ConnectSecure V4 On-Premise Setup

ConnectSecure's on-Premise VM setup is appealing for many businesses with specific data security, privacy, and compliance needs and priorities.

For Successful Replication - Bidirectional communication on port 443 & 4222 needs to be enabled for both V3 On premise and V4 On Premise servers.

For on-premise servers, it is the responsibility of the partners to perform regular backups. Since the servers are managed locally rather than being hosted in the cloud, partners need to ensure that consistent and reliable backups are taken to safeguard data and prevent potential loss.


Topic - Table of Contents

Prerequisites

Thick Provisioning should be used for storage space; otherwise, you may need to manually expand disk space/storage. For help on expanding the disk space, please see the section below:

https://cybercns.atlassian.net/wiki/spaces/CVB/pages/edit-v2/2232844301#How-to-grow-disk-size

Please take your On Premise VM backup on regular basis as ConnectSecure will not responsible for any data loss.

VM configuration

Asset Count

RAM (GB)

CPU

Disk (GB)

1-2500

16

4

100

2501-5000

32

8

200

5001-7500

48

12

300

Whitelisting

Destination

Ports

Communication

Description

*ubuntu.com *.launchpad.net

80,443

Bidirectional

Ubuntu Security Patches

pypi.python.org

80,443

Bidirectional

Python packages installation

pypi.org

pythonhosted.org

signup.myconnectsecure.com (216.128.147.176

144.202.61.59

144.202.54.5

45.64.78.197)

443

Bidirectional

Central Server

swmanager.myconnectsecure.com (35.172.127.134, 52.22.184.112)

softwarerepo (144.202.22.162)

443, 4222

Bidirectional

Vulnerability Database

s3.amazonaws.com

443, 4222

Bidirectional

For Agent Download

ConnectSecure installation domain. Eg. <tenantname>.myconnectsecure.com

443, 4222

Bidirectional

For Agent Download

configuration.myconnectsecure.com

api.myconnectsecure.com

443, 4222

Bidirectional

For Agent Download

Cloudflare IP List

OR

*.myconnectsecure.com

443

Bidirectional

For Agent Download

ConnectSecure Central server (45.32.217.250)

5 ,22, 4505, 4506, 443

Bidirectional

 For Patching and updates to be pushed from central server

vpn.myconnectsecure.com

5,22

bidirectional

For ConnectSecure Updates and troubleshooting purposes.

  • Ensure that SSH access (Port-5) is enabled to the specific IP address (45.32.217.250) until the sign-up, installation, and replication from V3 to V4 process is complete.

  • Ports 4505 and 4506 should be OPEN throughout ConnectSecure usage.


Installation Methods

note

Server OS used is Ubuntu 22.04 - No need to download the server OS separately.

Server OS used is Ubuntu 22.04 - No need to download the server OS separately.

VM Install with VMware 5.5 - OVA file

  1. Download the OVA file using following command: (Please use terminal)

>> wget https://pui.myconnectsecure.com/ova/consecure-V4-onprem.ova

  1. Create a Virtual Machine with the configuration provided under Prerequisites.

Sample VM created screenshot as follows:

Screenshot 2024-07-10 at 12.08.34 PM.pngScreenshot 2024-07-10 at 12.08.53 PM.pngScreenshot 2024-07-10 at 12.09.01 PM.pngScreenshot 2024-07-10 at 12.09.51 PM.pngScreenshot 2024-07-10 at 12.10.56 PM.pngScreenshot 2024-07-10 at 12.11.01 PM.pngScreenshot 2024-07-10 at 12.11.15 PM.pngScreenshot 2024-07-10 at 12.11.26 PM.pngScreenshot 2024-07-10 at 12.11.33 PM.pngScreenshot 2024-07-10 at 12.11.52 PM.png

VM Install with VMware ESXi 7.0 - OVA file

  1. Download the OVA file using following command: (Please use terminal to download)

>> wget https://pui.myconnectsecure.com/ova/consecure-V4-onprem.ova

  1. Navigate to Virtual Machine option and select to Create a new virtual machine under VMWare ESXi 7.0.

image-20241003-090157.png
  1. Under Select creation type, choose Deploy a virtual machine from an OVF or OVA file.

image-20241003-090111.png
  1. Select the downloaded OVA file location to attach the OVA.

image-20241003-090148.png
  1. Select standard required storage as per prerequisites.

image-20241003-090141.png
  1. Navigate to Deployment options and select appropriate Network mappings, Disk Provisioning as Thin and select a checkbox for Power on automatically.

image-20241003-090122.png
  1. Click on Finish as VM is ready.

image-20241003-090130.png

Once the VM is ready, it will power up automatically.


