EasyManua.ls Logo

Fidelis Deception Decoy Server FDH-1000-C - User Manual

Default Icon
15 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Loading...
www.fidelissecurity.com
About Fidelis Cybersecurity
Fidelis Cybersecurity, the industry innovator in Active XDR and proactive cyber defense solutions, safeguards
modern IT environments with unparalleled detection, deception, response, cloud security, and compliance
capabilities. We offer full visibility across hybrid environments via deep, dynamic asset discovery, multi-faceted
context, and risk assessment. These features help minimize attackable surface areas, automate exposure
prevention, threat detection, and incident response, and provide the context, accuracy, speed, and portability
security professionals need to find and neutralize adversaries earlier in the attack lifecycle. Fidelis Cybersecurity
is dedicated to helping clients become stronger and more secure. Fidelis is trusted by many top commercial,
enterprise, and government agencies worldwide. For more information, please visit www.fidelissecurity.com
Copyright © 2022 Fidelis Cybersecurity
®
, Inc. All rights reserved.
Fidelis Deception
®
Decoy Server
Appliance
Quick Start Guide
Rev-K (HPE DL360 Gen10) Platform
Question and Answer IconNeed help?

Do you have a question about the Fidelis Deception Decoy Server FDH-1000-C and is the answer not in the manual?

Overview

The Fidelis Deception Decoy Server Appliance is a cybersecurity device designed to detect and report deception alerts when attackers attempt to access emulated and real OS decoys. It integrates into existing network infrastructures to provide proactive cyber defense.

Function Description:

The Decoy Server Appliance operates by deploying emulated and real operating system decoys across various networks. These decoys are designed to mimic legitimate assets, luring attackers into interacting with them. When an attacker accesses a decoy, the Decoy Server generates deception alerts, which are then reported to either an on-premises Fidelis CommandPost or the remote Fidelis Network Cloud, depending on the user's configuration. This functionality helps in early detection and neutralization of adversaries within the attack lifecycle by providing visibility into attacker activities and minimizing attackable surface areas. The appliance supports connections to trunk ports, enabling communication on multiple subnets from a single port, as well as direct connections to specific subnets.

Important Technical Specifications:

The Fidelis Deception Decoy Server Appliance comes in different models, specifically the FDH-1000-C/F (Rev-K) and FDH-3000-C/F (Rev-K) platforms, built on the HPE DL360 Gen10 architecture.

Form Factor:

  • All models are 1U rack-mount chassis SFF (Small Form Factor).

CPU:

  • FDH-1000-C/F: Dual Silver 4214R, 12/24-core, 2.4 GHz.
  • FDH-3000-C/F: Single 6246R, 16-core, 3.4 GHz.

TPM (Trusted Platform Module):

  • All models include TPM 2.0 for enhanced security.

Memory:

  • FDH-1000-C/F: 64GB ECC DDR4 2933Mhz.
  • FDH-3000-C/F: 128GB ECC DDR4 2933Mhz.

Storage Capacity & Configuration:

  • FDH-1000-C/F: 2x HDD 300 GB in RAID-1 configuration (300 GB Effective).
  • FDH-3000-C/F: 6x HDD 600GB in RAID-5 configuration (3 TB Effective).

Network Adapters (Default Configuration):

  • All models include 4x 1GbE ports.
  • FDH-1000-F & FDH-3000-F (Optical models): Additionally include 2x 10GbE SFP+ ports (Optical, multi-mode, 1G/10G).

Out-of-Band Management:

  • Integrated Lights Out Management (iLO) is available on all models for remote server administration.

Power Supply:

  • All models feature dual hot-swap 800W High Efficiency AC power supplies for redundancy.

Dimensions:

  • Height: 4.29 cm (1.69 in)
  • Width: 43.46 cm (17.11 in)
  • Depth: 70.7 cm (27.83 in)

Weight (approx.):

  • 16.27 kg (35.86 lb) for all models.

Operating Temperature:

  • 10° to 35°C (50° to 95°F) at sea level.

