background image

2

 

 

 

 

 

www.fidelissecurity.com

 

Copyright © 2022 Fidelis Cybersecurity

®

, Inc. All rights reserved

 

1. System Overview 

The Fidelis CommandPost appliance is the central component for command and control of Fidelis 
Network/Fidelis Deception components. With CommandPost, you create and edit sensor rules, craft 
metadata analytics and automation, view alerts from connected sensors and Collector components, and 
define and deploy Deception decoys. 

 

Figure 1: Fidelis Network/Fidelis Deception CommandPost Appliance – Rev-K 

CommandPost Setup Checklist 

 

Fidelis CommandPost – Appliance Requirements 

 

Appropriate rack space, power, and cooling (

Appendix B

 

 

Rack tools, rails, and connectors 

 

Keyboard and video monitor / KVM switch for temporary appliance setup 

 

Power cables – two per appliance, appropriate power source and region 

 

Ethernet cables (cat5e) for Admin and iLO ports (

Section 3

 

 

Network switches with enough physical ports (

Section 4

 

 

Logical network information: IP addresses, hostnames (

Section 5

Appendix A

 

 

2. Documentation, Passwords, and Technical Support 

Product Documentation 

You can find Fidelis Network/Fidelis Deception product documentation, appliance specifications, and 

instructions at 

https://support.fidelissecurity.com

 or through the 

 navigation item in the 

CommandPost user interface. 

Appliance Default Passwords 

System 

Account 

Default Password 

SSH / Appliance Console 

fidelis 

fidelispass 

CommandPost user interface 

admin 

system 

iLO 

administrator 

(printed on label, top of server) 

Содержание Deception CommandPost

Страница 1: ...ttackable surface areas automate exposure prevention threat detection and incident response and provide the context accuracy speed and portability security professionals need to find and neutralize ad...

Страница 2: ...ck tools rails and connectors Keyboard and video monitor KVM switch for temporary appliance setup Power cables two per appliance appropriate power source and region Ethernet cables cat5e for Admin and...

Страница 3: ...act Fidelis Cybersecurity Technical support at Phone 1 301 652 7190 Toll free in the US and Canada 1 800 652 4020 Email support fidelissecurity com Web https support fidelissecurity com 3 CommandPost...

Страница 4: ...of the appliance Use the tables below to determine the count and type of switch ports required to support the number of appliances for your deployment Admin Network The Admin network connects the Com...

Страница 5: ...5 0 Gateway 10 1 2 1 Proxy Server 10 5 6 7 DNS Servers 8 8 4 4 8 8 8 8 NTP Servers 0 pool1 ntp org Time Zone UTC 0 6 Appliance Installation Rack Installation Install each appliance in an enclosure loc...

Страница 6: ...ring iLO to Use a Static IP Address 1 Log into the iLO console https IP address where IP address is the iLO IP address 2 Specify the credentials Username Administrator Password A random eight characte...

Страница 7: ...ese values 7 Enter values in the IP Address Subnet Mask and Gateway IP Address boxes See Section 5 Appendix A 8 To save the changes and exit press F12 The iLO 5 Configuration Utility prompts you to co...

Страница 8: ...rform Initial Install or Factory Reset selected press Enter 3 Use the Up and Down arrow keys to select CommandPost and press Enter The system displays a screen with the message Congratulations your Ce...

Страница 9: ...e return to the top menu 9 When complete select OK to leave Setup 10 From the command line reboot the system sudo fss bin shutdown pl user admin reboot 8 Fidelis Licensing The Fidelis CommandPost come...

Страница 10: ...d site location Fidelis Cybersecurity Support will respond within one business day with a license key Enter a License Key After receiving a response to your license request 1 Copy the license key from...

Страница 11: ...iguration 6x HDD 600GB RAID 5 3 TB Effective Network Adapters Default Config 4x 1GbE Out of Band Management Integrated Lights Out Management iLO Power Supply Dual hot swap 800W High Efficiency AC powe...

Страница 12: ...the table below shows the software to apply based on the appliance SKU Note the SKU typically starts with FNH You can find the SKU in the following locations Appliance lid UID decal see sample on righ...

Страница 13: ...features help minimize attackable surface areas automate exposure prevention threat detection and incident response and provide the context accuracy speed and portability security professionals need...

Отзывы: