Set up the security connector
Before you begin
Review the setup and VM requirements. See Setup virtual machine requirements.
Complete these high-level steps to set up Security Connector.
To set up the security connector:
Add the security connector. See Add a security connector.
Download Enterprise Security Connector. See Download Security Connector.
Version 3.3.0 allows you to deploy a Security Connector image file on Amazon Web Services (AWS) and Microsoft Azure. Deployments with AWS or Azure are currently in beta. To try Security Connector on these cloud platforms, contact your Akamai representative.
Deploy Security Connector on a VM:
- To deploy Security Connector on Microsoft Hyper-V, see Deploy Security Connector on Microsoft Hyper-V.
- To deploy Security Connector on VMware ESXi, see Deploy Security Connector on VMware ESXi.
- To deploy Security Connector on Amazon Web Services, see Deploy Security Connector on Amazon Web Services (AWS).
- To deploy Security Connector on Azure, see Deploy Security Connector on Microsoft Azure.
Log in to the VM and create a password for the security connector. See Create a security connector password.
Configure the number of network interfaces that you want to use for Security Connector data. For more information, see Select one or two interfaces for DNS or HTTP Forwarder data.
In the security connector, configure network settings for the Security Connector interfaces and the DNS name servers. See Configure the en1 interface, Configure the en2 interface, and Configure DNS name servers.
Configure your corporate resolvers as the DNS name servers.
Generate an activation code for the security connector you added in SIA. See Generate an activation code.
Activate the security connector. See Activate the security connector.
Run a connectivity test to confirm that the security connector can connect to Akamai services. See Run a connectivity test.
To configure Security Connector as a DNS sinkhole:
- Create or modify a policy to associate the security connector with a threat category or a custom list. You should assign a security connector to the malware or C&C categories. See Assign security connectors to a policy.
- Test the security connector to ensure that it communicates with SIA and delivers event data to SIA. See Test the security connector.
To configure Security Connector as a DNS forwarder:
- If there are internal domains or IP addresses that you don’t want directed to SIA and prefer are handled by the corporate resolver, see Configure internal IP addresses, DNS suffixes, and email domains.
- Configure enterprise machines to forward DNS requests to DNS Forwarder. This is the IP address of the en1 interface (formerly the data interface). Make sure that you provide the IP addresses of the primary and secondary DNS forwarders, as well as the IP address of the corporate resolver.
- If the corporate resolver is authoritative for internal domains only and is not recursive, configure a local DNS server for DNS Forwarder. In a situation where DNS Forwarder cannot reach SIA, this server handles local DNS requests, while the DNS name server you configure as part of Security Connector setup becomes a fallback recursive resolver that handles requests to the Internet. To configure a local server, see Configure local DNS servers.
To configure Security Connector as an HTTP Forwarder, see Configure HTTP Forwarder.
Add email addresses of administrators or other users within your organization that you want notified when there is a software upgrade available for the security connector. See Add email addresses for Security Connector upgrade notifications.
Updated 6 months ago