Network Requirements

To enable the flow of traffic between the components and the monitoring tools, your VNets and VMs should meet the following requirements:

Subnets for VNet
Network Interfaces (NICs) for VMs

Subnets for VNet

Table 1: Types of Subnets lists the two recommended subnets that your VNet must have to configure the GigaSECURE® Cloud components in Azure.

Table 1: Types of Subnets

Subnet

Description

Management Subnet

Subnet that the GigaVUE-FM uses to communicate with the GigaVUE V Series nodes and controllers.

Data Subnet

A data subnet can accept incoming mirrored traffic from agents to the GigaVUE V Series nodes or be used to egress traffic to a tool from the GigaVUE V Series nodes.

Ingress is VXLAN from agents
Egress is either VXLAN tunnel to tools or to GigaVUE H Series tunnel port, or raw packets through a NAT when using NetFlow.

Note: If you are using a single subnet, then the Management subnet will also be used as a Data Subnet.

Network Interfaces (NICs) for VMs

For G-vTAP agents to mirror the traffic from the VMs, you must configure one or more Network Interfaces (NICs) on the VMs.

Single NIC—If there is only one interface configured on the VM with the G-vTAP agent, the G-vTAP agent sends the mirrored traffic out using the same interface.
Multiple NICs—If there are two or more interfaces configured on the VM with the G-vTAP agent, the G-vTAP agent monitors any number of interfaces but has an option to send the mirrored traffic out using any one of the interfaces or using a separate, non-monitored interface.

Network Security Groups

A network security group defines the virtual firewall rules for your VM to control inbound and outbound traffic. When you launch GigaVUE-FM, GigaVUE V Series Controllers, GigaVUE V Series nodes, and G-vTAP Controllers in your VNet, you add rules that control the inbound traffic to VMs, and a separate set of rules that control the outbound traffic.

It is recommended to create a separate security group for each component using the rules and port numbers listed in Table 2: Security Group Rules .

Table 2: Security Group Rules

Direction

 

Protocol

Port Range

Source and

CIDR, IP, or Security Group

Purpose

GigaVUE-FM Inside Azure

Inbound

HTTPS

TCP(6)

443

Anywhere

Any IP

Allows G-vTAP Controllers, GigaVUE V Series Controllers, and GigaVUE-FM administrators to communicate with GigaVUE-FM

G-vTAP Controller

Inbound

Custom TCP Rule

TCP

9900

Custom

GigaVUE-FM IP

Allows GigaVUE-FM to communicate with G-vTAP Controllers

 

 

 

G-vTAP Agent

Inbound

Custom TCP Rule

TCP

9901

Custom

G-vTAP Controller IP

Allows G-vTAP Controllers to communicate with G-vTAP agents

GigaVUE V Series Controller

Inbound

Custom TCP Rule

TCP

9902

Custom

GigaVUE-FM IP

Allows GigaVUE-FM  to communicate with GigaVUE V Series Controllers

GigaVUE V Series node

Inbound

Custom TCP Rule

TCP

9903

Custom

GigaVUE V Series Controller IP

Allows GigaVUE V Series Controllers to communicate with GigaVUE V Series nodes

VXLAN Traffic

Inbound

Custom UDP Rule

VXLAN

4789

 

Allows mirrored traffic from G-vTAP agents to be sent to GigaVUE V Series nodes using VXLAN tunnel

Allows monitored traffic to be sent from GigaVUE V Series nodes to the tools using VXLAN tunnel