Moxa MXsecurity Series User manual

Type
User manual
MXsecurity User Manual
Version 1.1, August 2023
www.moxa.com/product
© 2023 Moxa Inc. All rights reserved.
MXsecurity User Manual
The software described in this manual is furnished under a license agreement and may be used only in accordance
with the terms of that agreement.
Copyright Notice
© 2023 Moxa Inc. All rights reserved.
Trademarks
The MOXA logo is a registered trademark of Moxa Inc.
All other trademarks or registered marks in this manual belong to their respective manufacturers.
Disclaimer
Information in this document is subject to change without notice and does not represent a commitment
on the part of Moxa.
Moxa provides this document as is, without warranty of any kind, either expressed or implied, including,
but not limited to, its particular purpose. Moxa reserves the right to make improvements and/or
changes to this manual, or to the products and/or the programs described in this manual, at any time.
Information provided in this manual is intended to be accurate and reliable. However, Moxa assumes no
responsibility for its use, or for any infringements on the rights of third parties that may result from its
use.
This product might include unintentional technical or typographical errors. Changes are periodically
made to the information herein to correct such errors, and these changes are incorporated into new
editions of the publication.
Technical Support Contact Information
www.moxa.com/support
Table of Contents
1. Introduction ......................................................................................................................................... 6
Key Features ......................................................................................................................................... 6
Centralized Management ................................................................................................................. 6
Unified, Error-free Mass Deployment ................................................................................................. 6
Real-time Visibility and Monitoring .................................................................................................... 6
Event Logs and Alert Notifications .................................................................................................... 6
Interactive Map View ...................................................................................................................... 6
Comprehensive Reports .................................................................................................................. 6
System Requirements ............................................................................................................................ 7
2. Installation ........................................................................................................................................... 8
Setting Up the Virtual Machine ................................................................................................................ 8
Installing MXsecurity on a VMware Workstation .................................................................................. 8
Installing MXsecurity on a VMware ESXi System ............................................................................... 11
Configuring the MXsecurity system ................................................................................................. 16
3. Migration ............................................................................................................................................ 19
Migrating to a Newer Version of MXview (VMware Workstation) ................................................................. 19
Migrating to a Newer Version of MXview (ESXi) ....................................................................................... 23
4. Getting Started ................................................................................................................................... 27
Getting Started Task List ...................................................................................................................... 27
Opening the Management Console ......................................................................................................... 27
Connecting Secure Routers to MXsecurity ............................................................................................... 29
5. Dashboard and Widgets ...................................................................................................................... 30
Dashboard Widgets Overview ................................................................................................................ 30
System Status ............................................................................................................................. 30
Node License Usage ...................................................................................................................... 30
Group Status ............................................................................................................................... 31
Top 5 Layer 3-7 Policy Events by Source IP ..................................................................................... 32
Top 5 Layer 3-7 Policy Events by Destination IP ............................................................................... 33
Top 5 Layer 3-7 Policy Events by Severity ....................................................................................... 34
Top 5 Protocol Filter Policy Events by Source IP ............................................................................... 35
Top 5 Protocol Filter Policy Events by Destination IP ......................................................................... 35
Top 5 Protocol Filter Policy Events by Severity ................................................................................. 36
Top 5 ADP Events by Source IP ...................................................................................................... 37
Top 5 ADP Events by Destination IP ................................................................................................ 37
Top 5 IPS Events by Source IP ....................................................................................................... 38
Top 5 IPS Events by Destination IP ................................................................................................. 39
Top 5 IPS Events by Severity ......................................................................................................... 41
Top 5 IPS Events by Category ........................................................................................................ 41
Connection Interface (Cellular Router) ............................................................................................ 42
Signal Quality (Cellular Router) ...................................................................................................... 42
Widget Management ............................................................................................................................ 44
Adding a Widget to the Dashboard ................................................................................................. 44
Removing a Widget from the Dashboard ......................................................................................... 45
Resizing a Widget ......................................................................................................................... 45
Moving the Widget Position ............................................................................................................ 46
6. Management ....................................................................................................................................... 47
Device Group Management ................................................................................................................... 48
