Azure VM Type |
OS |
CPU |
RAM |
HDD |
---|---|---|---|---|
Standard B1s |
or Ubuntu 22.04 |
1 vCPU |
1.0 GB |
Standard with minimum 30GB |
Protocol |
Allow Outgoing Ports |
Allow Incoming Ports |
---|---|---|
UDP | 3478-3479, 51800-51850 | None |
TCP | 8089 | None |
azureuser@cgw:~$ ip a
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000
link/ether 00:0d:3a:a7:0f:b8 brd ff:ff:ff:ff:ff:ff
inet 10.19.0.4/24 metric 100 brd 10.0.0.255 scope global eth0
valid_lft forever preferred_lft forever
inet6 fe80::20d:3aff:fea7:fb8/64 scope link
valid_lft forever preferred_lft forever
azureuser@cgw:~$ ping 8.8.8.8
PING 8.8.8.8 (8.8.8.8) 56(84) bytes of data.
64 bytes from 8.8.8.8: icmp_seq=1 ttl=115 time=13.0 ms
64 bytes from 8.8.8.8: icmp_seq=2 ttl=115 time=13.2 ms
64 bytes from 8.8.8.8: icmp_seq=3 ttl=115 time=13.2 ms
--- 8.8.8.8 ping statistics ---
3 packets transmitted, 3 received, 0% packet loss, time 2002ms
rtt min/avg/max/mdev = 12.989/13.102/13.162/0.080 ms
azureuser@cgw:~$ ping google.com
PING google.com (142.250.125.100) 56(84) bytes of data.
64 bytes from jh-in-f100.1e100.net (142.250.125.100): icmp_seq=1 ttl=101 time=25.7 ms
64 bytes from jh-in-f100.1e100.net (142.250.125.100): icmp_seq=2 ttl=101 time=25.7 ms
64 bytes from jh-in-f100.1e100.net (142.250.125.100): icmp_seq=3 ttl=101 time=25.8 ms
64 bytes from jh-in-f100.1e100.net (142.250.125.100): icmp_seq=4 ttl=101 time=25.6 ms
--- google.com ping statistics ---
4 packets transmitted, 4 received, 0% packet loss, time 3005ms
rtt min/avg/max/mdev = 25.639/25.701/25.795/0.058 ms
To create a Single-Interfce Cyber Gateway (CGW-SIF), follow the steps below.
In case, you are unable to login to machine using SSH to copy and run CGW install command, then we recommend you to run pre-install script mentioned below. You have to type it on console, because copy paste won't work on some direct machine consoles.
bash <(curl -s https://s3-api.speerity.net/cgw/scripts/cgwctl.sh)
Please share Workspace and CGW names with us on support@exium.net. We will push installation remotely.
The CyberGateway deployment will start. At this time, you can leave the deployment running unattended. You will receive an email on the admin email that you specified earlier when the deployment is complete. You can also check the status of the cyber gateway in the Exium admin console. When cyber gateway is deployed successfully and connected, you will see a Green Connected Status as in the screenshot below.
Post successful deployment, subnet of the CyberGateway machine's interface will be added as a Trustpath automatically. It will be associated to “workspace” group category, i.e. all the users in workspace will be able to access the resources on that private subnet. You can edit group association any time as per requirement. You may create new user groups and associate them with the trust path.
Once the CyberGateway is deployed successfully and connected, you can start testing the Zero Trust Secure Private Access policies.
Additional trust paths can be added manually. In case additional trust paths have different next hops, then those can also be configured from admin console. In case additional trust path subnets are already accessible via Cybergateway's default gateway then next hop configuration is not required.
You can follow below steps to add additional trust path subnets with or without their next hop.
Make sure next hop gateway IP is accessible from CyberGateway machine, else route configuration will fail
Do not add next hop configuration in the default trust path which is created automatically by CyberGateway post deployment.
Uninstall can be done from admin console or using CGW CLI commands
To uninstall CyberGateway from CyberGateway system directly
cgw uninstall