. Configuring your Firewall and Ports
Stealthwatch Flow Sensor
As a passive monitoring device, the Stealthwatch Flow Sensor can sit at multiple points on your network to observe and record IP activity, thereby protecting network integrity and detecting security breaches. The Flow Sensor features integrated web-based management systems that facilitate either centralized or remote management and administration. The Flow Sensor VE appliance is most effective when placed at critical segments of your corporate network as follows:
l Inside your firewall to monitor traffic and determine if a firewall breach has occurred
l Outside your firewall, monitoring traffic flow to analyze who is threatening your firewall
l At sensitive segments of your network, offering protection from disgruntled employees or hackers with root access
l At remote office locations that constitute vulnerable network extensions l On your business network for protocol use management (for example, on
your transaction services subnet to determine if a hacker is running Telnet or FTP and compromising your customers' financial data)
Important Considerations for Integration
The Stealthwatch Flow Sensor VE is versatile enough to integrate with a wide variety of network topologies, technologies, and components. Before you install a Flow Sensor VE, you must make several decisions about your network and how you want to monitor it. It is important to review the following:
l Analyze your network's topology and your specific monitoring needs. l Connect a Flow Sensor so that it receives network transmissions to and from the
monitored network, and, if desired, receives interior network transmissions as well. l For optimum performance when using the Flow Sensor to monitor physical network traffic, configure your Flow Sensor VE with direct access to the underlying physical host's NICs (such as using an igb or e1000e compliant PCI pass-through).
The following sections explain how to integrate a Stealthwatch Flow Sensor VE appliance into your network using the following Ethernet network devices:
l TAPs l SPAN Ports

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 27 -

1. Configuring your Firewall and Ports
While not all network configurations can be discussed here, the examples may help you determine the best setup for your monitoring needs. These examples provide physical network scenarios, and the virtual host can be configured in a similar way.
TAPs
When a Test Access Port (TAP) is placed in line with a network connection, it repeats the connection on a separate port or ports. For example, an Ethernet TAP placed in line with an Ethernet cable will repeat each direction of transmission on separate ports. Therefore, use of a TAP is the most reliable way to use the Flow Sensor. The type of TAP you use depends on your network.
Review the Stealthwatch System Configuration Guide v7.3.2 for Flow Sensor configuration requirements.
This section explains the following ways to use TAPs:
l Using Electrical TAPs l Using Optical TAPs l Using TAPs Outside Your Firewall l Placing the Flow Sensor VE Inside Your Firewall
In a network using TAPs, the Flow Sensor VE can capture performance monitoring data only if it is connected to an aggregating TAP that is capturing both inbound and outbound traffic. If the Flow Sensor VE is connected to a unidirectional TAP that is capturing only one direction of traffic on each port, then the Flow Sensor VE will not capture performance monitoring data.
Using Electrical TAPs
The following illustration shows the Stealthwatch Flow Sensor VE connected to an Ethernet electrical TAP. To achieve this configuration, connect the two TAP ports to the Flow Sensor VE Monitor Ports 1 and 2, as shown.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 28 -

1. Configuring your Firewall and Ports
Using Optical TAPs
Two splitters are required for fiber-optic­based systems. You can place a fiber-optic cable splitter in line with each direction of transmission and use it to repeat the optical signal for one direction of transmission. The following illustration shows the Flow Sensor connected to a fiber-optic­based network. To achieve this configuration, connect the outputs of the optical splitters to the Flow Sensor VE Monitor Ports 1 and 2, as shown.

If the connection between the monitored networks is an optical connection, then the Stealthwatch Flow Sensor VE appliance is connected to two optical splitters. The management port is connected to either the switch of the monitored network or to another switch or hub.
Using TAPs Outside Your Firewall
To have the Flow Sensor VE monitor traffic between your firewall and other networks, connect the Stealthwatch management port to a switch or port outside of the firewall.
Use a TAP for this connection so that failure of the device does not bring down your entire network.
The following illustration shows an example of this configuration using an Ethernet electrical TAP. The management port must be connected to the switch or hub of the monitored network. This setup is similar to the setup that monitors traffic to and from your network.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 29 -

1. Configuring your Firewall and Ports
If your firewall is performing network address translation (NAT), you can observe only the addresses that are on the firewall.
Placing the Flow Sensor VE Inside Your Firewall
To monitor traffic between internal networks and a firewall, the Flow Sensor VE must be able to access all traffic between the firewall and the internal networks. You can accomplish this by configuring a mirror port that mirrors the connection to the firewall on the main switch. Make sure that the Flow Sensor VE Monitor Port 1 is connected to the mirror port, as shown in the following illustration:

To monitor traffic inside your firewall by using a TAP, insert the TAP or optical splitter between your firewall and the main switch or hub. A TAP configuration is shown below.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 30 -

1. Configuring your Firewall and Ports
An optical splitter configuration is shown below.
SPAN Ports
You can also connect the Flow Sensor VE to a switch. However, because a switch does not repeat all traffic on each port, the Flow Sensor VE will not perform properly unless the switch can repeat packets transmitted to and from one or more switch ports. This type of switch port is sometimes called a mirror port or Switch Port Analyzer (SPAN). The following illustration shows how you can achieve this configuration by connecting your network to the Stealthwatch Flow Sensor VE through the management port.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 31 -

1. Configuring your Firewall and Ports
In this configuration, you must configure a switch port (also called a mirror port), to repeat all traffic to and from the host of interest to the mirror port. The Flow Sensor VE Monitor Port 1 must be connected to this mirror port. This allows the Flow Sensor to monitor traffic to and from the network of interest and to other networks. In this instance, a network may be made up of some or all of the hosts connected to the switch. A common way of configuring networks on a switch is to zone them into virtual local area networks (VLANs), which are logical rather that physical connections of hosts. If the mirror port is configured to mirror all ports on a VLAN or switch, the Flow Sensor VE can monitor all traffic to, from, and within the network of interest, as well as other networks.
l Configuration: Review the Stealthwatch System Configuration Guide v7.3.2 for Flow Sensor configuration requirements.
l Documentation: In all cases, make sure you consult your switch manufacturer's documentation to determine how to configure the switch mirror port and what traffic will be repeated to the mirror port.
Stealthwatch UDP Director
The only requirement for the placement of the Stealthwatch UDP Director is that it has an unobstructed communication path to the rest of your Stealthwatch appliances.
If you are deploying the UDP Director in an environment where Cisco's ACI is being utilized and Unicast Reverse Path Forwarding (uRPF) or Limit IP learning to subnet is enabled, the local network may block the forwarded traffic leaving the UDP Director. You need to spoof the UDP traffic as part of the forwarding rules so tools collecting the log data are able to know the original source of traffic.
To ensure a successful operation of the UDP Director in this case, deploy your UDP Director on a portion of your network where you can disable uRPF or Limit IP learning to subnet (typically internally). You can place the UDP Director in an L3 out (no IP learning). If on 4.0+, you can disable endpoint learning on a per VRF basis.
Stealthwatch Data Node
As a repository for flow data collected by Flow Collectors, and as the centralized repository against which a Stealthwatch Management Console runs queries, install your Data Nodes at a location on your network that is accessible by all of your Flow Collectors and your Stealthwatch Management Console. See the Data Store Virtual Edition Deployment and Configuration Guide for more information.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 32 -