AC Input Requirements:

  • 100-120 VAC
  • 200-240 VAC

BTU Rating (max):

  • FDH-1000-C/F:
    • 3067 BTU/hr (100 VAC)
    • 2958 BTU/hr (200 VAC)
    • 2949 BTU/hr (240 VAC)
  • FDH-3000-C/F:
    • 1902 BTU/hr (100 VAC)
    • 1840 BTU/hr (200 VAC)
    • 1832 BTU/hr (240 VAC)

Network Port and Cabling Requirements:

The appliance features various ports for network connectivity:

  • Admin (eth0): GbE Copper RJ45 (copper) requiring Cat 5e patch cable. This port connects the Decoy server to the CommandPost and optionally to an on-premises Fidelis Sandbox.
  • Decoys (eth1, eth2, eth3): GbE Copper RJ45 (copper) requiring Cat 5e patch cable. These ports connect the Decoy server appliance to subnets through network switches or can be used as trunk ports.
  • Decoys (eth4, eth5) (for 10GbE optical models): Duplex LC Connector requiring Multimode Fiber, 850nM, OM2. These ports are designed for higher network throughput and can connect to trunk ports or specific subnets.
  • iLO: GbE Copper RJ45 (copper) requiring Cat 5e patch cable. This is for optional remote/out-of-band server administration.

Usage Features:

  • Easy Setup: The Quick Start Guide outlines a straightforward process for initial setup, including rack installation, power connection, and network cabling.
  • Network Configuration: Users can configure Admin and iLO network settings (Hostname, Static IP, Subnet Mask, Gateway, Proxy Server, DNS Servers, NTP Servers, Time Zone) via a command-line interface (CLI) using KVM Console, Console, or iLO.
  • DHCP Option: Users have the option to enable or disable DHCP during network configuration, although a static IP address is recommended for stable CommandPost/Management connection.
  • Decoy Creation: Logical configuration for decoys is integrated into the decoy creation process, allowing for flexible deployment strategies.
  • Integration with CommandPost: The appliance can be registered with an on-premises Fidelis CommandPost by specifying a friendly name, description, and the IP address of the Admin interface. This involves accepting an End User License Agreement (EULA).
  • Fidelis Network Cloud Integration: For users leveraging the Fidelis Network Cloud, technical support is available to assist with configuring and enabling Decoy Servers for their environment.
  • Default Passwords: Default credentials are provided for the Appliance Console (fidelis/fidelispass), CommandPost user interface (admin/system), and iLO (administrator, password printed on label). Users are required to change the default password immediately upon first login.

Maintenance Features:

  • Integrated Lights Out Management (iLO): Provides out-of-band management capabilities, allowing administrators to remotely monitor, diagnose, and manage the server even when the operating system is not running or is unresponsive.
  • Hot-Swap Power Supplies: Dual hot-swap 800W power supplies ensure continuous operation and easy replacement without system downtime.
  • RAID Configuration: Storage is configured with RAID (RAID-1 for FDH-1000-C/F and RAID-5 for FDH-3000-C/F), providing data redundancy and protection against drive failures.
  • Technical Support: Fidelis Cybersecurity offers comprehensive technical support, including phone, toll-free numbers, email, and web resources (support.fidelissecurity.com), for product documentation, appliance specifications, and troubleshooting. Users can contact their reseller or Fidelis Cybersecurity directly based on their support contract details.
  • Firmware Updates: The system supports software installation and updates, as indicated by the "Erase & Install deception server" option during initial setup, ensuring the appliance runs the latest security features and bug fixes.
  • System Monitoring: The CLI provides system information such as system time, version, machine UUID, hostname, IP address, mask, default gateway, and DNS, which are crucial for monitoring and troubleshooting.

Fidelis Deception Decoy Server FDH-1000-C Specifications

General IconGeneral
BrandFidelis
ModelDeception Decoy Server FDH-1000-C
CategoryNetwork Hardware
LanguageEnglish