Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products

Dell PowerProtect Cyber Recovery 19.15 AWS Deployment Guide

PDF

Enabling access to the CyberSense instance

After the CyberSense AMI has been deployed, enable SSH and HTTPS access from the Cyber Recovery jump host to the CyberSense instance.

About this task

Perform these steps from the AWS Management Console.

Steps

  1. Edit the Jump Host Security Group.
    1. Allow SSH outbound from the jump host to the CyberSense instance, using the following parameters:
      • The type is SSH.
      • The protocol is TCP.
      • The port range is 22.
      • The destination is Custom.
      • The value of destination is the CyberSense Instance IP ex: 10.0.0.30/32.
    2. Allow HTTPS outbound from the jump host to the CyberSense instance, using the following parameters:
      • The type is HTTPS.
      • The protocol is TCP.
      • The port range is 443.
      • The destination is Custom.
      • The value of destination is the CyberSense Instance IP ex: 10.0.0.30/32.
  2. Edit the CyberSense Security Group.
    1. Allow SSH inbound from the jump host to the CyberSense instance, using the following parameters:
      • The type is SSH.
      • The protocol is TCP.
      • The port range is 22.
      • The source is Custom.
      • The value of source is the Jump Host Instance IP. For example: 10.0.0.30/32.
    2. Allow HTTPS inbound from the jump host to the CyberSense instance, using the following parameters:
      • The type is HTTPS.
      • The protocol is TCP.
      • The port range is 443.
      • The source is Custom.
      • The value of source is the Jump Host Instance IP.
    3. Add an outbound rule to allow access to the Interface Endpoint, using the following parameters:
      • The type is HTTPS.
      • The protocol is TCP.
      • The port range is 443.
      • The value of destination is the Interface Endpoint IP address.
  3. Edit the Interface Endpoint Group Security Group by selecting <your prefix>_PPCR EC2 Endpoint SG and add an inbound rule, using the following parameters:
    • The type is HTTPS.
    • The protocol is TCP.
    • The port range is 443.
    • The source is Custom.
    • The value of source is the CyberSense Instance IP.
  4. Edit the PPCR Jump Host Subnet ACL.
    1. Add an inbound rule to allow ephemeral port access to the jump host subnet, using the following parameters:
      • A rule number, which you provide.
      • The type is Custom.
      • The protocol is TCP.
      • The port range is 1024-65535.
      • The source is the CyberSense Instance IP.
      • The value for Allow/Deny is Allow
    2. Add an outbound rule to allow SSH from the jump host to the CyberSense instance, using the following parameters:
      • A rule number, which you provide.
      • The type is SSH.
      • The protocol is TCP.
      • The port range is 22.
      • The destination is the CyberSense Instance IP.
      • The value for Allow/Deny is Allow
    3. Add an outbound rule to allow HTTPS from the jump host to the CyberSense instance, using the following parameters:
      • A rule number, which you provide.
      • The type is HTTPS.
      • The protocol is TCP.
      • The port range is 443.
      • The value of destination is the CyberSense Instance IP.
      • The value for Allow/Deny is Allow

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\