Creating a New Device Group ........................................................................................................ 48
Deleting a Device Group ................................................................................................................ 49
Editing a Device Group .................................................................................................................. 50
Firmware Management ......................................................................................................................... 50
Uploading a New Firmware ............................................................................................................ 50
Deleting a Firmware ..................................................................................................................... 51
Exporting Firmware ...................................................................................................................... 52
Software Package Management ............................................................................................................. 52
Uploading a New Software Package ................................................................................................ 52
Deleting a Software Package .......................................................................................................... 53
Exporting Software Packages ......................................................................................................... 53
Viewing Detailed Information of a Software Package ......................................................................... 53
Object Management ............................................................................................................................. 54
Creating a New Filter Object .......................................................................................................... 54
Creating a New Interface Object ..................................................................................................... 56
Editing an Object .......................................................................................................................... 56
Deleting an Object ........................................................................................................................ 57
Policy Profile Management .................................................................................................................... 57
Creating a New Layer 3-7 Policy Profile ........................................................................................... 57
Creating a New Session Control Policy Profile ................................................................................... 60
Creating a New DoS Policy Profile ................................................................................................... 61
Creating a New IPS Policy Profile .................................................................................................... 63
Editing a Policy Profile ................................................................................................................... 64
Deleting a Policy Profile ................................................................................................................. 64
Device Configuration Management ......................................................................................................... 64
Uploading a Device Configuration File From a Local Host ................................................................... 64
Uploading a Configuration From a Device ........................................................................................ 65
7. Deployment ........................................................................................................................................ 67
Rebooting a Managed Device................................................................................................................. 67
Scheduling a Managed Device Reboot ..................................................................................................... 68
Deleting a Managed Device Reboot Schedule ........................................................................................... 69
Sending a Control SMS ......................................................................................................................... 69
Removing a Managed Device ................................................................................................................. 71
Deploying Policy Profiles to Managed Devices .......................................................................................... 72
Scheduling a Policy Profile Deployment for Managed Devices ..................................................................... 72
Deleting a Policy Profile Deployment Schedule ......................................................................................... 74
Upgrading the Software Package of Managed Devices .............................................................................. 74
Scheduling a Software Package Deployment for Managed Devices ............................................................. 75
Deleting a Software Package Deployment Schedule.................................................................................. 77
Upgrading the Firmware of Managed Devices .......................................................................................... 77
Scheduling a Firmware Deployment for Managed Devices ......................................................................... 78
Deleting a Firmware Deployment Schedule ............................................................................................. 79
Deploying a Configuration to Managed Devices ........................................................................................ 80
Scheduling a Configuration Deployment for Managed Devices ................................................................... 81
Deleting a Configuration Deployment Schedule ........................................................................................ 82
8. Map View ............................................................................................................................................ 84
Viewing Detailed Device Information ...................................................................................................... 85
Editing the Location of a Device ............................................................................................................. 86
9. Report ................................................................................................................................................ 88
Inventory Reports ................................................................................................................................ 88
Generating a Current Inventory Report ........................................................................................... 88
Scheduling an Inventory Report ..................................................................................................... 89
Cellular Signal Reports ......................................................................................................................... 91
Scheduling a Cellular Signal Report ................................................................................................ 91
Data Usage Reports ............................................................................................................................. 92
Generating a Cellular Data Usage Report ......................................................................................... 92
Scheduling a Cellular Data Usage Report ......................................................................................... 94
Trail Reports ....................................................................................................................................... 95