VM Install with Azure - VHD

This is a 32GB image and needs to be uploaded to your Microsoft Azure Storage Account.

  1. Download the Azure VHD from here.

  2. Login to your https://portal.azure.com/

  3. Browse for All Services and select “Storage Accounts” from the details.

Screenshot 2024-07-22 at 8.10.10 PM.png
  1. Select to create a storage account as follows.

Screenshot 2024-07-22 at 8.07.03 PM.png
  1. Select Storage Account details as follows and use Review+create to create it.

Subscription: As required (same has to be used while creating other components)

Resource Group: As required (same has to be used while creating other components)

Storage Account Name: As required (same has to be used while creating other components)

Region: As required (same has to be used while creating other components)

Performance: Standard is suitable for most scenarios.

Screenshot 2024-07-24 at 12.36.15 PM.png

From Advanced Settings, enable the following Security Settings.

Screenshot 2024-07-24 at 12.33.27 PM.png
  1. Select the created storage account from the list to create a container under it.

Screenshot 2024-07-22 at 8.20.31 PM.png
  1. Select Containers as shown and click on +Container to create a new container for the storage account.

Screenshot 2024-07-22 at 8.36.02 PM.png
  1. Select the Created Container and select to upload the downloaded Azure VHD using the browse for files option and upload it successfully.

Screenshot 2024-07-22 at 8.54.17 PM.pngScreenshot 2024-07-22 at 8.58.02 PM.png
  1. Next, Create an Image with following details and use Review+create to create it.

Subscription: As required

Resource Group: As required (Use the same resource group as used for Storage Account)

Name: As required (same has to be used while creating other related components)

Region: As required (Use the same resource group as used for Storage Account)

OS type: Linux

VM Generation: Gen 2

Storage Blob: Select the created Storage Account.

Screenshot 2024-07-22 at 7.21.12 PM.png
  1. Next, Select to create a Virtual Machine with following details and use Review+create to create it.

Subscription: As required

Resource Group: As required (Use the same resource group as used for Storage Account)

Virtual Machine Name: As required

Image: Select All Images and select the image created earlier.

VM Architecture: x64

Size: Auto selected with be standard

Screenshot 2024-07-22 at 7.47.09 PM.png

Authentication Type: SSH public key

SSH public key source: Generate new key pair

SSH Key Type: RSA SSH Format

Key pair name: As required

Select inbound ports: SSH (22)

Licensing: As required

Screenshot 2024-07-22 at 7.47.35 PM.png
  1. Select the created Virtual Machine and verify the Public IP and Internal Static IP assigned to it.

Screenshot 2024-07-22 at 7.49.05 PM.png

VM Install with HyperV - VHDX

  1. Download the VHDX using following: (Please use terminal to download)

>>wget https://pui.myconnectsecure.com/ova/consecure_v4.vhdx

  1. Login to your Hyper-V Manager.

image-20240809-115416.png
  1. Start with New Virtual Machine creation wizard.

image-20240809-115758.png
  1. Specify Name for the VM.

image-20240809-115751.png
  1. Specify Generation as Generation 2.

image-20240809-115703.png
  1. Configure networking by selecting the connection.

image-20240809-115819.png
  1. Connect Virtual Hard Disk - Please “Use an existing virtual hard disk” option and select the downloaded VDHX.

image-20240809-115831.png
  1. Once the VM is ready, start the VM.

  2. Select the created Virtual Machine and verify the Internal Static IP assigned to it which has to be mapped to a Public IP.

VM Install under AWS using VHDX

  1. Download the VHDX using following: (Please use terminal to download)

>>wget https://pui.myconnectsecure.com/ova/consecure_v4.vhdx

  1. Login to your AWS account.

  2. Please upload VHDX to S3 bucket.( Copy bucket name, token key and security key to be used later)

  3. Follow below steps to create AMI using VHDX file.

  1. Run below command on the terminal window:

  • Use your S3 buckets information such as bucket name, token key and security key for creating AMI.

