A guide to the hardware and software required for the proper implementation of a Fire Scope SPM instance.

Overview

The following outlines the minimum requirements required for implementation of Fire Scope. Please note that Fire Scope only supports environments whose dependencies are within the current support by the original equipment manufacturer. For example, Fire Scope virtual machines will not be supported on VMware versions that have reached the end of general support by VMware.

Edge Device System Requirements

Edge devices can be physical or virtual appliances. They are deployed on-premise to perform discovery of IT assets, data collection and accurately forwarding all of this data to the Fire Scope cloud.

  • 8 v CPUs
  • 12 GB of RAM
  • 120GB for Primary Disk

Note: The storage requirement for the Edge device is large, to ensure sufficient storage space for caching in case of loss of connectivity with the Fire Scope cloud. The number of Configuration Items it collects from frequency of polling, and scope of data collection methodologies impact its performance.

Additional Components Required for an On-Site Implementation

In addition to the overall environment requirements, ensure that you meet the requirements for each individual component. Requirements for each component—EWC, EAC, ESC are outlined in the following sections. Please note that if you are implementing Fire Scope using the Software-as-a-Service(Saa S) model, the following components will not be required.

Elastic Web Component (EWC)

Of the three cloud components of Fire Scope , the EWC has the lowest requirements as this component is dedicated to delivering the Fire Scope user experience and nothing else. Because of this role, the primary consideration in sizing is the number of concurrent users. Factors such as the size of the environment and activity will not significantly impact the EWC. As a result, in many environments, only a few EWC instances may be required.

Each UI server needs:

  • 4 v CPUs
  • 4 GB of RAM
  • 40GB for Primary Disk

Elastic Application Component (EAC)

The EAC is responsible for receiving data from the Edge device(s), normalizing the data, and analyzing status of Event Definitions, Aggregate Event Definitions, and Policies. Therefore, CPU becomes a critical requirement for this component.

  • 6 v CPUs
  • 12 GB of RAM
  • 60GB for Primary Disk

Elastic Storage Component (ESC)

Storage and memory are key for the ESC, as this is where all Attribute data is stored and queried. As much of the data set as possible is stored in memory for best query performance, therefore the amount of memory provided for this type of instance has implications on performance of the entire solution. Data retention settings are also key considerations for this instance type.

  • 4 v CPU
  • 24 GB of RAM
  • 60GB for Primary Disk
  • 500GB for Secondary Disk

Note: For each ESC, provision a secondary VMDK with minimum storage of 500 GB. Also, anti affinity rules must be in place to ensure no 2 ESC nodes are ever on the same host or datastore.

Port Communication Requirements

All communication between the Edge device and the Fire Scope cloud is initiated by the Edge device for security purposes. The following ports will need to be open for successful communication between Fire Scope and each Edge device.

Internal

The following table specifies the internal ports you must keep open for the listed servers.

Servers Open Ports
Elastic Storage Component(ESC) <———-> Elastic Web Component (EWC) 22, 27020, 30000, 40000
Elastic Web Component (EWC) <–——-> Elastic Application Component( EAC) 22, 25, 80, 443, 8080
http: 28050, 28051 https: 28060, 28061
Elastic Application Component( EAC)<–——-> Elastic Web Component (EWC) 15672, 5671, 5672
Elastic Application Component( EAC)<———-> Elastic Storage Component(ESC) 22. 30000, 40000
Edge <———-> Elastic Application Component( EAC) http: 18050, 18051 https: 18060, 18061, 5671, 5672
Analytic Client Machine 40000

External

The following table specifies the external ports you must keep open for the listed servers.

Servers Open Ports
Elastic Web Component (EWC) 80, 443
EMI 8004
Edge <———-> Elastic Application Component( EAC) http: 18050, 18051 https: 18060, 18061, 5671, 5672
Analytic Client Machine 40000
All Servers ←——-→ controller.firescope.com 80, 443
Web Services 38050, 38051, 38060, 38061
Edge —-> Rabbit MQ 5672 , 5671
s Flow Collector ——> Edge 6343(UDP)
Net Flow Collector —-> Edge 2100 (UDP)
AWS VPC Flow Logs ——> Edge 2200

Note:

  • If you want to use 38060 for SSL you need to disable peer authentication.
  • Edge to Rabbit MQ—The edge has to reach web2 via ssl port 5671 or non ssl port 5672.
  • The address each Edge should use to reach the Rabbit MQ is to be filled out in the Global Network Traffic Settings form on the Edge Devices page inside your account.
    Enter the address in Application Messaging IP/DNS field.

Web Browser Requirements

Fire Scope supports the following Web browsers:

Internet Explorer 8 and above
Note: Compatibility mode not supported. HTML5 is not natively supported in versions older than 9.
Fire Fox 6 and above
Safari 3.2 and above
Chrome 6.0 and above

Additionally, the following requirements apply to all browsers:

  • Java Script is enabled
  • Minimum resolution: 1024 x 768

On-Site Implementations Minimum Requirements

If you are opting for a private instance of Fire Scope , there are additional requirements needed for the Fire Scope Cloud itself. All of the previous minimum requirements are still required.

Ensure that you meet the following environment requirements to deploy Fire Scope successfully.

ESX Servers 3 (5 preferred)
Minimum Instances 3 x EWC
2 x EAC
2 x ESC
1 x Edge Device
VM Environment ESX servers with proper configuration, running versions currently under active support by VMware
(Key settings are correct Time Source and Hostname)
Standard VMware images, with VMDK support
Supported Storage FC SAN (preferred)
Fast i SCSI
Direct Attached SAS
*NAS is not supported.
Network Fast Ethernet, fully switched
Distributed v Switches for ESX

All primary components (EWC, EAC, and ESC) communicate over TCP/IP Protocol within the Cloud Environment. Each layer must have the appropriate access to the other layers in order for the application to perform optimally. As the Cloud Environment is typically housed in the same location, no special firewall rules or protocols should be required.