Cross-Network Protection
Alert Logic allows you to set up Cross-Network Protection from a manual deployment in the Alert Logic console. Cross-Network Protection creates connections across networks, in the same or different deployment, that use resources from a protecting network to protect other networks within the same account.
Cross-Network Protection allows an assigned network appliance, for Network IDS or scanning, to reside outside the protected network. This centralizes the appliances that provide protection to an account, which allows your organization to reduce infrastructure costs. Cross-Network Protection is also convenient for organizations that cannot add more appliances due to lack of address space, or due to policy concerns that prevent in-network deployment.
The following figure is an example of a network with an appliance in "Deployment A" that is protecting networks in its deployments, and other deployments in the same account:
Protecting networks and protected networks
A protecting network hosts the appliance. The network protected by the protecting network is the protected network.
Protecting networks and protected networks can be VPCs (AWS deployments), VNETs (Azure deployments), or networks (Data Center deployments), depending on your deployment type. The corresponding network type appears as such in your deployments in the Alert Logic console. For more information about deployment types, see About Deployment Types.
Protecting networks and protected networks are only in manual deployments. The Cross-Network Protection option is visible in manual deployments, and you can only configure a network that can be protected to connect to a protecting network.
Requirements for Cross-Network Protection
Before you set up Cross-Network Protection, you must configure the agents and appliances within your environment to connect with other networks. Otherwise, your appliances and protecting networks cannot communicate with other networks.
For Data Center networks that have no agents installed and are configured to SPAN or another port mirroring feature, Cross-Network Protection will not function. The SPAN configured network will continued to protect Data Center networks configured to the port mirroring feature.
Hosts in the protected network must have valid routes to the private IP address of appliances in the protecting network, using VPC peering, a VPN, or a similar network connectivity option. Appliances in the protecting network must have valid routes to the private IP addresses of protected hosts in the protected network, using VPC peering, a VPN, or a similar network connectivity option.
For information about configuring your AWS environment for AWS VPC peering, see AWS Peering Configurations. To learn how to configure your Azure environment for Azure VNET connections, see Azure VNET Connection tutorial. For an example of how you can configure your Data Center environment, see VPN between Two IOS Routers.
Network IDS protection requirements
For Network IDS protection, hosts in the protected network must be able to connect to appliances in the protecting network.
AWS Network IDS protection requirements
For AWS environments, ensure the following are allowed:
Network control | Assets | Direction | Type | Protocol | Port Range | Source/Destination | Notes |
---|---|---|---|---|---|---|---|
Security Group | Agented EC2 | Outbound | Custom TCP | TCP | 7777 | Alert Logic IDS appliance IPs (can also use Alert Logic appliance subnet CIDR) | Agent to appliance data transport |
NACL (Network Access Control List) | Agented EC2 Subnet | Outbound | Custom TCP | TCP | 7777 | Alert Logic IDS appliance IPs (can also use Alert Logic appliance subnet CIDR) | Agent to appliance data transport |
NACL | Agented EC2 Subnet | Inbound | Custom TCP | TCP | 32768-6100 | Alert Logic IDS appliance IPs (can also use Alert Logic appliance subnet CIDR) | Agent to appliance return data transport |
NACL | Alert Logic IDS Appliance Subnet | Inbound | Custom TCP | TCP | 7777 | Agented EC2 subnet CIDRs | Agent to appliance data transport |
NACL | Alert Logic IDS Appliance Subnet | Outbound | Custom TCP | TCP | 32768-6100 | Agented EC2 subnet CIDRs | Agent to appliance return data transport |
Security Group | Alert Logic IDS Appliance | Inbound | Custom TCP | TCP | 7777 | Agented EC2 subnet CIDRs | Agent to appliance data transport |
Network control | Asset | Destination | Target |
---|---|---|---|
Route Table | Agented EC2 VPC | AL IDS VPC CIDR | Peering Connection |
Route Table | AL IDS Appliance VPC | Agented EC2 VPC CIDR | Peering Connection |
Azure Network IDS protection requirements
For Azure environments, ensure the following are allowed:
Network control | Assets | Direction | Port | Protocol | Source | Destination | Action | Notes |
---|---|---|---|---|---|---|---|---|
Security Group | Agented Azure VM | Outbound | 7777 | TCP | Agented Azure VM | Alert Logic IDS appliance IPs (can also use Alert Logic appliance subnet CIDR) | Allow | Agent to appliance data transport |
Security Group | Alert Logic IDS Appliance | Inbound | 7777 | TCP |
Agented Azure VM subnet CIDRs |
Alert Logic IDS appliance(s) | Allow | Agent to appliance data transport |
Scanning requirements
For scanning, appliances in the protected network must be able to connect to protected hosts in the protected network to perform vulnerability assessment.