1. Configuring your Firewall and Ports
Configuring Your Firewall for Communications
In order for the appliances to communicate properly, you should configure the network so that firewalls or access control lists do not block the required connections. Use the information provided in this section to configure your network so that the appliances can communicate through the network.
Open Ports
Stealthwatch Management Console (SMC), Flow Collector, Data Nodes, Flow Sensor, and UDP Director
Consult with your network administrator to ensure that the following ports are open and have unrestricted access:
l TCP 22 l TCP 25 l TCP 389 l TCP 443 l TCP 2393 l TCP 5222 l UDP 53 l UDP 123 l UDP 161 l UDP 162 l UDP 389 l UDP 514 l UDP 2055 l UDP 6343
In addition, if you deploy Data Nodes to your network, ensure that the following ports are open and have unrestricted access:
l TCP 5433 l TCP 5444 l TCP 9450

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 33 -

1. Configuring your Firewall and Ports

Communication Ports and Protocols
The following table shows how the ports are used in Stealthwatch:

From (Client) Admin User PC All appliances

To (Server) All appliances Network time source

Active Directory SMC

Cisco ISE

SMC

Cisco ISE

SMC

External log sources

SMC

Flow Collector SMC

UDP Director

Flow Collector - sFlow

UDP Director

Flow Collector - NetFlow

UDP Director

3rd Party event management systems

Flow Sensor

SMC

Flow Sensor

Flow Collector - NetFlow

Identity

SMC

NetFlow Exporters

Flow Collector - NetFlow

sFlow Exporters Flow Collector - sFlow

SMC

Cisco ISE

Port TCP/443 UDP/123 TCP/389, UDP/389 TCP/443 TCP/5222
UDP/514
TCP/443 UDP/6343 UDP/2055*
UDP/514
TCP/443 UDP/2055 TCP/2393
UDP/2055*
UDP/6343* TCP/443

Protocol HTTPS NTP LDAP HTTPS XMPP SYSLOG HTTPS sFlow NetFlow SYSLOG HTTPS NetFlow SSL NetFlow sFlow HTTPS

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 34 -

1. Configuring your Firewall and Ports

From (Client) To (Server)

Port

Protocol

SMC SMC SMC SMC SMC SMC SMC User PC

Cisco ISE DNS Flow Collector Flow Sensor Identity Flow Exporters LDAP SMC

TCP/5222 UDP/53 TCP/443 TCP/443 TCP/2393 UDP/161 TCP/636 TCP/443

XMPP DNS HTTPS HTTPS SSL SNMP TLS HTTPS

*This is the default port, but any UDP port could be configured on the exporter.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 35 -

1. Configuring your Firewall and Ports

Optional Communication Ports
The following table is for optional configurations determined by your network needs:

From (Client) To (Server)

Port

Protocol

All appliances User PC

TCP/22 SSH

SMC

3rd Party event management systems UDP/162 SNMP-trap

SMC

3rd Party event management systems UDP/514 SYSLOG

SMC

Email gateway

TCP/25 SMTP

SMC

Threat Intelligence Feed

TCP/443 SSL

User PC

All appliances

TCP/22 SSH

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 36 -

1. Configuring your Firewall and Ports
Stealthwatch Deployment Example
The following diagram shows the various connections used by Stealthwatch. Some of these ports are optional.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 37 -

1. Configuring your Firewall and Ports
Stealthwatch Deployment with Data Store Example
The following diagram shows an example Stealthwatch architecture with a Data Store deployed. See the table for the ports associated with each callout.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 38 -

1. Configuring your Firewall and Ports

The following lists the communication ports to open on your firewall to deploy the Data Store.

# From (Client) To (Server) Port

Protocol or Purpose

1 SMC

Flow Collectors

and Data

22/TCP

Nodes

SSH, required to initialize Data Store database

1 Data Nodes

all other Data Nodes

22/TCP

SSH, required to initialize Data Store database and for database administration tasks

SMC, Flow 2 Collectors, and NTP server
Data Nodes

123/UDP

NTP, required for time synchronization

2 NTP server

SMC, Flow Collectors, and 123/UDP Data Nodes

NTP, required for time synchronization

3 SMC

Flow Collectors

and Data

443/TCP

Nodes

HTTPS, required for secure communications between appliances

3 Flow Collectors SMC

443/TCP

HTTPS, required for secure communications between appliances

3 Data Nodes

SMC

443/TCP

HTTPS, required for secure communications between appliances

4

NetFlow

Exporters

Flow Collectors 2055/UDP NetFlow ingestion - NetFlow

5 Data Nodes

all other Data Nodes

4803/TCP

inter-Data Node messaging service

6 Data Nodes

all other Data Nodes

inter-Data Node messaging 4803/UDP
service

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 39 -

1. Configuring your Firewall and Ports

7 Data Nodes

all other Data Nodes

inter-Data Node messaging 4804/UDP
service

SMC, Flow 8 Collectors, and Data Nodes
Data Nodes

5433/TCP Vertica client connections

9 Data Node

all other Data Node

Vertica messaging service 5433/UDP monitoring

sFlow 10 Exporters

Flow Collectors

- sFlow

6343/UDP sFlow ingestion

11 Data Nodes

all other Data Nodes

inter-Data Node messaging 6543/UDP service

See the Data Store Virtual Edition Deployment and Configuration Guide for more information on Data Store communication ports.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 40 -

2. Downloading VE Installation Files

2. Downloading VE Installation Files
Use the following instructions to download the ISO files for your virtual appliance installation. Refer to Installation Files to determine the file type.
Installation Files

Virtual Machine

Appliance Installation File

Details

3a. VMware vCenter

ISO

Installing your virtual appliances using VMware vCenter.

3b. VMware ESXi StandISO
Alone Server

Installing your virtual appliances on an ESXi stand-alone host server.

3c. KVM and Virtual Machine ISO
Manager

Installing your virtual appliances using KVM and Virtual Machine Manager.

1. Log in to Cisco Software Central
1. Log in to Cisco Software Central at https://software.cisco.com. 2. In the Download and manage > Download and Upgrade section, select
Access downloads. 3. Scroll down until you see the Select a Product field. 4. You can access Stealthwatch files in two ways:
l Search by Name: Type Stealthwatch in the Select a Product field. Press Enter.
l Search by Menu: Click Browse All. Select Security > Network Visibility and Segmentation > Stealthwatch.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 41 -

2. Downloading VE Installation Files

2. Download Files
1. Select an appliance type.
l Stealthwatch Management Console Virtual Appliance l Stealthwatch Flow Collector Virtual Appliance l Stealthwatch Data Node Virtual Appliance l Stealthwatch Flow Sensor Virtual Appliance l Stealthwatch UDP Director Virtual Appliance
2. Select Stealthwatch System Software. 3. In the Latest Release column, select 7.3.2 (or the version of 7.3.x that you are
installing). 4. Download: Locate the ISO installation file. Click the Download icon or Add to
Cart icon. 5. Repeat these instructions to download the files for each appliance type.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 42 -

3a. Installing a Virtual Appliance using VMware vCenter (ISO)
3a. Installing a Virtual Appliance using VMware vCenter (ISO)
Overview
Use the following instructions to install your virtual appliances using VMware vCenter.
If you plan on deploying Data Nodes as part of a Data Store, review the Data Store Virtual Edition Deployment and Configuration Guide before you begin for full instructions on initializing the Data Store, including proper order of appliance deployment.
To use an alternative method, refer to the following:
l VMware ESXi Stand-Alone Server: Use 3b. Installing a Virtual Appliance on an ESXi Stand-Alone Server (ISO).
l KVM: Use 3c. Installing a Virtual Appliance on a KVM Host (ISO).
Before You Begin
Before you begin the installation, complete the following preparation procedures:
1. Compatibility: Review the compatibility requirements in Compatibility. 2. Resource Requirements: Review the Resource Requirements section to
determine the required allocations for the appliance. You can use a resource pool or alternative method to allocate resources. 3. Firewall: Configure your firewall for communications. Refer to 1. Configuring your Firewall and Ports. 4. Files: Download the appliance ISO files. Refer to 2. Downloading VE Installation Files for instructions. 5. Time: Confirm the time set on the hypervisor host in your VMware environment (where you will be installing the virtual appliance) shows the correct time. Otherwise, the virtual appliances may not be able to boot up.
Do not install an untrusted physical or virtual machine on the same physical cluster/system as your Stealthwatch appliances.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 43 -

3a. Installing a Virtual Appliance using VMware vCenter (ISO)
Do not install VMware Tools on a Stealthwatch virtual appliance because it will override the custom version already installed. Doing so would render the virtual appliance inoperable and require reinstallation.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 44 -

3a. Installing a Virtual Appliance using VMware vCenter (ISO)
Installing a Virtual Appliance Using vCenter (ISO)
If you have VMware vCenter (or similar), use the following instructions to install a virtual appliance using the ISO.
Process Overview
Installing a virtual appliance involves completing the following procedures, which are covered in this chapter:
1. Logging in to the VMware Web Client 2a. Configuring the Flow Sensor to Monitor Traffic 2b. Configuring an Isolated LAN for inter-Data Node Communications 3. Installing the Virtual Appliance 4. Defining Additional Monitoring Ports (Flow Sensors only)
1. Logging in to the VMware Web Client
To install the virtual appliance, log in to the VMware Web Client.
Some of the menus and graphics may vary from the information shown here. Please refer to your VMware guide for details related to the software.
1. Log in to your VMware Web Client.

2. You have the following options:
Flow Sensors: If the appliance is a Flow Sensor, go to 2a. Configuring the Flow Sensor to Monitor Traffic.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 45 -

3a. Installing a Virtual Appliance using VMware vCenter (ISO)
Data Nodes: If you are deploying Data Nodes, go to Configuring an Isolated LAN for inter-Data Node Communications. All Other Appliances: If the appliance is not a Flow Sensor, go to 3. Installing the Virtual Appliance.
2a. Configuring the Flow Sensor to Monitor Traffic
The Flow Sensor VE has the ability to provide visibility into VMware environments, generating flow data for areas that are not flow-enabled. As a virtual appliance installed inside each hypervisor host, the Flow Sensor VE passively captures Ethernet frames from the host vSwitch, and it observes and creates flow records containing valuable session statistics that pertain to conversational pairs, bit rates, and packet rates. For details, refer to Flow Sensor VE and Stealthwatch Flow Sensor. Use the following instructions to configure the Flow Sensor VE to monitor traffic on a vSwitch as follows:
l Monitoring a vSwitch with Multiple Hosts l Monitoring a vSwitch with a Single Host
Monitoring External Traffic with PCI Pass-Through
You can also configure your Flow Sensor VE for direct network monitoring using a compliant PCI pass-through.
l Requirements: igb/ixgbe compliant or e1000e compliant PCI pass-through. l Resource Information: Refer to Flow Sensor VE. l Integration: Refer to 1. Configuring your Firewall and Ports. l Instructions: To add PCI network interfaces to the Flow Sensor VE, refer to your
VMware documentation.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 46 -

3a. Installing a Virtual Appliance using VMware vCenter (ISO)
Monitoring a vSwitch with Multiple Hosts
Use the instructions in this section to use the Flow Sensor VE to monitor traffic on a Distributed vSwitch that spans multiple VM hosts or clusters. This section applies only to VDS networks. If your network is in a non-VDS environment, go to Monitoring a vSwitch with a Single Host.
Configuration Requirements
This configuration has the following requirements: l Distributed Virtual Port (dvPort): Add a dvPort group with the correct VLAN settings for each VDS that the Flow Sensor VE will monitor. If the Flow Sensor VE monitors both VLAN and non-VLAN traffic on the network, you need to create two dvPort groups, one for each type. l VLAN Identifier: If your environment uses a VLAN (other than VLAN trunking or a private VLAN), you need the VLAN identifier to complete this procedure. l Promiscuous Mode: Enabled. l Promiscuous Port: Configured to the vSwitch.
Complete the following steps to configure the network using a VDS: 1. Click the Networking icon.
2. In the Networking tree, right-click the VDS. 3. Select Distributed Port Group > New Distributed Port Group.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 47 -

3a. Installing a Virtual Appliance using VMware vCenter (ISO)
4. Use the New Distributed Port Group dialog box to to configure the port group, including the specifications in the following steps.
5. Select Name and Location: In the Name field, enter a name to identify this dvPort group.
6. Configure Settings: In the Number of Ports field, enter the number of Flow Sensor VEs in your cluster of hosts.

7. Click the VLAN type drop-down list.
l If your environment doesn't use a VLAN, select None. l If your environment uses a VLAN, select the VLAN type. Configure it as
follows:

VLAN

VLAN Type

VLAN Trunking Private VLAN

Detail
In the VLAN ID field, enter the number (between 1 and 4094) that matches the identifier.
In the VLAN trunk range field, enter 0-4094 to monitor all VLAN traffic.
Select Promiscuous from the dropdown list.

