Setting up the Kenna Virtual Tunnel on AWS

 

Outbound Traffic Requirements:

Source Destination Protocol / Port Description Notes
Kenna VM api.kennasecurity.com TCP/443 Web traffic used to verify your API key and pull a VPN configuration from Kenna to the VM. A firewall rule for this must use a hostname as a destination, as its IP may change. This traffic can be sent through a standard web proxy.
Kenna VM

54.201.122.26

-or-

tunnel.kennasecurity.com

TCP/443 OpenVPN traffic used to bring up a VPN tunnel from the VM to Kenna's client gateway. This traffic is not HTTPS and requires a direct outbound connection; it cannot be sent through a web proxy.

 

NOTE: When considering where to deploy the file, keep in mind that it must be able to reach both the security appliance or server inside your network AND make outbound TCP connections on port 443 (NOT HTTPS) to our client gateway at 54.201.122.26 & https://api.kennasecurity.com. This can be on a permanent virtualization server or on your own computer. Please keep in mind that if you run the virtual machine on your computer it will only have access to your network when the computer is running and the VM is active.

Installation Steps:

1. Contact support@kennasecurity.com to enable this support for your account. Kenna Support must be contacted before you are able to register your virtual tunnel VM.

Direct Console access is required in order to configure the virtual tunnel. Please open a support ticket for assistance if you do not have direct access (i.e. AWS). 

2. Download the VM image:

     Kenna US AWS Region: https://www.kennasecurity.com/virtualtunnel

     Kenna EU Region: https://www.kennasecurity.com/virtualtunnel-eu 

     Kenna US GCP Region: Please Contact Support

     Kenna CA Region: Please Contact Support

Contact support you are on a private region, are using a proxy or have any questions about which download is needed.

3. Import the VM image into your hypervisor or VM program (System Requirements: 700 MHz processor with 512 MiB RAM, 10 GB disk space). Please note: Our support department cannot convert the image into your hypervisors native image format.

4. Boot the VM.

5. When prompted, enter the API key given to you by Kenna into the VM.

Troubleshooting Steps:

1. Verify that the API key has been entered.

2. If your VM is a static IP, please confirm that you have entered in the IP information into the VM.

3. Verify that the correct network requirements have been put in place: outbound TCP connections on port 443 (NOT HTTPS) to our client gateway at 54.201.122.26 & https://api.kennasecurity.com

 

Virtual Tunnel Frequently Asked Questions

  1. What image is the virtual tunnel Based on? Does the virtual tunnel allow access to patch and maintain the image?

    • The Virtual Tunnel is running CentOS 8 as its operating system. Kenna does not provide client access to the virtual tunnel VM and does not require client iteration other than entering the API key and local network configuration settings in the console prompts. Support will patch the VM as needed.

  2. How does Kenna secure data in transit between the virtual tunnel and Kenna?

    • All data is transmitted to Kenna via an encrypted OpenVPN tunnel.

  3. How are the API credentials used for the scanners secured both in transit between the virtual tunnel and Kenna, and while at rest? Where are the credentials stored?

    • The API credentials for the scanner are entered and stored in the Connectors page of the UI, not in the VM itself, and they are encrypted as part of the Kenna platform solution. The Kenna API key is entered once when establishing the tunnel and transmitted to Kenna via HTTPS to complete the initial handshake after which the tunnel is established and all future communications happen securely over the tunnel. The API key is not saved and any subsequent reboots of the VM will require that the API key is re-entered. 

  4. Since OpenVPN is used, who is responsible for keeping it up to date and secure?

    • Kenna security is responsible for implementing secure OpenVPN libraries as part of our distributed tunnel solution. 

  5. Is the virtual tunnel backed up in the cloud? Can my organization create a backup?

    • The virtual tunnel VM is not backed up by Kenna as it resides within your organization's own environment. Only one instance of the virtual tunnel is supported and can be running/connected at a given time. The connector settings or authentication information is saved in the Kenna UI, not in the virtual tunnel VM so it can easily be replaced with a fresh image by following the console configuration instructions.

  6. What happens when I need to reboot my virtual tunnel?

    • The setup prompt will appear every time the VM is rebooted and will require manual configuration.  There may be options at the hypervisor level to restrict console access to the VM but the setup menu must be accessible as that this the only way by which the VM can be configured with the API and local network configuration information.

Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request

Comments

0 comments

Please sign in to leave a comment.