When you create an AWS manual mode deployment with the Alert Logic CloudFormation template, the deployment procedure creates a restrictive security group which may not allow vulnerability scans to work properly. The default outbound rules only allow the appliance from the protecting network to reach ports 53, 80, and 443 of the protected network. You must configure the security group of the appliance after you create the deployment to allow all outbound traffic from the protecting network to the protected network. For more information about AWS manual mode scanning appliances, see Amazon Web Services (AWS) Deployment Configuration—Manual Mode (Essentials Subscription) or Amazon Web Services (AWS) Deployment Configuration—Manual Mode (Professional Subscription).
AWS scanning requirements
For AWS environments, ensure the following are allowed:
Network control | Assets | Direction | Type | Protocol | Port Range | Source/Destination | Notes |
---|---|---|---|---|---|---|---|
Security Group | Agented EC2 | Inbound | All traffic | All | 0 - 65535 | Alert Logic IDS Appliance IPs (can also use Alert Logic appliance subnet CIDR) | Vulnerability scanning |
NACL (Network Access Control List) | Agented EC2 Subnet | Inbound | All traffic | All | 0 - 65535 | Alert Logic IDS Appliance IPs (can also use Alert Logic appliance subnet CIDR) | Vulnerability scanning |
NACL | Agented EC2 Subnet | Outbound | Custom TCP | TCP | 32768 - 61000 | Alert Logic IDS Appliance IPs (can also use Alert Logic appliance subnet CIDR) | Vulnerability scanning (Return traffic) |
NACL | Alert Logic IDS Appliance Subnet | Outbound | All traffic | All | 0 - 65535 | Agented EC2 subnet CIDRs | Vulnerability scanning |
NACL | Alert Logic IDS Appliance Subnet | Inbound | Custom TCP | TCP | 32768 - 61000 | Agented EC2 subnet CIDRs | Vulnerability scanning (Return traffic) |
Security Group | Alert Logic IDS Appliance | Outbound | All traffic | All | 0 - 65535 | Alert Logic IDS Appliance IPs (can also use Alert Logic appliance subnet CIDR) | Vulnerability scanning |
Azure scanning requirements
For Azure environments, ensure the following are allowed:
Network control | Assets | Direction | Port | Protocol | Source | Destination | Action | Notes |
---|---|---|---|---|---|---|---|---|
Security Group | Agented Azure VM | Inbound | 7777 | TCP | Agented Azure VM | Alert Logic IDS appliance IPs (can also use Alert Logic appliance subnet CIDR) | Allow | Vulnerability scanning |
Security Group | Alert Logic IDS Appliance | Out | 7777 | TCP | Agented Azure VM subnet CIDRs | Alert Logic IDS appliance IPs (can also use Alert Logic appliance subnet CIDR) | Allow | Vulnerability scanning |
Configure Cross-Network Protection
To configure Cross-Network Protection:
- In the Alert Logic console, open the deployment for which you want to configure Cross-Network Protection.
- On the side navigation, click Protection, and then click Options.
- Click the network or region you want to protect in the topology diagram, or in the Search Assets field, search for the network or region you want to protect.
- Click the search field to search or type the name of a protecting network, and then select one.
- Click SAVE.
Only manual mode deployments have the Cross-Network Protection option.
The protecting network and protected network are now visible in the topology diagram with distinguishing icons. The Cross-Network Protection Breakdown, on the top left of the topology graph, provides an overview of your Cross-Network Protection connections.
View protected networks
To view protected networks:
- Click the protecting network icon () to see the number of protected networks currently connected.
- Click the details icon () to see a slideout panel that contains protected network names.
View protecting networks
To view protecting networks, click the protected network icon ().
Remove a Cross-Network Protection
To remove a Cross-Network Protection connection:
- Click the protected network icon (), and then click the remove icon ().
- Click DELETE.
If there are any issues after you setup Cross-Network Protection, Alert Logic will create a configuration remediation that you can view in the Exposures page. To learn more about remediations, see Remediations view.