8. Ready to Complete: Review the configuration settings. Click Finish.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 48 -

3a. Installing a Virtual Appliance using VMware vCenter (ISO)
9. In the Networking tree, right-click the new dvPort group. Select Edit Settings. 10. Select Security. 11. Click the Promiscuous Mode drop-down list. Select Accept.
12. Click OK to close the dialog box. 13. Does the Flow Sensor VE monitor both VLAN and non-VLAN network traffic?
l If yes, repeat the steps in this section Monitoring a vSwitch with Multiple Hosts.
l If no, continue to the next step. 14. Is there another VDS in the VMware environment that the Flow Sensor VE will
monitor? l If yes, repeat the steps in this section Monitoring a vSwitch with Multiple Hosts for the next VDS. l If no, go to Configuring an Isolated LAN for inter-Data Node Communications if you are deploying Data Nodes, or 3. Installing the Virtual Appliance if you are not.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 49 -

3a. Installing a Virtual Appliance using VMware vCenter (ISO)
Monitoring a vSwitch with a Single Host
Use the instructions in this section to use the Flow Sensor VE to monitor traffic on a vSwitch with a single host.
This section applies only to non-VDS networks. If your network uses a VDS, go to Monitoring a vSwitch with Multiple Hosts.
Configuration Requirements
This configuration has the following requirements: l Promiscuous Port Group: Add a promiscuous port group for each virtual switch that the Flow Sensor VE will be monitoring. l Promiscuous Mode: Enabled. l Promiscuous Port: Configured to the vSwitch.
Configure the Port Group to Promiscuous Mode
Use the following instructions to add a port group, or edit a port group, and set it to Promiscuous.
1. Log in to your VMware ESXi host environment. 2. Click Networking.

3. Select the Port groups tab. 4. You can create a new port group or edit a port group.
© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 50 -

3a. Installing a Virtual Appliance using VMware vCenter (ISO)

l Create Port Group: Click Add port group. l Edit Port Group: Select the port group. Click Edit Settings.
5. Use the dialog box to configure the port group. Configure the VLAN ID or VLAN Trunking:

VLAN Type VLAN ID VLAN Trunking

Detail
Use VLAN ID to specify a single VLAN. In the VLAN ID field, enter the number (between 1 and 4094) that matches the identifier.
Use VLAN Trunking to monitor all VLAN traffic. The range defaults to 0-4095.

6. Click the Security arrow.

7. Promiscuous Mode: Choose Accept.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 51 -

3a. Installing a Virtual Appliance using VMware vCenter (ISO)
8. Will the Flow Sensor VE be monitoring another virtual switch in this VMware environment?
l If yes, go back to 2a. Configuring the Flow Sensor to Monitor Traffic, and repeat all the steps for the next virtual switch.
l If no, go to Configuring an Isolated LAN for inter-Data Node Communications if you are deploying Data Nodes, or 3. Installing the Virtual Appliance if you are not.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 52 -

3a. Installing a Virtual Appliance using VMware vCenter (ISO)
2b. Configuring an Isolated LAN for inter-Data Node Communications
If you are deploying Data Nodes VE to your network, configure an isolated LAN with a virtual switch so that the Data Nodes can communicate with each other over eth1 for inter-Data Node communication.
We recommend that you deploy all of your Data Nodes VE on the same ESXi host. If you plan on deploying your Data Nodes VE on separate ESXi hosts, contact Cisco Professional Services for assistance in configuring the isolated LAN.
To configure a vSphere Standard Switch: 1. Log into your VMware host environment. 2. From the VMware Host Client inventory, right-click Networking and click Add standard vSwitch. 3. Enter a vSwitch name. 4. Click Create virtual switch. 5. Do NOT configure physical network cards as uplinks. 6. Select the Cisco Discovery Protocol. 7. Click Add. 8. Go to 3. Installing the Virtual Appliance.
To configure a vSphere Distributed Switch:
1. Log into your VMware host environment. 2. From the menu, select Networking. 3. Right-click a data center and select Distributed Switch > New Distributed
Switch. 4. Enter a name, then click Next. 5. Select a distributed switch version based on your ESXi version, then click Next.
For example, if you have ESXI 7.0 or later deployed, select 7.0.0. 6. For Number of uplinks, select 0. Do NOT configure physical network cards as
uplinks. 7. Select Create a default port group and enter a Port group name. 8. Click Next.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 53 -

3a. Installing a Virtual Appliance using VMware vCenter (ISO)
9. Click Finish. 10. Go to 3. Installing the Virtual Appliance.
3. Installing the Virtual Appliance
Use the following instructions to install a virtual appliance on your hypervisor host and define the virtual appliance management and monitoring ports.
Some of the menus and graphics may vary from the information shown here. Please refer to your VMware guide for details related to the software.
1. Locate the virtual appliance software file (ISO) that you downloaded from Cisco Software Central.
2. Make the ISO available in vCenter. You have the following options: l Upload the ISO to a vCenter datastore. l Add the ISO to a content library. l Keep the ISO on your local workstation, and configure the deployment to reference that file.
See the VMware documentation for more information. 3. From the vCenter UI, select Menu > Hosts and Clusters. 4. In the navigation pane, right click a cluster or host and select New Virtual
Machine... to access the New Virtual Machine wizard. 5. From the Select a creation type window, select Create a new virtual machine,
then click Next.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 54 -

3a. Installing a Virtual Appliance using VMware vCenter (ISO)
6. From the Select a name and folder window, enter a Virtual machine name, select a location for the virtual machine, then click Next.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 55 -

3a. Installing a Virtual Appliance using VMware vCenter (ISO)
7. From the Select a compute resource window, select a cluster, host, resource pool, or vApp to which you will deploy the appliance, then click Next.
8. From the Select storage window, select a VM Storage Policy from the dropdown, then select a storage location, then click Next.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 56 -

3a. Installing a Virtual Appliance using VMware vCenter (ISO)
9. From the Select compatibility window, select a virtual machine version from the Compatible with drop-down, based on your current deployed ESXi version. For example, the following screenshot shows ESXi 7.0 and later because ESXi 7.0 is deployed. Click Next.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 57 -

3a. Installing a Virtual Appliance using VMware vCenter (ISO)
10. From the Select a guest OS screen, select the Linux Guest OS Family and the Debian GNU/Linux 10 (64-bit) Guest OS Version. Click Next.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 58 -

3a. Installing a Virtual Appliance using VMware vCenter (ISO)
11. From the Customize hardware window, configure the virtual hardware. Refer to Resource Requirements for specific recommendations for your appliance type.
This step is critical for system performance. If you choose to deploy Cisco Stealthwatch appliances without the required resources, you assume the responsibility to closely monitor your appliance resource utilization and increase resources as needed to ensure proper health and function of the deployment.

