In an increasingly digital world, organizations face the challenge of ensuring uptime and high availability of their resources. Exium’s Private CyberMesh addresses this challenge by reducing or eliminating dependency on cloud infrastructures for connectivity and operational efficiency. By deploying SASE Cybernodes and Cyber Gateways, organizations can create a resilient, secure network environment that maintains performance and availability, even during cloud outages.
|
Key Components of Exium’s Private CyberMesh |
---|---|
1 |
Private Mesh Deployment:
|
2 |
Cyber Gateways:
|
3 |
Cybernodes:
|
4 |
Remote User Connectivity:
|
6 |
Traffic Inspection and Policy Application:
|
The essential security and networking modules operating within the Cybernode are depicted in the figure below.
One of the most significant advantages of the Private CyberMesh is its ability to operate independently of cloud connectivity:
Reliability During Outages |
Local Management Capabilities |
---|---|
If a Cybernode or Cyber Gateway loses connectivity to the cloud, secure connectivity for both remote and on-site users remains unaffected. This ensures that businesses can maintain operations without disruption, even in the face of internet outages or cloud service interruptions. | The Cyber Gateways offer a limited local user interface for management purposes, ensuring that configurations can still be monitored and adjusted even when cloud connectivity is lost. While any configuration updates cannot be pushed during this time, core functionalities continue to operate smoothly. |
For the cyber gateways deployment, follow the appropriate guide based on the Hardware or VM you selected.
You can deploy a Cybernode on a VM or hardware that meets the minimum specifications outlined in the table below. Any hardware or VM similar to that used for Cyber Gateway deployment is acceptable, as long as it complies with the minimum requirements for the Cybernode.
Resource |
Cybernode Minimum Specs |
---|---|
CPU | 4 vCPUs |
RAM | 8 GB |
SSD | 128 GB |
Follow the same guidelines as for the Cyber Gateway to install Ubuntu 24.04 on the hardware or create an Ubuntu 24.04 VM. Once Ubuntu is ready, execute the following script:
bash <(curl -s https://s3-api.speerity.net/cgw/scripts/cgwctl.sh)
After running the script, please send an email to support@exium.net with the hostname of the machine. The Exium team will handle the deployment, and you will receive an email notification once it is completed.
When Cybernode is deployed on the inside of the Firewall, you need to make sure the following incoming and outgoing ports are allowed in your Existing Firewall.
Protocol |
Allow Incoming Ports |
Allow Outgoing Ports |
---|---|---|
UDP |
51821 |
Any you have been using in your Firewall for on-prem users and like to give same access to remote users |
TCP |
443 |
443 for https or any other ports you have been using in your Firewall for on-prem users and like to give same access to remote users |
Exium’s Private CyberMesh delivers a robust solution for organizations seeking to enhance their network resilience and security while minimizing reliance on cloud infrastructure. By integrating Cybernodes and Cyber Gateways, businesses can maintain uptime and high availability with a secure and efficient private network. This innovative approach not only strengthens connectivity but also ensures that operations remain uninterrupted, providing peace of mind in an unpredictable digital landscape.
To learn more about implementing SASE, XDR, IAM/ MFA, and GRC for your organization and explore tailored solutions that meet your unique requirements, contact Exium at partners@exium.net for a consultation or demonstration. If you are ready to get started, check out our testing and onboarding process.