Generating a Trail Report .............................................................................................................. 95
Scheduling a Trail Report .............................................................................................................. 96
Report Settings ................................................................................................................................... 97
Configure Report Time Zone Settings .............................................................................................. 97
Editing a Report Schedule.............................................................................................................. 98
10. Logging ............................................................................................................................................... 99
Device Log .......................................................................................................................................... 99
Viewing Device Logs ..................................................................................................................... 99
Firewall Log ...................................................................................................................................... 101
Viewing Firewall Logs .................................................................................................................. 101
VPN Logs .......................................................................................................................................... 105
Viewing VPN Logs ....................................................................................................................... 105
Audit Logs ........................................................................................................................................ 107
Viewing Audit Logs ..................................................................................................................... 107
Notifications ...................................................................................................................................... 109
Adding a Notification ................................................................................................................... 109
11. Administration .................................................................................................................................. 112
User Accounts ................................................................................................................................... 112
User Roles ................................................................................................................................. 112
Account Input Format ................................................................................................................. 114
Adding a User Account ................................................................................................................ 115
Editing an Existing User Account .................................................................................................. 116
Deleting a User Account .............................................................................................................. 117
Configuring the Password Policy ................................................................................................... 117
Changing Your Account Password ................................................................................................. 118
Licenses ........................................................................................................................................... 119
Introduction to Licenses .............................................................................................................. 119
Viewing Your Product License Information ..................................................................................... 119
Alert Messages ........................................................................................................................... 120
Adding a New License ................................................................................................................. 121
Settings ............................................................................................................................................ 123
Configuring Preferences .............................................................................................................. 123
Configuring the System Time ....................................................................................................... 123
Purging Logs .............................................................................................................................. 124
Editing Email Settings ................................................................................................................. 125
Editing Syslog Settings ............................................................................................................... 126
MXsecurity User Manual
6
1. Introduction
MXsecurity is a management platform that provides centralized visibility and security management to easily
monitor and identify cyberthreats and prevent security misconfigurations to create a robust threat defense.
This industrial network security management suite translates complex network activity and threat
intelligence into real-time visibility of cybersecurity statuses and actionable management for better
detection and reaction against cyberthreats. With real-time dashboards, MXsecurity helps users track and
react to OT network security events more efficiently.
Key Features
Centralized Management
Manage and monitor your secure router from one central location for better administration and
maintenance. Devices can also be managed in groups based on geographic location, function, or
responsibility to increase management efficiency.
Unified, Error-free Mass Deployment
Human error can lead to costly security breaches. Unified deployment of firewall policies, firmware
upgrades, configuration files, and IPS signature updates prevents configuration errors and ensures your
network is protected with the latest security intelligence.
Real-time Visibility and Monitoring
MXsecurity provides at-a-glance visibility, showing real-time network activity and threat analysis through
highly customizable interactive widgets and a flexible dashboard.
Event Logs and Alert Notifications
MXsecurity automatically aggregates and monitors security logs at the appliance level and supports
customizable instant real-time alerts for more efficient monitoring and faster troubleshooting.
Interactive Map View
MXsecurity features a map view which shows the real-time GPS location of the secure router. The map
function is particularly useful to locate the secure router when it is used in mobile applications where the
device is installed on moving equipment.
Comprehensive Reports
MXsecurity supports comprehensive reports for the OnCell Series, making it easier for administrators to
conduct device audits and manage cellular signal and data usage. Additionally, the scheduling feature
enables users to set up periodical reports that are automatically generated and sent to specified recipients.
MXsecurity User Manual
7
System Requirements
The computer that MXsecurity is installed on must satisfy the following system requirements. The system
requirements depend on the number of nodes that will be managed through MXsecurity.
CPU (virtual cores)
4
RAM
8 GB
Hard Disk Space
64 GB
Supported Virtual
Machines VMWare ESXi 6.x or above, VM Workstation 14 or above
MXsecurity User Manual
8
2. Installation
Setting Up the Virtual Machine
Installing MXsecurity on a VMware Workstation
This section describes how to deploy MXsecurity to a VMware Workstation system.
Prerequisites
The OVA packages provided by Moxa must be available and accessible to the VMware Workstation.
VMware Workstation 14 or later is required.