In addition to the resource requirements, select the following settings:
l Click New Hard disk to expand the configuration options. Select Thick Provision Lazy Zeroed from the Disk Provisioning drop-down.
l In the New CD/DVD Drive field, select an ISO location based on where you have stored the ISO. Click New CD/DVD Drive to expand the configuration options. Check Connect At Power On.
l Click New SCSI controller to expand the configuration options. Select LSI Logic SAS from the Change Type drop-down. If you do not select LSI Logic SAS, your virtual appliance may fail to properly deploy.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 59 -

3a. Installing a Virtual Appliance using VMware vCenter (ISO)
l If the appliance is a Flow Sensor, and you are configuring 10 Gbps throughput for the NIC, click CPU to expand the configuration options. Configure all Cores per Socket so all CPUs are in one socket.
12. If you are deploying a Data Node virtual appliance, also add a second network adaptor. Click Add New Device, then select Network Adaptor. For the first network adaptor, select a switch that will allow the Data Node VE to communicate on a public network with other appliances. For the second network adaptor, select the switch that you created in Configuring an Isolated LAN for inter-Data Node Communications that will allow the Data Node VE to communicate on a private network with other Data Nodes. Ensure that you properly assign the network adaptors and virtual switches for every Data Node in your deployment as you deploy each Data Node.

13. From the Ready to complete window, review your settings, then click Finish.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 60 -

3a. Installing a Virtual Appliance using VMware vCenter (ISO)

14. The deployment starts in the background. Monitor the deployment progress in the Recent Tasks section. Make sure the deployment is completed and shown in the Inventory tree before you go to the next steps.
15. Flow Sensors: If the appliance is a Flow Sensor and will be monitoring more than one virtual switch in the VMware environment, or more than one VDS in a cluster, continue with the next section 4. Defining Additional Monitoring Ports (Flow Sensors only).
16. Repeat all of the procedures in 3a. Installing a Virtual Appliance using VMware vCenter (ISO) for the next virtual appliance in your system.
If you have completed installing all virtual appliances in your system, go to 4. Configuring your Environment using First Time Setup.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 61 -

3a. Installing a Virtual Appliance using VMware vCenter (ISO)
4. Defining Additional Monitoring Ports (Flow Sensors only)
This procedure is required if the Flow Sensor VE will be monitoring more than one virtual switch in a VMware environment or more than one VDS in a cluster. If this is not the monitoring configuration for your Flow Sensor, go to 4. Configuring your Environment using First Time Setup. To add Flow Sensor VE monitoring ports, complete the following steps:
1. In the Inventory tree, right-click the Flow Sensor VE. Select Edit Settings.

2. Use the Edit Settings dialog box to configure the following specified settings. 3. Click Add New Device. Select Network Adapter.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 62 -

3a. Installing a Virtual Appliance using VMware vCenter (ISO)
4. Locate the new network adapter. Click the arrow to expand the menu, and configure the following: l New Network: Select an unassigned promiscuous port group. l Adapter Type: Select VMXNET 3. l Status: Check the Connect at Power On check box.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 63 -

3a. Installing a Virtual Appliance using VMware vCenter (ISO)
5. After reviewing the settings, click OK. 6. Repeat this procedure to add another Ethernet adapter as needed.
If you have added all Ethernet adapters, go to to 4. Configuring your Environment using First Time Setup.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 64 -

3b. Installing a Virtual Appliance on an ESXi Stand-Alone Server (ISO)
3b. Installing a Virtual Appliance on an ESXi Stand-Alone Server (ISO)
Overview
Use the following instructions to install your virtual appliances using a VMware environment with an ESXi Stand-alone server.
If you plan on deploying Data Nodes as part of a Data Store, review the Data Store Installation and Configuration Guide before you begin for full instructions on initializing the Data Store, including proper order of appliance deployment.
To use an alternative method, refer to the following:
l VMware vCenter: Use 3a. Installing a Virtual Appliance using VMware vCenter (ISO) .
l KVM: Use 3c. Installing a Virtual Appliance on a KVM Host (ISO).
Before You Begin
Before you begin the installation, complete the following preparation procedures:
1. Compatibility: Review the compatibility requirements in Compatibility. 2. Resource Requirements: Review the Resource Requirements section to
determine the required allocations for the appliance. You can use a resource pool or alternative method to allocate resources. 3. Firewall: Configure your firewall for communications. Refer to 1. Configuring your Firewall and Ports. 4. Files: Download the appliance ISO files. Refer to 2. Downloading VE Installation Files for instructions. 5. Time: Confirm the time set on the hypervisor host in your VMware environment (where you will be installing the virtual appliance) shows the correct time. Otherwise, the virtual appliances may not be able to boot up.
Do not install an untrusted physical or virtual machine on the same physical cluster/system as your Stealthwatch appliances.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 65 -

3b. Installing a Virtual Appliance on an ESXi Stand-Alone Server (ISO)
Do not install VMware Tools on a Stealthwatch virtual appliance because it will override the custom version already installed. Doing so would render the virtual appliance inoperable and require reinstallation.
Installing a Virtual Appliance on an ESXi Stand-Alone Server (ISO)
Use the following instructions to install your virtual appliances using a VMware environment with an ESXi Stand-alone server.
Process Overview
Installing a virtual appliance involves completing the following procedures, which are covered in this chapter:
1. Logging in to the VMware Web Client 2. Booting from the ISO
Flow Sensors: If the appliance is a Flow Sensor, review Stealthwatch Flow Sensor to understand the additional configuration steps required.
1. Logging in to the VMware Web Client
Some of the menus and graphics may vary from the information shown here. Please refer to your VMware guide for details related to the software.
1. Log in to the VMware Web Client. 2. Click Create/Register a Virtual Machine. 3. Use the New Virtual Machine dialog box to configure the appliance as specified
in the following steps. 4. Select Creation Type: Select Create a New Virtual Machine.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 66 -

3b. Installing a Virtual Appliance on an ESXi Stand-Alone Server (ISO)

5. Select a Name and Guest OS: Enter or select the following:
l Name: Enter a name for the appliance so you can identify it easily. l Compatibility: Select the version you are using (v6.5 or v6.7). l Guest OS family: Linux. l Guest OS version: Select Debian GNU/Linux 10 64-bit.

