Cisco AMP Threat Grid Appliance Setup and Configuration Guide
PLANNING
6
Hardware Documentation
Installation and Service Guide for Cisco UCS C220 M4 Server:
http://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/c/hw/C220M4/install/C220M4.pdf
Installation and Service Guide for Cisco UCS C220 M3 Server:
http://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/c/hw/C220/install/C220.html
Spec Sheet for Cisco UCS C220 M3 High-Density Rack Server (Small Form Factor Disk Drive Model):
http://www.cisco.com/c/dam/en/us/products/collateral/servers-unified-computing/ucs-c-series-rack-
servers/C220M3_SFF_SpecSheet.pdf
Cisco has a power/cooling calculator, which you may also find useful:
https://mainstayadvisor.com/Go/Cisco/Cisco-UCS-Power-Calculator.aspx
Network Requirements
The Threat Grid Appliance requires three networks:
ADMIN -
The "
Administrative"
network. Must be configured in order to perform the appliance setup.
CLEAN -
The "
Clean
" network is used for inbound, trusted traffic to the appliance (requests). This includes
integrated appliances. For example, the Cisco Email Security appliances and Web Security appliances
(ESA/WSA) connect to the IP address of the Clean interface.
Note:
The following specific, restricted kinds of network traffic can be outbound from Clean:
•
Remote syslog connections
•
Email messages sent by the Threat Grid Appliance itself
•
Disposition Update Service connections to FireAMP Private Cloud devices
•
DNS requests related to any of the above
•
LDAP
DIRTY -
The "
Dirty
" network is used for outbound traffic from the appliance (including malware traffic).
Note:
We recommend using a dedicated external IP address (i.e., the "
Dirty
" interface) that is different
from your corporate IP, in order to protect your internal network assets.
For network interface setup information and illustrations, see the Network Interfaces, and Network Interface
Connections Setup sections below.
DNS Server Access
The DNS server used for purposes other than Disposition Update Service lookups, resolving remote syslog
connections, and resolving the mail server used for notifications from the Threat Grid software itself needs
to be accessible via the dirty network.