  • Below command takes approx 30mins to complete to import image.

>>aws ec2 import-image --description "onPremCS" --disk-container "Format=VMDK,UserBucket={S3Bucket=onprem-v4,S3Key=Onprem VHDX.vhdx}"

image-20241007-123333.png
  1. If this import is not working follow the below steps as there might be an issue with the policy

{

   "Version": "2012-10-17",

   "Statement": [

      {

         "Effect": "Allow",

         "Principal": { "Service": "vmie.amazonaws.com" },

         "Action": "sts:AssumeRole",

         "Condition": {

            "StringEquals":{

               "sts:Externalid": "vmimport"

            }

         }

      }

   ]

}

>> aws iam create-role --role-name vmimport --assume-role-policy-document file://trust-policy.json

{

   "Version":"2012-10-17",

   "Statement":[

      {

         "Effect": "Allow",

         "Action": [

            "s3:GetBucketLocation",

            "s3:GetObject",

            "s3:ListBucket"

         ],

         "Resource": [

            "arn:aws:s3:::your-bucket-name",

            "arn:aws:s3:::your-bucket-name/*"

         ]

      },

      {

         "Effect": "Allow",

         "Action": [

            "ec2:ModifySnapshotAttribute",

            "ec2:CopySnapshot",

            "ec2:RegisterImage",

            "ec2:Describe*"

         ],

         "Resource": "*"

      }

   ]

}

>> aws iam put-role-policy --role-name vmimport --policy-name vmimport --policy-document file://role-policy.json

>>aws ec2 describe-import-image-tasks

  1. Few pointers:

Allow SSH, https and https for the security group attached.

  1. AMI will be created successfully.

  1. Launch the AMI using EC2 instance under the tier of your requirement.

10. Once this is ready, please let the support team know to proceed further.


Openstack Import OVA from VMware

  1. Get the OVA template

Please download the VHD file from the link provided below. https://onprem-v4.s3.amazonaws.com/Azure+VHD

  1. Convert the virtual disk for OpenStack

.\qemu-img.exe convert -f vhd -O qcow2 C:\onprem\onprem.vhd C:\onprem\onprem.qcow2 

  1. Import the qcow2 image to OpenStack

  2. With the qcow2 image imported to OpenStack, you can launch an instance in OpenStack. Just select Compute and then select Launch Instance.


On Premise Sign up Setup

On Premise Setup continues with Sign Up Process.

Screenshot 2024-07-10 at 12.28.50 PM.pngScreenshot 2024-07-10 at 12.29.04 PM.pngScreenshot 2024-07-10 at 12.48.50 PM.pngScreenshot 2024-07-10 at 12.52.19 PM.pngScreenshot 2024-07-10 at 12.53.34 PM.pngScreenshot 2024-07-10 at 12.53.53 PM.pngScreenshot 2024-07-10 at 12.53.10 PM.pngScreenshot 2024-07-10 at 12.56.45 PM.pngScreenshot 2024-07-10 at 7.45.28 PM.pngScreenshot 2024-07-10 at 7.46.33 PM.pngScreenshot 2024-07-10 at 12.59.53 PM.pngScreenshot 2024-07-10 at 12.59.32 PM.png


Start Using ConnectSecure V4

Screenshot 2024-07-10 at 7.40.15 PM.png


Help

How to grow disk size

  1. For VM with VMWare

  1. Using SSH

  1. To increase specific partition

How to assign a Static IP to a VM

  1. Log in to the vCenter Server from the vSphere Client.

  2. Select the host in the inventory.

  3. On the Configure tab, expand Networking.

  4. Select VMkernel adapters.

  5. Select vmk0 Management Network and click the edit icon.

  6. Select IPv4 settings.

  7. Select Use static IPv4 settings.

  8. Enter or change the static IPv4 address settings.

  9. (Optional) Set static IPv6 addresses.

    1. Select IPv6 settings.

    2. Select Static IPv6 addresses.

    3. Click the add icon.

    4. Type the IPv6 address and click OK.

  10. Click OK


Info

Tap to view the Getting Started info; see the link below for additional information.

Getting Started In App Info


Need Support?

Contact our support team by sending an email to support@connectsecure.com or by visiting our Partner Portal, where you can create, view, and manage your tickets.

https://cybercns.freshdesk.com/en/support/login

image-20240206-144508.png