6. Select Storage: Select an accessible datastore. Review Resource Requirements to confirm you have enough space.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 67 -

3b. Installing a Virtual Appliance on an ESXi Stand-Alone Server (ISO)
Review Resource Requirements to allocate sufficient resources. This step is critical for system performance.
If you choose to deploy Cisco Stealthwatch appliances without the required resources, you assume the responsibility to closely monitor your appliance resource utilization and increase resources as needed to ensure proper health and function of the deployment.
7. Customize Settings: Enter or select your appliance requirements (refer to Resource Requirements for details).
Make sure you select the following:
l SCSI Controller: LSI Logic SAS l Network Adapter: Confirm the management address for the appliance. l Hard Disk: Thick Provisioning Lazy Zeroed
If the appliance is a Flow Sensor, you can click Add Network Adapter to add another management or sensing interface. Refer to Stealthwatch Flow Sensor for details. If the appliance is a Flow Sensor, and you are configuring 10 Gbps throughput for the NIC, click CPU to expand the configuration options. Configure all all CPUs in one socket. If the appliance is a Data Node, you must add another network interface to allow inter-Data Node communications. Click Add Network Adapter. For the first network adaptor, select a switch that will allow the Data Node VE to communicate on a public network with other appliances. For the second network adaptor, select the switch that you created in Configuring an Isolated LAN for inter-Data Node Communications that will allow the Data Node VE to communicate on a private network with other Data Nodes.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 68 -

3b. Installing a Virtual Appliance on an ESXi Stand-Alone Server (ISO)

8. Click the arrow next to Network Adapter. 9. For the Adapter Type, select VMXnet3. 10. Review your configuration settings and confirm they are correct.
11. Click Finish. A virtual machine container is created.
2. Booting from the ISO
1. Open the VMware console. 2. Connect the ISO to the new virtual machine. Refer to the VMware guide for details. 3. Boot the virtual machine from the ISO. It runs the installer and reboots
automatically. 4. Once the installation and reboot are completed, you will see the login prompt.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 69 -

3b. Installing a Virtual Appliance on an ESXi Stand-Alone Server (ISO)

5. Disconnect the ISO from the virtual machine. 6. Repeat all of the procedures in 3b. Installing a Virtual Appliance on an ESXi
Stand-Alone Server (ISO) for the next virtual appliance. 7. Flow Sensors: If the appliance is a Flow Sensor, review Stealthwatch Flow
Sensor and finish the setup using the previous sections of this manual:
l 2a. Configuring the Flow Sensor to Monitor Traffic (use Monitoring a vSwitch with a Single Host)
l If the Flow Sensor will be monitoring more than one virtual switch in the VMware environment, or more than one VDS in a cluster, go to 4. Defining Additional Monitoring Ports (Flow Sensors only).
8. If you have completed installing all virtual appliances in your system, go to 4. Configuring your Environment using First Time Setup.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 70 -

3c. Installing a Virtual Appliance on a KVM Host (ISO)
3c. Installing a Virtual Appliance on a KVM Host (ISO)
Overview
Use the following instructions to install your virtual appliances using KVM and Virtual Machine Manager.
If you plan on deploying Data Nodes as part of a Data Store, review the Data Store Installation and Configuration Guide before you begin for full instructions on initializing the Data Store, including proper order of appliance deployment.
To use an alternative method, refer to the following:
l VMware vCenter: Use 3a. Installing a Virtual Appliance using VMware vCenter (ISO) .
l VMware ESXi Stand-Alone Server: Use 3b. Installing a Virtual Appliance on an ESXi Stand-Alone Server (ISO).
Before You Begin
Before you begin the installation, make sure you've completed the following procedures:
1. Compatibility: Review the compatibility requirements in Compatibility. 2. Resource Requirements: Review the Resource Requirements section to
determine the required allocations for the appliance. You can use a resource pool or alternative method to allocate resources. 3. Firewall: Configure your firewall for communications. Refer to 1. Configuring your Firewall and Ports. 4. Files: Download the appliance ISO files and copy them to a folder on the KVM host.We use the following folder in the example provided in this section: var/lib/libvirt/image. Refer to 2. Downloading VE Installation Files for instructions. 5. Time: Confirm the time set on the hypervisor host in your VMware environment (where you will be installing the virtual appliance) shows the correct time. Otherwise, the virtual appliances may not be able to boot up.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 71 -

3c. Installing a Virtual Appliance on a KVM Host (ISO)
Do not install an untrusted physical or virtual machine on the same physical cluster/system as your Stealthwatch appliances.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 72 -

3c. Installing a Virtual Appliance on a KVM Host (ISO)
Installing a Virtual Appliance on a KVM Host (ISO)
If you have a KVM host, use the following instructions to install a virtual appliance using the ISO.
Process Overview
Installing a virtual appliance involves completing the following procedures, which are covered in this chapter:
Configuring an isolated LAN for Data Nodes 1. Installing a Virtual Appliance on a KVM Host 2. Adding NIC (Data Node, Flow Sensor) and Promiscuous Port Monitoring on an Open vSwitch (Flow Sensors Only)
Configuring an isolated LAN for Data Nodes
If you are deploying Data Nodes VE to your network, configure an isolated LAN with a virtual switch so that the Data Nodes can communicate with each other over eth1 for inter-Data Node communication. See your virtual switch's documentation for more information on creating an isolated LAN.
We recommend that you deploy all of your Data Nodes VE on the same ESXi host. If you plan on deploying your Data Nodes VE on separate ESXi hosts, contact Cisco Professional Services for assistance in configuring the isolated LAN.
1. Installing a Virtual Appliance on a KVM Host
There are several methods to install a virtual machine on a KVM host using a ISO file. The following steps give one example for installing a virtual Stealthwatch Management Console (SMC) through a GUI tool called Virtual Machine Manager running on a Ubuntu box. You can use any compatible Linux distribution. For compatibility details, refer to Compatibility.
Monitoring Traffic
The Flow Sensor VE has the ability to provide visibility into KVM environments, generating flow data for areas that are not flow-enabled. As a virtual appliance installed inside each KVM host, the Flow Sensor VE passively captures Ethernet frames from traffic it observes and creates flow records containing valuable session statistics that pertain to conversational pairs, bit rates, and packet rates. For details, refer to Stealthwatch Flow Sensor: Integrating the Flow Sensor VE into your network.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 73 -

3c. Installing a Virtual Appliance on a KVM Host (ISO)
Configuration Requirements
This configuration has the following requirements: l Promiscuous Mode: Enabled. l Promiscuous Port: Configured to an open vSwitch.
Installing a Virtual Appliance on a KVM Host
To install a virtual appliance, and enable the Flow Sensor VE to monitor traffic, complete the following steps:
1. Use Virtual Machine Manager to connect to the KVM Host and configure the appliance as specified in the following steps.
2. Click File > New Virtual Machine.
3. Select Local install media (ISO image or CDROM). Click Forward.

4. Click Use ISO image. 5. Click Browse. Select the appliance image.
© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 74 -

3c. Installing a Virtual Appliance on a KVM Host (ISO)

6. Select the ISO file. Click Choose Volume. Confirm the ISO file is accessible by the KVM Host.
7. Under Choose an operating system type and version, select Linux from the OS type drop-down list.
8. From the Version drop-down list, select Debian Jessie. Click Forward.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 75 -

3c. Installing a Virtual Appliance on a KVM Host (ISO)
9. Increase the Memory (RAM) and CPUs to the amount shown in the Resource Requirements section. Review Resource Requirements to allocate sufficient resources. This step is critical for system performance. If you choose to deploy Cisco Stealthwatch appliances without the required resources, you assume the responsibility to closely monitor your appliance resource utilization and increase resources as needed to ensure proper health and function of the deployment.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 76 -

3c. Installing a Virtual Appliance on a KVM Host (ISO)
10. Select Create a disk image for the virtual machine. 11. Enter the data storage amount shown for the appliance in Resource
Requirements section. Click Forward.

Review Resource Requirements to allocate sufficient resources. This step is critical for system performance.
If you choose to deploy Cisco Stealthwatch appliances without the required resources, you assume the responsibility to closely monitor your appliance resource utilization and increase resources as needed to ensure proper health and function of the deployment.
12. Assign a Name for the virtual machine. This will be the display name, so use a name that will help you find it later.
13. Check the Customize configuration before install check box. 14. In the Network selection drop-down box, select the applicable network and port
group for installation. If this is a Data Node, select a network and port group that will allow the Data Node to communicate on a public network with other appliances.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 77 -

3c. Installing a Virtual Appliance on a KVM Host (ISO)
15. Click Finish. The configuration menu opens.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 78 -

3c. Installing a Virtual Appliance on a KVM Host (ISO)
16. In the navigation pane, select NIC. 17. Under Virtual Network Interface, select e1000 in the Device model drop-down
box. Click Apply.

18. Click VirtIO Disk 1. 19. In the Advanced Options drop-down list, select SCSI in the Disk bus drop-down
box. Click Apply. 20. Do you need to add additional NICS for monitoring ports on the Flow Sensor VE, or
to enable inter-Data Node communications on a Data Node VE?
l If yes, go to 2. Adding NIC (Data Node, Flow Sensor) and Promiscuous Port Monitoring on an Open vSwitch (Flow Sensors Only).
l If no, go to the next step.
21. Click Begin Installation. 22. Go to 4. Configuring your Environment using First Time Setup.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 79 -

3c. Installing a Virtual Appliance on a KVM Host (ISO)
2. Adding NIC (Data Node, Flow Sensor) and Promiscuous Port Monitoring on an Open vSwitch (Flow Sensors Only)
To add additional NICs for the Flow Sensor VE monitoring ports or Data Node VE and to complete the installation, complete the following steps:
1. In the Configuration Menu, click Add Hardware. The Add New Virtual Hardware dialog box displays.
2. In the left navigation pane, click Network.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 80 -

3c. Installing a Virtual Appliance on a KVM Host (ISO)
3. If this is a Flow Sensor, click the Portgroup drop-down list to select an unassigned promiscuous port group you want to monitor. Click the Device Model drop-down list to select e1000. If this is a Data Node, select a network source that will allow for inter-Data Node communication on an isolated LAN, using the configuration that you created in Configuring an isolated LAN for Data Nodes.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 81 -

3c. Installing a Virtual Appliance on a KVM Host (ISO)
4. Click Finish. 5. If you need to add another monitoring port, repeat these instructions. 6. After you have added all monitoring ports, click Begin Installation.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 82 -

4. Configuring your Environment using First Time Setup
4. Configuring your Environment using First Time Setup
After you install the Stealthwatch VE appliances using VMware or KVM, you are ready to configure the basic virtual environment for them. Select the procedure for your appliance:
l Configuring a Stealthwatch Management Console or Flow Collector l Configuring a Data Node l Configuring a Flow Sensor or UDP Director
Configuring a Stealthwatch Management Console or Flow Collector
1. Connect to your Hypervisor host (virtual machine host). 2. In the Hypervisor host, locate your virtual machine. 3. Confirm the virtual machine is powered on.
If the virtual machine does not power on, and you receive an error message about insufficient available memory, do one of the following:
l Resources: Increase the available resources on the system where the appliance is installed. Refer to Resource Requirements section for details.
l VMware Environment: Increase the memory reservation limit for the appliance and its resource pool.
Review Resource Requirements to allocate sufficient resources. This step is critical for system performance.
If you choose to deploy Cisco Stealthwatch appliances without the required resources, you assume the responsibility to closely monitor your appliance resource utilization and increase resources as needed to ensure proper health and function of the deployment.
4. Access the virtual machine console. Allow the virtual appliance to finish booting up.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 83 -

4. Configuring your Environment using First Time Setup
5. Log in through the console. l Login: root l Default Password: lan1cope l You will change the default password when you configure the system.
6. At the command prompt, type SystemConfig. Press Enter. 7. Review the failed login attempts information. Select OK to continue.
8. Review the First Time Setup introduction. Select OK to continue.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 84 -

4. Configuring your Environment using First Time Setup
9. Do you want to deploy a Data Store? Select Yes.
SMC and Flow Collectors: Make sure you select Yes on your SMCs and Flow Collectors.
After you choose to configure your SMC or Flow Collector for use with Data Store, you cannot change this configuration. Select Yes only if you plan to deploy a Data Store to your network.
If you select the wrong choice, deploy a new virtual appliance or RFD your virtual appliance.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 85 -

4. Configuring your Environment using First Time Setup
10. Do you want to enable Security Analytics and Logging? Select Yes or No.
More Information: If you enable Security Analytics and Logging (OP), you will use your Stealthwatch deployment to store Firepower event information. Note that this disables NetFlow collection on your Flow Collector.
l SMC and Flow Collectors: If you enable Security Analytics and Logging on your SMC, you must enable SAL on the Flow Collector.
l Guide: Refer to the Security Analytics and Logging: Firepower Event Integration Guide for more information.
l App Requirement: If you configure Security Analytics and Logging On Prem, install the Security Analytics and Logging On Prem app on your Stealthwatch Management Console.
After you choose to configure your SMC or Flow Collector for use with Security Analytics and Logging On Prem, you cannot change this configuration. Select Yes only if you plan to use Stealthwatch for Security Analytics and Logging On Prem to store your Firepower event information.
If you select the wrong choice, deploy a new virtual appliance or RFD your virtual appliance.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 86 -

4. Configuring your Environment using First Time Setup
11. Select OK to confirm your selection.

12. Enter the management interface IP Address, Netmask, Gateway, Broadcast, Host Name, and Domain, then select OK to continue.