Steps:
1. Start the VMware Workstation.
2. Go to File > Open in the menu bar.
3. Select the MXsecurity VM image file (*.ova) from your localhost file path and click Open.
4. Specify the name and the storage path for the new virtual machine and click Import.
5. Check the detailed VM information of the imported MXsecurity VM.
6. Add an external disk. MXsecurity requires one external disk with at least 20 GB of available storage,
otherwise MXsecurity will not be able to finish initialization and the boot process will not be completed.
The external disk is used to store the system configurations and event logs. You may attach the
external disk of a terminated MXsecurity instance here instead of adding a new disk if you want to
migrate the configurations and logs of the terminated instance to the new MXsecurity instance.
a. Click Edit virtual machine settings.
MXsecurity User Manual
9
b. Click Add, then choose Hard Disk.
MXsecurity User Manual
10
c. Select a disk type and click Next.
d. Set the disk space of the new hard disk. You can configure the external disk size depending on the
number of logs to be stored.
e. Select the path to store the disk.
f. Click Finish.
g. (Optional) If necessary, you can increase the disk size to hold a larger number of MXsecurity logs:
i. Power off the MXsecurity instance.
ii. Increase the external disk size based on your requirements.
iii. Power the MXsecurity instance back on.
7. (Optional) Adjust your MX MXsecurity instance to use proper resource configurations (Minimum: 4 CPU
cores, 8 GB of memory).
a. Click Edit virtual machine settings.
b. Configure the amount of memory.
c. Configure the number of CPU cores.
MXsecurity User Manual
11
8. (Optional) Depending on your network environment, change the network adapter setting from ‘NAT’ to
‘Bridged’ if necessary.
a. Right-click the MXsecurity VM icon and select Settings.
b. Select Network Adapter and change the default setting from NAT to Bridged.
9. Boot the MXsecurity VM. The MXsecurity instance will initialize.
Installing MXsecurity on a VMware ESXi System
This section describes how to deploy MXsecurity to a VMware ESXi system.
Prerequisites
The OVA packages provided by Moxa must be available and accessible to VMware ESXi.
ESXi version 6 or above with the required specifications.
The necessary networks have been properly created in ESXi.
Steps:
1. Log in to the VMware vSphere web client.
2. Under Navigator, click Host and then click Create/Register VM.
3. Select Deploy a virtual machine from an OVF or OVA file.
4. Enter a name for your MXsecurity instance and then select an MXsecurity image to upload.
5. Choose a storage location for the MXsecurity virtual machine.
MXsecurity User Manual
12
6. Select the deployment options.
MXsecurity User Manual
13
When you see the Ready to complete screen, click Finish to start the deployment.
7. Under the Recent tasks pane, you will see a progress bar indicating that the MXsecurity image is being
uploaded. Wait until the upload has finished.
8. Add an external disk with at least 20 GB of available space to the MXsecurity instance:
a. Power off the MXsecurity instance if it is powered on.
b. Navigate to Actions > Edit settings > Add hard disk > New hard disk.
MXsecurity User Manual
14
c. Set the disk space of the new hard disk and click Save.
You can configure the external disk size depending on the number of logs to be stored.
a. (Optional) If necessary, you can increase the disk size to hold a larger number of MXsecurity logs:
i. Power off the MXsecurity instance.
ii. Increase the external disk size based on your requirements.
iii. Power the MXsecurity instance back on.
If you want to migrate the existing MXsecurity settings to the newly launched VM, please refer to
Migration.
NOTE
The external disk is used to store the system configurations and event logs. You may attach the external
disk of a terminated MXsecurity instance instead of adding a new disk if you want to migrate the
configurations and logs of the terminated instance to the new MXsecurity instance.
9. Power on the VM.
10. (Optional) Adjust your MXsecurity instance to use proper resource configurations (Minimum: 8 core
CPU, 8 GB memory).
a. Shut down the instance of MXsecurity and click Edit.
The Edit settings window appears.
b. Configure the number of CPU cores.
MXsecurity User Manual
15
c. Configure the amount of memory.
d. Click Save.
e. Boot the MXsecurity instance.