13. Confirm your settings. Select Yes to continue.
© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 87 -

4. Configuring your Environment using First Time Setup

14. Select OK to confirm your selection. Follow the on-screen prompts to finish the virtual environment and restart the appliance.
15. Press Ctrl + Alt to exit the console.
16. Repeat all the steps in 4. Configuring your Environment using First Time Setup for the next SMC or Flow Collector in your system. If you've configured all SMCs and Flow Collectors in First Time Setup, go to Configuring a Data Node.
Configuring a Data Node
1. Connect to your Hypervisor host (virtual machine host). 2. In the Hypervisor host, locate your virtual machine. 3. Confirm the virtual machine is powered on.
If the virtual machine does not power on, and you receive an error message about insufficient available memory, do one of the following:
l Resources: Increase the available resources on the system where the appliance is installed. Refer to Resource Requirements section for details.
l VMware Environment: Increase the memory reservation limit for the appliance and its resource pool.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 88 -

4. Configuring your Environment using First Time Setup
Review Resource Requirements to allocate sufficient resources. This step is critical for system performance.
If you choose to deploy Cisco Stealthwatch appliances without the required resources, you assume the responsibility to closely monitor your appliance resource utilization and increase resources as needed to ensure proper health and function of the deployment.
4. Access the virtual machine console. Allow the virtual appliance to finish booting up.
5. Log in through the console. l Login: root l Default Password: lan1cope l You will change the default password when you configure the system.
6. At the command prompt, type SystemConfig. Press Enter. 7. Review the failed login attempts information. Select OK to continue.

8. Review the First Time Setup introduction. Select OK to continue.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 89 -

4. Configuring your Environment using First Time Setup

9. Enter the management interface IP Address, Netmask, Gateway, Broadcast, Host Name, and Domain, then select OK to continue.

10. Confirm your settings. Select Yes to continue.
© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 90 -

4. Configuring your Environment using First Time Setup

11. Select OK to confirm your selection. Follow the on-screen prompts.
12. Configure a physical port or port channel for inter-Data Node communications. Enter the following:
l IP Address: eth1 interface for inter-Data Node communications with a non-routable IP Address from the 169.254.42.0/24 CIDR block, between 169.254.42.2 and 169.254.42.254. For ease of maintenance, select sequential IP addresses (such as 169.254.42.10, 169.254.42.20, and 169.254.42.30).
l Netmask: 255.255.255.0
l Gateway: 169.254.42.1
l Broadcast: 169.254.42.255

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 91 -

4. Configuring your Environment using First Time Setup

13. Select OK to continue. 14. Confirm your settings. Select Yes to continue.

15. Follow the on-screen prompts to finish the virtual environment and restart the appliance.
16. Press Ctrl + Alt to exit the console.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 92 -

4. Configuring your Environment using First Time Setup
17. Repeat all the steps in Configuring a Data Node for the next Data Node in your system.
l If you've configured all Data Nodes in First Time Setup, go to Configuring a Flow Sensor or UDP Director.
l If you've configured all your virtual appliances in First Time Setup, go to 5. Configuring your Stealthwatch System.
Configuring a Flow Sensor or UDP Director
1. Connect to your Hypervisor host (virtual machine host). 2. In the Hypervisor host, locate your virtual machine. 3. Confirm the virtual machine is powered on.
If the virtual machine does not power on, and you receive an error message about insufficient available memory, do one of the following:
l Resources: Increase the available resources on the system where the appliance is installed. Refer to Resource Requirements section for details.
l VMware Environment: Increase the memory reservation limit for the appliance and its resource pool.
Review Resource Requirements to allocate sufficient resources. This step is critical for system performance.
If you choose to deploy Cisco Stealthwatch appliances without the required resources, you assume the responsibility to closely monitor your appliance resource utilization and increase resources as needed to ensure proper health and function of the deployment.
4. Access the virtual machine console. Allow the virtual appliance to finish booting up.
5. Log in through the console. l Login: root l Default Password: lan1cope l You will change the default password when you configure the system.
6. At the command prompt, type SystemConfig. Press Enter.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 93 -

4. Configuring your Environment using First Time Setup
7. Review the failed login attempts information. Select OK to continue.

8. Review the First Time Setup introduction. Select OK to continue.

9. Enter the management interface IP Address, Netmask, Gateway, Broadcast, Host Name, and Domain, then select OK to continue.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 94 -

4. Configuring your Environment using First Time Setup

10. Confirm your settings. Select Yes to continue.

11. Select OK to confirm your selection. Follow the on-screen prompts to finish the virtual environment and restart the appliance.
12. Press Ctrl + Alt to exit the console. 13. Repeat all the steps in 4. Configuring your Environment using First Time
Setup for the next virtual appliance in your system.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 95 -

4. Configuring your Environment using First Time Setup
If you've configured all your virtual appliances in First Time Setup, go to 5. Configuring your Stealthwatch System.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 96 -

4. Configuring your Environment using First Time Setup
Troubleshooting
Certificate Error
If your VM environment usage is high, there may be a timing error and some events occur out of order. If you receive the following error that permission is denied due to a certificate error (.crt), do the following:

1. Log in to the appliance console as sysadmin. The default password is lan1cope.
You will change the default password when you configure the system. For more information, refer to the Stealthwatch System Configuration Guide.
2. Run the following command:
/lancope/admin/plugins/update/.98-FIX-SECRET-PERMS.sh
3. Run SystemConfig. 4. Return to 4. Configuring your Environment using First Time Setup (starting at
step 5) and complete all steps in the section. If you cannot access the appliance, please contact Cisco Stealthwatch Support.
Accessing the Appliance
If you cannot access the appliance after it restarts, do the following: 1. Log in as root. 2. Run the following commands and confirm the docker containers and services are up and running:

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 97 -

4. Configuring your Environment using First Time Setup
l docker ps l systemctl list-units --failed l systemd-analyze critical chain 3. Once all docker containers and services are up and running, try the login again. If you cannot access the appliance, please contact Cisco Stealthwatch Support.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 98 -

5. Configuring your Stealthwatch System
5. Configuring your Stealthwatch System
As you deploy your SMC VE, Data Nodes VE, and Flow Collectors VE, configure that appliance using the Stealthwatch System Configuration Guide v7.3.2 and note the following:
l Certificates: Appliances are installed with a unique, self-signed appliance identity certificate.
l Central Management: Use the primary SMC/Central Manager to manage your appliances and change configuration settings.
Make sure that each appliance is Up in Central Management before continuing to the next appliance. After the SMC VE, Data Nodes VE, and Flow Collectors VE are deployed and configured in Stealthwatch, use the Data Store Virtual Edition Deployment and Configuration Guide to initialize the Data Store and configure flow interface statistics data retention.

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 99 -

Contacting Support
Contacting Support
If you need technical support, please do one of the following: l Contact your local Cisco Partner l Contact Cisco Stealthwatch Support l To open a case by web: http://www.cisco.com/c/en/us/support/index.html l To open a case by email: tac@cisco.com l For phone support: 1-800-553-2447 (U.S.) l For worldwide support numbers: https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwidecontacts.html

© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.

- 100 -

Copyright Information
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: https://www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1721R)
© 2021 Cisco Systems, Inc. and/or its affiliates. All rights reserved.


madbuild