MXsecurity User Manual
16
Configuring the MXsecurity system
Accessing the MXsecurity CLI
Steps:
1. Open the MXsecurity VM console.
2. Log in with username admin and password moxa.
3. Change the default password:
The password must meet the following requirements:
Minimum 8 characters long
The new password cannot be the same as the old password
The new password cannot contain the old password
The password cannot be too simplistic or contain simple character sequences such as “abc”,
“123456”, etc
b. Log in to the MXsecurity again with your new password.
4. (Optional) After logging in to the MXsecurity, type the “help” command to see a list of available
commands.
MXsecurity User Manual
17
Getting the IP Address of the MXsecurity Instance
Steps:
1. Enter the interface ls command to get the IP address of the MXsecurity instance.
2. If your VMware network adapter setting is using NAT, you will need to create port forwarding rules to
allow traffic to pass from connected devices to MXsecurity.
a. Navigate to Edit > Virtual Network Editor, select the right network subnet and click NAT
Settings.
i. To allow users to configure the devices through MXsecurity including all configuration settings
and commands and upload logs, forward packets from the host TCP port 8883 to the
MXsecurity server IP TCP port 8883.
ii. To allow devices to synchronize their system time with MXsecurity, forward packets from the
host TCP port 123 to the MXsecurity server IP TCP port 123.
iii. To access the web management console, forward packets from host TCP port 443 to the
MXsecurity server IP TCP port 443.
NOTE
Port 8883, 123, and 443 are the default port numbers. If you change the port numbers, make sure to use
the correct port numbers in the NAT settings.
MXsecurity User Manual
18
Configuring the IP Address Settings
You can manually configure the IP address if necessary.
Steps:
1. Use the interface --update command to update the settings of an existing network interface. For
example, the following command sets the interface “eth0” to the static IP address 192.0.2.4/24 with the
gateway IP address 192.0.2.254.
$ interface --update eth0 --method static --address 192.0.2.4 --gateway
192.0.2.254 ––netmask 255.255.255.0
2. Confirm the network interface settings are correct and execute the --restart [interface] command to
have the new settings take effect.
$ interface --restart eth0
3. Execute the interface --ls command to view the network interface settings.
$ interface --ls
4. Use the resolve --add command to add a DNS server. For example, the following command adds
“8.8.8.8” to the DNS server list.
$ resolve --add 8.8.8.8
5. Execute the resolve --ls command to view the DNS server settings.
$ resolve --ls
6. Execute the reboot command to reboot the VM.
$ reboot
MXsecurity User Manual
19
3. Migration
This chapter provides information and instructions on how to migrate your MXsecurity data to a newer
version of MXsecurity.
Migrating to a Newer Version of MXview
(VMware Workstation)
This section describes how to migrate to a newer version of MXsecurity with VMware Workstation.
NOTE
MXsecurity v1.1.0 has implemented enhanced connection security measures. To avoid issues, managed
devices should be upgraded to a firmware version and MXsecurity Agent Package which is compatible with
MXsecurity v1.1.0. The following device firmware versions are compatible with MXsecurity v1.1.0:
EDR-G9010 Series FW v3.0 or higher, MXsecurity Agent Package v2.0.13 or higher
EDR-8010 Series FW v3.0 or higher, MXsecurity Agent Package v2.0.13 or higher
OnCell G4302 Series FW v3.0 or higher. MXsecurity Agent Package v2.0.13 or higher
If you have an older version of the MXsecurity Agent Package installed, you will need to manually upgrade
it to v2.0.13 on the managed device first. To manually upgrade the software package, navigate to System
> System Management > Software Package Management > MXsecurity Agent Package in the
Secure Router’s web interface.
Steps:
1. Start the VMware Workstation.
2. Power off the MXsecurity instance.
3. Go to File > Open in the menu bar.
MXsecurity User Manual
20
4. Select the VM image file (*.ova) of the new MXsecurity version from your localhost file path and click
Open.
5. Add an existing Hard Disk.
a. Click Edit virtual machine settings.
b. Click Add, then choose Hard Disk.
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126

Moxa MXsecurity Series User manual

Type
User manual

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI